Risk
3/10/2011
04:10 PM
Connect Directly
RSS
E-Mail
50%
50%

N.J. Nearly Sold Used PCs With Personal Data

State computers packaged for public auction contained social security numbers, the names and addresses of children involved in child abuse cases, and other personal information, an audit revealed.

Top 10 Government Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Government Stories Of 2010

Social security numbers and names and addresses of the children involved in child abuse cases were among information left on used PCs that the state of New Jersey readied for sale, according to an audit.

About 80% of used PCs that various state agencies were about to put up at auction contained personal and confidential information, according to an audit (PDF) released this week.

Auditors tested hard drives of computers packaged for public auction and found information that also included names, addresses, and phone numbers of children placed outside of the parental home, and a list of computer sign-on passwords for state employees.

They said they found this type of information on 46 of 58 hard drives tested, or 79% of the PCs, according to the audit, which was done from July 2008 through December 2010.

Auditors criticized officials for the security risks presented by not properly disposing of the information on the computers. "The availability of such confidential personal information and sensitive business information to third parties . . . presents security risks to the affected individuals and State agencies," according to the report.

The problem of properly scrubbing PCs of personal data before sale or re-use is an old one that continues to exist at all levels of government.

At the federal level, NASA released 10 PCs to the public without properly removing sensitive data from their hard drives, according to an Office of the Inspector General report released in December.

Ed Stukane, chief marketing office with IT asset recovery service provider PlanITROI, said in an email that the problem remains persistent because many companies and government agencies don't have formal IT asset disposition policies in place. "As IT assets are retired, the company or government agency should have set policies that address wiping data internally, removing and destroying drives," he said. Alternatively, they can choose a service provider to do asset disposition for them.

Stukane added that if companies try to properly scrub hard drives and find that they can't be wiped clean, they should be removed and destroyed.

To help mitigate these types of situations, he recommended that companies keep track of all IT assets and maintain an up-to-date inventory, as well as have a dedicated plan to assure that assets are properly sanitized before equipment is redistributed in any way.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio