Feeds

Home Office promises better personal data guards

ICO orders tightening of loose lips

Combat fraud and increase customer satisfaction

The Home Office has promised privacy regulator the Information Commissioner's Office (ICO) that it will handle citizens' personal data securely in the future, after the ICO found it in breach of the Data Protection Act.

A contractor to the Home Office, PA Consulting, lost an unencrypted memory stick containing the sensitive personal information of thousands of people last year. The ICO has now made the Home Office sign a formal undertaking to protect citizens' data.

The Home Office has promised that all mobile or portable machines which carry personal data will be encrypted from now on, and that any contractor will also use encryption.

“The Data Protection Act clearly states that organisations must take appropriate measures to ensure that personal information is kept secure," said Assistant Commissioner Mick Gorrill. "The Home Office recognises the seriousness of this data loss and has agreed to take immediate remedial action. It has also agreed to conduct future audits to ensure compliance with the Act.”

The undertaking commits the Home Office to ensuring that anyone processing personal data for it will comply to the same standards as it, and that it will perform regular audits to ensure that that is the case.

"This case was serious because it involved thousands of individual records, which contained sensitive information on people serving custodial sentences and others previously convicted of criminal offences," said Gorrill. "This breach illustrates that even though a contractor lost the data, it is the data controller (the Home Office) which is responsible for the security of the information. It is vital that sensitive personal information is handled properly and held securely at all times."

The ICO could have issued an enforcement notice against the Home Office, a breach of which would be a criminal offence carrying a fine of up to £5,000. The Home Office agreed to the undertaking "in consideration of the Commissioner not exercising his powers to serve an enforcement notice," the undertaking said.

The ICO has also taken similar action against Abertawe Bro Morgannwg University NHS Trust and Tees, Esk and Wear Valleys NHS Foundation Trust.

An unencrypted laptop containing sensitive information on 5,000 people was lost by Abertawe Bro Morgannwg University NHS Trust while Tees, Esk and Wear Valleys NHS Foundation Trust lost an unencrypted memory stick containing details on patients and staff.

The two organisations also signed undertakings promising to protect personal information in their care.

Copyright © 2008, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Top three mobile application threats

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
RIP net neutrality? FCC boss mulls 'two-speed internet'
Financial fast track to replace level competitive playing field, report claims
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
UK.gov chucks £28m at F1 tech for buses and diggers plan
Well, not really F1 but who's heard of LMP and VLN*?
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.