DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UK: Government personal data handling has improved, says report

Posted on January 19, 2010 by Dissent

Measures put in place by the Government to better protect individuals’ personal data have been successful but more work is needed, according to the first annual internal report due under the new regime.

After a series of embarrassing losses of personal information, including the 2007 loss of discs containing the names, addresses and bank details of 25 million child benefit claimants, the Government conducted a Data Handling Review (DHR).

Read more in Out-Law.com

From the report:

Specific Minimum Measures to Protect Personal Information

  • Identify All Holdings of Protect Personal Data: Achieved – Departments have identified the protected personal information that they or their delivery partners and 3rd party suppliers hold.
  • Handle Data as PROTECT throughout the Delivery Chain: Established and Ongoing – All the DHR mandated measures are routinely being applied to protected personal data while it is processed or stored within departments or their delivery chains.
  • Apply Suffolk Matrix: Established and Ongoing – Training on the correct handling of protected information has taken place and is ongoing in all Departments.
  • Secure Remote Access to Protected Data: Established and Ongoing – Departments have established processes for secure remote access to data using agreed standards and approved products.
  • Protection of Removable Media: Established and Ongoing – Departments have implemented the DHR requirements to encrypt personal information when in transit on removable media.
  • Strong Protection for Unencrypted Media: Established and Ongoing – In situations where encryption is not practical, i.e. full system back-up tapes used for disaster recovery or business continuity, Departments have instituted strong controls and monitoring on their movement, access and storage.
  • Controlled Disposal of Paper & Media: Established and Ongoing – Departments have implemented policies for the secure disposal of media and paper.
  • Review of Measures for Handling Protected Information: Established and Ongoing – Departments have reported on the effectiveness of the DHR measures. Further compliance testing is ongoing.
  • Penetration Testing of ICT Systems: Established and Ongoing – Departments have conducted more than 650 Penetration Tests, and continue to work to ensure that testing is in place for existing and new systems.
  • Information Risk Awareness Training: Established and Ongoing – All Departments have trained those handling personal information in IA awareness. In the majority of cases departments have chosen to go further and extend this training to all their staff.
  • Define Access Controls to Protected Information: Achieved – Access rights to protected personal data have been defined to, where possible, minimise the number of records viewed unnecessarily.
  • Log & Monitor Access to Protected Information: Established and Ongoing – Managers are now required to check on a regular basis the logged activity of data users accessing protected personal information.
  • Have a Forensic Readiness Policy: Achieved – Departments have produced forensic readiness policies describing processes for preserving and analysing data generated by an ICT system that may be required for legal or management purposes as part of the information asset audit process.

    See:

    • The report (30-page / 850KB PDF)
    • The Data Handling Review (46-page / 218KB PDF)

    Related:

    • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
    • Toys “R” Us Canada customers notified of breach of personal information
    • Gatineau gymnastics centre warns members of possible data breach
    • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
    • Confidence in ransomware recovery is high but actual success rates remain low
    • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
    Category: Commentaries and AnalysesNon-U.S.Of Note

    Post navigation

    ← AU: National E-Health Plan Plagued by Privacy Concerns
    (follow-up) 4 North Texans accused of cybercrime conspiracy arrested in Mexico →

    Now more than ever

    "Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

    Search

    Browse by Categories

    Recent Posts

    • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
    • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
    • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
    • Amendment 13 is gamechanger on data security enforcement in Israel
    • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
    • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
    • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
    • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
    • The Case for Making EdTech Companies Liable Under FERPA
    • NHS providers reviewing stolen Synnovis data published by cyber criminals

    No, You Can’t Buy a Post or an Interview

    This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

    And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

    Want to Get Our RSS Feed?

    Grab it here:

    https://databreaches.net/feed/

    RSS Recent Posts on PogoWasRight.org

    • Data broker Kochava agrees to change business practices to settle lawsuit
    • Amendment 13 is gamechanger on data security enforcement in Israel
    • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
    • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
    • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

    Have a News Tip?

    Email: Tips[at]DataBreaches.net

    Signal: +1 516-776-7756

    Contact Me

    Email: info[at]databreaches.net
    Security Issue: security[at]databreaches.net
    Mastodon: Infosec.Exchange/@PogoWasRight
    Signal: +1 516-776-7756
    DMCA Concern: dmca[at]databreaches.net
    © 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.