Feeds

Immigration Dept: we have NO IDEA how many people saw asylum-seeker data

Metadata-slurping Oz gummint can't read its own logfiles

Internet Security Threat Report 2014

Here's why Australia's government wants the telecoms industry to do its metadata collection for it: it can't read its own syslogs.

Following an astonishing cock-up earlier this year, in which the Department of Immigration published the private details of thousands of asylum seekers in a statistical publication meant only to release aggregate data, The Guardian Australia made an FOI request to discover the department's response to the privacy breach.

The correspondence includes the advice to immigration minister Scott Morrison that “The department is unable to identify how many people may have downloaded the information.”

In other words, the system logs of the Department of Immigration's Microsoft-based Website apparently don't collect data about hits on individual publications on the site. The best the department could tell the minister is that there were “398 views of the page that included a link to the report”.

Demonstrating that the department's “give us back our document” demand (made to activist and journalist Asher Wolfe in February) wasn't an aberration, the minister is also told that while the offending document had been deleted from the Website, “the department believes that if a person has downloaded or saved the report, they can still access the personal information”.

The Guardian also notes: “A separate FoI request confirms that the department’s analytical service, IBM Digital Analytics, was not given the task of measuring downloads of all file types on the site, which means that the full number of downloads of the document may never be known.” ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.