Feeds

A parents' guide to the HMRC data giveaway

Don't panic

The Power of One eBook: Top reasons to choose HP BladeSystem

If you are a recipient of child benefit in the UK, the chances are your records and bank details were included in one of the two CDs that Her Majesty's Revenue and Customs (HMRC) has lost. HMRC has said we have nothing to fear, despite the fact it doesn't know where these unencrypted CDs are or who has been accessing them.

All the same, APACS, the British banking payments association, is advising people concerned about the situation to ring a dedicated Revenue phone line - 0845 302 1444. APACS reassures parents that "there is no evidence that the lost data has fallen into criminal hands".

The organisation, in an advisory page on its website, said: "The missing data contained sort code and bank account details, national insurance numbers, dates of birth, names and address details, of all families in receipt of child benefit, as well as the names and dates of birth of those children for whom child benefit is payable."

It again claimed that this information, on its own, was insufficient for a fraudster to access your account.

APACS advises people not to close accounts but to look out for dodgy transactions. If you spot such a transaction you should get in touch with your bank. If, however, you receive post suggesting you have opened an account or applied for a card with a company you have had no contact with, possible evidence that your ID has been copied, you should contact the police. APACS' advice is here.

As for finding out what information HMRC has on you, one Register reader told us:

Hi,

I have just spoken to the HMRC helpline, and wanted to know exactly what information relating to me had been lost.

Obviously the could not give me the information over the phone, that would not be secure!

For anyone interested in getting a copy of their information that HMRC are holding, you can write to the address below with a covering letter. This letter should contain your request for the data held about you, plus the following: -Your full name -Address -NI Number -Child Benefit number (if you know it)

It may be prudent to send this letter as a recorded delivery, or a secure delivery method - you would not want this information falling into the wrong hands!

Send to:

RM BP5001, Benton Park View, Long Benton, Newcastle-upon-Tyne. NE98 1ZZ

Do it soon, as they may have a sudden increase in requests.

A spokeswoman for HMRC told the Reg: "It's business as usual here. There is no need for people to phone us or their bank. The phoneline (0845 302 1444) has not seen a huge volume of traffic but people are welcome to call if they're worried."

She added that HMRC will be writing to everyone whose information has been lost to apologise. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.