Feeds

ICO rules against British Council

Disc loss doh!

Top 5 reasons to deploy VMware with Tegile

The Information Commissioner's Office (ICO) has found the British Council in breach of the Data Protection Act after the loss of an unencrypted computer disc

Details lost include sensitive personal information relating to trade union membership of over 2,000 members of staff.

The British Council reported the data breach to the ICO as soon as it was aware it had taken place.

In response, the ICO has required the orgnisation to sign a formal undertaking of reasonable measures to keep personal information secure in future. These include ensuring that all portable and mobile devices which are used to store and transmit personal information must be encrypted, with immediate effect.

The Undertaking has been signed on behalf of the British Council by the chief executive, Martin Davidson.

Mick Gorrill, assistant information commissioner at the ICO, said: "The British Council proactively reported the breach to the ICO and took immediate remedial action which demonstrates its understanding of the seriousness of this data loss. The Data Protection Act clearly states that organisations must take appropriate measures to ensure that personal information is kept secure.

"The organisation also agrees to ensure that its policies on the transfer and sharing of personal information on portable devices are clear and compliant with government standards."

Failure to meet the terms of the undertaking would lead to further enforcement action by the ICO.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Beginner's guide to SSL certificates

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?