Feeds

Wee biz sector risks wrath of UK data leak watchdog

Fines through the roof, ICO turns eye to private sector

Application security programs and practises

Businesses that fail to keep private data secure could be in trouble as the Information Commissioner's Office extends its beady eye beyond breaches in the public sector.

Bean counters at Syscap pointed out that with the ICO issuing more warning notices and ramping up its fines, small businesses in particular could be at risk as they lack controls to track ICT kit in use.

The office issued 68 warning notices in the year up to June, up by nearly half from the previous year, and issued 15 fines worth £1.8m on public institutions compared to £431,000 in the previous year.

However, the Syscap statistics-seekers reckon the ICO is starting to turn its attention to private businesses.

"Small businesses are increasingly falling foul of the ICO," said Syscap CEO Philips White in a canned statement.

"It's clear that the ICO is starting to take a much more proactive stance in penalising data lapses, so this is something that business owners need to take very seriously," he added.

The information-gatherers said that most firms had the wherewithal to secure customer information, but some businesses didn't have the money or the sense to sort out their data security.

"Budgets have been stretched since the recession, so upgrading old or out-of-date IT equipment has been put on the backburner for some time now. This has left some old or redundant systems open to data lapses," claimed White. ®

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.