Feeds

ISA report reveals email security lapse

Safeguarders slightly slipshod on safeguards

Internet Security Threat Report 2014

The Independent Safeguarding Authority's first annual report reveals that it sent an email with confidential data to the wrong address.

The incident, which occurred in the organisation's first full year of operation, was followed by an investigation which concluded that the lapse was due to human error rather than procedural failures, according to the ISA's annual report and accounts for 2008-09.

Staff awareness of information governance legislation is regarded as highly important, says the document. At inductions employees are given training about data protection, freedom of information and information security.

The report says the training is "proven" to raise awareness and embed security and information governance into the ISA's culture.

Although the organisation has plans to recover from an IT disaster, the document says that it has not yet developed a full business continuity plan.

The ISA was set up in response to the Bichard enquiry which followed the murder of two young children in Soham by the school caretaker Ian Huntley. Its role is to decide who should be statutorily barred from working with children and vulnerable adults through its Vetting and Barring Scheme.

From 1 November 2010 it will be mandatory for all people taking new jobs or changing jobs in relevant roles to be registered with the ISA. However, the Conservative Party has said it plans to review the scope of the scheme if elected to government.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
State Dept shuts off unclassified email after hack. Classified mail? That's CLASSIFIED
Classified systems 'not affected' - but, is this reconnaissance?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.