Feeds

ISA report reveals email security lapse

Safeguarders slightly slipshod on safeguards

Secure remote control for conventional and virtual desktops

The Independent Safeguarding Authority's first annual report reveals that it sent an email with confidential data to the wrong address.

The incident, which occurred in the organisation's first full year of operation, was followed by an investigation which concluded that the lapse was due to human error rather than procedural failures, according to the ISA's annual report and accounts for 2008-09.

Staff awareness of information governance legislation is regarded as highly important, says the document. At inductions employees are given training about data protection, freedom of information and information security.

The report says the training is "proven" to raise awareness and embed security and information governance into the ISA's culture.

Although the organisation has plans to recover from an IT disaster, the document says that it has not yet developed a full business continuity plan.

The ISA was set up in response to the Bichard enquiry which followed the murder of two young children in Soham by the school caretaker Ian Huntley. Its role is to decide who should be statutorily barred from working with children and vulnerable adults through its Vetting and Barring Scheme.

From 1 November 2010 it will be mandatory for all people taking new jobs or changing jobs in relevant roles to be registered with the ISA. However, the Conservative Party has said it plans to review the scope of the scheme if elected to government.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.