Information privacy has taken several knocks recently. The Nationwide building society lost the account details of eleven million of its customers, whilst reportedly, a large international retailer had similar problems with customer credit card data.
Methods
The methods used by the perpetrators may have been different in each case, but the end result is the same. The customers concerned are severely inconvenienced, with the threat of identity theft hanging over them for years to come.
In the case of Nationwide, the FSA imposed a record fine, but the Information Commissioner's (IC) office did nothing, despite being responsible for overseeing data protection; their rationale being that as the FSA had already fined Nationwide it would be churlish to hit then twice, especially as the customers ended up paying the fine as it is a mutual society.
Perverse
While not disputing that aspect, I should have thought that the IC would have at least insisted on the company disclosing to each of its customers details of their data that had been stolen and to pay for annual credit checks for the next few years. Not so.
Nationwide hid behind the security risk and the IC took this lame excuse at face value. So the criminals may know Nationwide's customer data, but the poor customers, who have ended up paying the FSA fine, have no idea what data of theirs has been stolen. If that is not a perverse situation, then I don't know what is.
Most organisations have secure primary systems, but security falls apart when the data is removed from the secure system and put into the end user computing environment. This occurred at an NHS Primary Care Trust where patient data was downloaded from the secure patient record system to a local workstation hard drive and was then transferred onto a PDA. The PDA was then lost on public transport.
People - not technical
These actions clearly breached the Trust's security policy, but as the person involved was a temporary employee, there was little in the way of sanctions that could be applied. Security is a people, not a technical issue. I have never known a computer make a conscious decision to disclose, or steal data.
We can control the technology, but only manage the people, and therein lies the problem. People will always be the weakest link so we need to design our systems to detect abuse. You will notice that I write detect and not prevent. People will always find a way to circumnavigate security, but if they know that they will be caught it may stop them trying in the first place.
John Mitchell is editor of BCS IRMA's award winning Journal and managing director of LHS Business Control, a corporate governance consultancy that he founded in 1988. He can be contacted at: john@lhscontrol.com, www.lhscontrol.com.