Unease and slack practice

November 2007
Computer Weekly;11/27/2007, p18
Trade Publication
The article comments on the British HM Revenue & Customs' (HMRC's) practice of sending unencrypted, CD-based files on millions of child benefit claimants that put millions at risk of identity theft. It is commented that the direct cause of the breach is the lack of supervision of staff activities at HMRC. It is stated that the HMRC incident shows that government assurances about the security of citizen data may mean little or nothing in practice.


Related Articles

  • Banks should ask safer questions. Shorten, Brian // SC Magazine: For IT Security Professionals (UK Edition);Aug2006, p21 

    The author discusses the need for banks and financial services companies to ask for safer security questions aside from asking about the maiden name of the client's mother. He finds it surprisingly easy to find out the maiden name of someone else's mother from documents and databases. He calls...

  • Greater data flow could deliver £235m in benefits.  // Utility Week;2/11/2005, Vol. 23 Issue 3, p4 

    Reports on a consultation on measures to increase the flow of information on offshore gas production by the British Office of Gas and Electricity Markets. Options to be considered on an initiative requested by the agency; Factors that led to the benefits of the project estimated by Barclays...

  • SECURITY MEASURES RELATED WITH DATA PROTECTION. A PRACTICAL APPROACH: THE IMPORTANCE OF THE ORGANIZATIONAL MEASURES. Pérez, Joaquín // Proceedings of the International Conference on Information Techn;2007, Vol. 1, p19 

    The author describes in the document his own experience more than ten years in the field of data protection security as data inspector at the Spanish Data Protection Agency. In the presentation, the author speaks about a collection of a set of files that have been investigated to illustrate the...

  • Integrity Star Property.  // Network Dictionary;2007, p248 

    A definition of the term "Integrity Star Property" is presented. It refers to a situation where a user cannot read data that have a lower integrity level than their own.

  • Protecting Employee Information. PERRY, PHILLIP M. // American Nurseryman;2/15/2006, Vol. 203 Issue 4, p26 

    The article offers tips on protecting employee data to avoid identity theft. Physical protections must be established which include locking up documents with sensitive data and limiting the data printed on pay stubs and pay checks. Around computerized database, security experts suggest multiple...

  • A Compressed Anti IP Spoofing Mechanism Using Cryptography. Gavaskar, S.; Ramaraj, E.; Surendiran, R. // International Journal of Computer Science & Network Security;Nov2012, Vol. 12 Issue 11, p138 

    Internet becomes a backbone of every sector, which gives essential information of each domain like education, concerns, entertainment etc. Data stealing and data theft is the well known thing in networks. IP spoofing is one of the techniques of data stealing in the form of malicious IP address....

  • Data Leak Fatigue. Heiser, Jay G. // Information Security;Apr2008, Vol. 11 Issue 3, p18 

    In this article, the author discusses the increasing number of data leakage cases. According to the author, the scenario puts individuals at huge risk of identity theft. He claims that data leakage occurs both in commercial firms and government agencies. He hopes media encryption will be...

  • Safety in Numbers. Britt, Phillip // Information Today;Feb2006, Vol. 23 Issue 2, p32 

    This article offers companies some tips for protecting themselves and their customers from card fraud and identity theft. Companies are advised to install and maintain a firewall configuration to protect data and all systems, use and update antivirus software regularly, and develop and maintain...

  • THE GROWING WAVE OF DATA BREACH LITIGATION. HORST, ROBERT T.; MULLEN, JOHN F.; ROSENBERG, MARK H. // Risk Management (00355593);Dec2009, Vol. 56 Issue 10, p40 

    The article discusses the trend in growing data breach litigation in the U.S. There was a 47% rise in data breaches in 2008 than 2007 based on the Identity Theft Resource Center (ITRC) report. An overview of the decision of the U.S. Court of Appeals for the Ninth Circuit in the data breach class...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics