Feeds

Leicester nursery loses memory stick with children's details

Details of 80 children potentially AWOL

Combat fraud and increase customer satisfaction

Parents concerned that new government databases might lead to their children’s data being lost or stolen were this week able to pilot the experience courtesy of a Leicester-based nursery, which appears to have "misplaced" a data stick containing details of children in their care.

At time of writing, Leicester City Council, which is responsible for the nursery, could not confirm whether the stick was lost or stolen. Nor would it confirm the name of the nursery involved until parents had been fully informed.

The council has however launched the obligatory information, reported the matter to the police, and let the Information Commissioner know.

It also admits that details of around 80 children could be on the stick, including names, addresses, dates of birth and telephone numbers.

Council leaders apologised today and said the data should not have been stored on a memory stick in the first place.

Sheila Lock, the council’s chief executive said: "We take the issue of data security extremely seriously.

"From initial information available to me it is clear there has been a serious and unacceptable breach of our protocols around data storage and data loss.

"In light of this incident we are taking immediate steps to remind all of our staff about the strict rules we have in place."

For once, the body concerned appears to have had a reasonably sensible security policy in place. According to guidelines released in December, 2007:

"All council-owned data should be appropriately protected from unauthorised access. The level of protection will reflect the sensitivity of the material. In practical terms, this will be provided by password protection and/or encryption.

"At minimum this will involve password protecting the medium or documents being stored. However, sensitive personal data as defined by the DPA must be encrypted, using a minimum of 128-bit encryption. Higher levels of encryption should be used where they are available."

A council spokesperson added that "encryption software was made available to staff, along with training and guidelines on how to use it."

"We buy encrypted memory sticks which meet our standards, and instructions on their use are also made available," the spokesperson added.

All well and good. The only question remaining is whether staff at the nursery involved actually followed the council's policies.

In the meantime, parents and carers will be given support and advice on changing phone numbers or, in extreme circumstances, will even be offered help changing address. ®

Top three mobile application threats

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
RIP net neutrality? FCC boss mulls 'two-speed internet'
Financial fast track to replace level competitive playing field, report claims
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
UK.gov chucks £28m at F1 tech for buses and diggers plan
Well, not really F1 but who's heard of LMP and VLN*?
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.