Risk
6/7/2013
12:24 PM
Connect Directly
RSS
E-Mail
50%
50%

Glasgow City Council Fined For Security Lapses

Stolen laptops and repeated cases of unencrypted data top the list of the City of Glasgow's security failings.

The organization that safeguards data privacy in the U.K., the Information Commissioner's Office (ICO) has slapped a £150,000 ($232,000) fine on the Glasgow City Council for failing to adequately protect citizens' data. The ICO has levied the penalty on Scotland's second city using its powers of enforcement under the 1998 Data Protection Act.

The judgment centers on the May 2012 theft of two unencrypted laptops from some of the council's offices, which were in the process of being refurbished. The security breach occurred when an employee placed a key to a safe area into the drawer of a colleague, leaving both devices unprotected long enough to be purloined. One of the devices contained the names, addresses, and in some cases, bank account data, for more than 20,000 individuals.

[ Could the U.K.'s recently vetoed communications monitoring law help prevent crime? Read Will Britain Revive Its 'Snooper's Charter'? ]

This data was unencrypted due to problems with Glasgow's security software, but the ICO maintains that the city should not have allowed its IT supplier to hand out unencrypted laptops to employees. It also points out that staff had asked for -- but not been given -- better-protected laptops, and that managers were aware of a series of recent thefts in the offices. (In fact, an astonishing 74 laptops had gone missing in addition to the one containing sensitive data.) Finally, the ICO's judgment cites the distress suffered by individuals whose personal information was exposed.

The ICO has now served Glasgow with an enforcement notice requiring it to carry out a full audit of all IT assets used to process personal data. It must also arrange for all of its managers to receive appropriate asset management training, and carry out a full check of all of its devices each year and maintain a complete, up-to-date asset register.

"How an organization can fail to notice that 74 unencrypted laptops have gone missing beggars belief," remarked Ken Macdonald, the ICO's assistant commissioner for Scotland. "The fact that these laptops have never been recovered and no record was made of the information stored on them means we will probably never know the true extent of this breach, or how many people's details have been compromised."

According to the ICO, Glasgow has had a history of security problems. In 2010, it was issued with an enforcement notice after an unencrypted memory stick was lost. Macdonald said, "To find out that these poor practices have returned some two years later shows a flagrant disregard for the law and the people of Glasgow."

"The council should be held to account," he added. "The penalty goes some way to achieving that."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
garfage
50%
50%
garfage,
User Rank: Apprentice
6/11/2013 | 10:13:47 AM
re: Glasgow City Council Fined For Security Lapses
Thanks for your observation, Mr Harbridge.
Simon Harbridge, Stone Group
50%
50%
Simon Harbridge, Stone Group,
User Rank: Apprentice
6/10/2013 | 3:41:47 PM
re: Glasgow City Council Fined For Security Lapses
Surely it is time for all public sector bodies to face up to the fact of the ICO's willingness to issue heavy penalties for negligence? If organisations are to avoid facing fines at a time when they can ill afford financial wastage, important steps must be taken to improve IT procurement and disposal processes.

Investing in IT hardware with comprehensive encryption is key: organisations must
approach hardware manufacturers with demonstrable experience in this area, and
those which offer encrypted laptops which meet a variety of security benchmarks, such as CESG approval.

Windows 8 Professional is another great example, now featuring Windows BitLocker as standard for no extra cost, as long as public sector customers procure notebooks and tablets that have Trusted Platform Module (TPM) modules, then they can be encrypted up to IL3 Level Security. This will be more than adequate for the vast majority of local authorities and indeed wider public sector
workers, outside of serious crime and defence.

If public sector bodies adapt a best practice approach to data security upfront then the wrath of ICO fines can be kept at bay.

Simon Harbridge, CEO, Stone Group
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CVE-2014-4511
Published: 2014-07-22
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

CVE-2014-4911
Published: 2014-07-22
The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.