Feeds

Manchester plods cop £120k fine for USB-stick-inna-wallet data gaffe

Serious Serious Crime crime 'sends shivers down spine'

Reducing security risks from open source software

The Greater Manchester Police Force have paid a £120,000 fine after losing the details of more than a thousand people under investigation for serious drugs crime.

The personal details were kept on an unencrypted memory stick with no password protection, belonging to an officer with the Serious Crime Division team. Kept in the officer's wallet it went AWOL in July 2011 after the wallet was swiped from his kitchen table when his home was burgled.

It contained the details of 1,075 people who had been investigated by the drugs squad over the past 11 years.

The weight of the fine from the Information Commissioners Office reflects endemic data security problems that the ICO found in the Manchester police force: officers regularly used unencrypted USB sticks and there were few checks on what data could be downloaded and taken out of the office.

A similar security breach in September 2010 had prompted no change in culture, the ICO said. In 2010 a businessman found a mislaid Greater Manchester Police branded memory stick that contained sensitive anti-terrorism materials.

And officers were still not sufficiently trained in data security, the ICO found.

A unencrypted stick amnesty by the force's data controller after the breach got back a haul of 1,100 devices.

David Smith, ICO Director of Data Protection, said:

This was truly sensitive personal data, left in the hands of a burglar by poor data security. The consequences of this type of breach really do send a shiver down the spine.

It should have been obvious to the force that the type of information stored on its computers meant proper data security was needed. Instead, it has taken a serious data breach to prompt it into action.

®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.