BreachExchange mailing list archives

Residents' data lost in stolen council laptops


From: Jon Turner <jjturner () gmail com>
Date: Sun, 23 Aug 2009 11:54:05 +0100

http://www.thewestonmercury.co.uk/content/twm/news/story.aspx?brand=Westonmercury&category=news&tBrand=westonmercury&tCategory=znews&itemid=WeED21%20Aug%202009%2010%3A56%3A52%3A667

RESIDENTS' personal data held by North Somerset Council has gone
missing after laptops were stolen.

It remains unknown whether or not the device on which the confidential
details were held was protected.

The local authority is yet to encrypt all of its mobile electronic equipment.

A total of thirteen council laptops have been stolen over the past three years.

The unitary authority has 701 laptops and all potentially hold files
that may contain personal information.

Details of these unfortunate incidents were revealed only after the
Mercury submitted a Freedom of Information Act request.

The unitary authority also admitted it 'is unable to provide details
of lost or stolen CDs and USB sticks'.

Officials do not maintain records of these and the ICT department
workers are not informed when they are lost.

Figures released by Town Hall officials show that four laptops were
stolen in 2007, the same year as computer discs containing the
personal details of 25 million people were lost by HM Revenue and
Customs.

Concerns were raised at the time that fraudsters could use the
information to obtain credit cards or mobile phone accounts.

Executive member for asset management, Councillor Carl Francis-Pester,
said council staff are personally responsible and face 'disciplinary
procedures' if data is misused.

He added: "We have a strict policy about physical access to systems
and the security of machines.

"Our policy is not to assume absolute security on whatever system we are using."

The council has almost 3,000 PCs including 157 Blackberrys, which are
mobile phones capable of downloading email and other data.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)

Get business, compliance, IT and security staff on the same page with
CREDANT Technologies: The Shortcut Guide to Understanding Data Protection
from Four Critical Perspectives. The eBook begins with considerations
important to executives and business leaders.
http://www.credant.com/campaigns/ebook-chpt-one-web.php


Current thread: