Feeds

Vodafone Aus off the hook, kind of

A 50-50 verdict from Privacy Commissioner

Internet Security Threat Report 2014

The Australian Privacy Commissioner has delivered a 50-50 verdict in his report on breaches of customer privacy in Vodafone’s computer system.

On the one hand, the allegation that data on “four million Vodafone customers including their billing and call records were uploaded onto a publicly accessible website” has been found to be unsubstantiated.

That allegation appears, in part, to have arisen from stories such as this, in which a dealer (with legitimate access to the system) showed a journalist what information was held in the company’s Siebel CRM system.

As Privacy Commissioner Tim Pilgrim states in his report, since “an organisation will not be disclosing information, where they are giving an individual access to information the organisation holds about them”, there was no breach of privacy according to National Privacy Principle (NPP) 2.1 (which covers the disclosure of personal information).

More seriously, however, the commissioner has decided that Vodafone’s security was not adequate to protect customer data according to another NPP. NPP 4.1 requires companies to protect personal information against misuse.

The commissioner singled out the use of shared logins for branded retailers’ stores as in breach of this principle. A single login for a store, instead of individual logins for each staff member, reduced the effectiveness of audit trails, the commissioner said, and exposed customer information to misuses such as identity fraud.

Vodafone has also undertaken to improve its security, reassess the level of access required by users, and end the use of shared logins.

As for login IDs, passwords and customer data – all of which, at some point in the story, were reported as being available “on the internet” – the Privacy Commissioner has said there was “no evidence that this information was available on the internet or Vodafone’s website”. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?