Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Government Privacy IT News

Losing Personal Info On A Laptop Could Get You Charged 199

E5Rebel writes "The UK's data protection watchdog has called for legislation that would punish corporate or government officials with access to the public's personal data ... who lose it. Unencrypted laptops with this personal information which are lost or stolen will see their owners facing criminal charges. 'HM Revenue and Customs is among the organisations that have recently suffered high profile data security breaches as a result of laptops being lost or stolen. The HMRC laptop containing taxpayer data was encrypted - but other organisations have often failed to encrypt their machines.'"
This discussion has been archived. No new comments can be posted.

Losing Personal Info On A Laptop Could Get You Charged

Comments Filter:
  • About Bloody Time (Score:5, Insightful)

    by ickoonite ( 639305 ) on Monday November 19, 2007 @06:14AM (#21405677) Homepage
    Might make these idiots think before going out on a piss-up on the way home and taking the laptop with them, then losing it. Legislation like this - which actually takes people's privacy seriously and does something about it - is something we could use more of. And I don't normally hear myself clamouring for new law...

    :|
    • by FredDC ( 1048502 ) on Monday November 19, 2007 @06:33AM (#21405771)
      I agree if evidence indicates that they were fully aware of the risks involved, and what steps could/should be taken to prevent it from happening. In that case they should be held fully accountable for their actions and allow the people who's data they lost to stone them or something!

      However, I believe a lot of the cases where sensitive data is lost, happen because the person losing them wasn't educated enough about the risks involved and the security needed to lower the risks. In this case their employer is fully responsible and they should be held fully accountable for their actions. By paying huge sums of money to the people who's data they lost for example!

      Countries should extend exisiting laws and create new ones that make this a very serious crime, as the implications of losing sensitive data can be quite tremendous to the person who's data is lost in today's world.
      • by PrinceAshitaka ( 562972 ) on Monday November 19, 2007 @07:19AM (#21406017) Homepage
        Ignorance should not be a defence in crimminal procedings. Especially when related to the prosecution of goverment pesonell.
        • by Anonymous Brave Guy ( 457657 ) on Monday November 19, 2007 @07:45AM (#21406131)

          The problem with the whole "ignorance is not a defence" argument is that, as convenient a sound-bite as it makes, it's still an unreasonable cop-out.

          No-one knows what every law in the country that applies to them says. Even if they did, many people could not understand the legalese without assistance. There have been demonstrations that show that even MPs who approve our legislation can't complete their own tax return correctly. Our own government frequently fails to follow its own laws because some official didn't know what some other official was doing — and that's their full-time job!

          It may be a legal convenience to say that ignorance is not a defence, but ethically it is a very dubious principle if it isn't matched with an effective education policy that makes it a reasonable assumption that everyone should know and understand all the laws that apply to them. If you construct a system where no-one can know it, and then say that not knowing it is no defence, then you are simply criminalising arbitrarily, and that is universally the mark of a legal system gone too far.

          • It may be a legal convenience to say that ignorance is not a defence, but ethically it is a very dubious principle if it isn't matched with an effective education policy that makes it a reasonable assumption that everyone should know and understand all the laws that apply to them.

            If you're getting into a particular specialised line of business then it's your responsibility to do your homework, get advice etc pertaining to it[1]. Likewise when making a major acquisition, such as a house - and that's the mos

            • Ignorance as a defence is invalid because it's impossible to disprove it; anyone couldclaim not to know murder's illegal.

              I understand why the legal system adopts the position it does. It is, like much in law, a pragmatic concession. That doesn't make the principle right, though.

              As I said, if you want to adopt such a position, it is only fair to institute educational policies such that people can reasonably be expected not to be ignorant. It's interesting that you say in one paragraph that "everyone knows shoplifting is illegal", yet in the next that "anyone could claim not to know murder's illegal". Sorry, but you can't h

        • And when data is cached in a DLL or cache directory? There are lots of ways to scoop data out of a laptop that isn't necessarily encrypted, but isn't in an obvious place either. I'm virtually certain that such a law could be used to prosecute virtually anyone whose laptop is stolen.

          Not that gov't personnel should be allowed to bring data in the clear home with them, but we have to recognize that such a law could be grounds for gross abuse.
    • Re: (Score:2, Insightful)

      by diersing ( 679767 )
      To really enforce it, it has to become part of the employment agreement. I for one, after reading that human error not resulting in bodily harm could lead me to jail would pause.... and ask for danger pay. After all, with risk comes reward.

      But the better solution would be technical and prevent any ONE user for gathering personal data on more then X number of people. There is no valid reason a user should be walking around with a copy of the DB with personal data in it. If anything, it should be but on a

    • The issue is we are dealing with sensitive data, so I can see the reasoning behind the need to punish. On the other hand its not always easy to make the difference between incompetence and malice. If the computers they are using are their professional PCs, then the computers they use should:
      - have encrypted file systems
      - password access for logging into the computer, after power-up, wake-up and screen-saver deactivate

      If they are their own computers then either they should not b
  • by StarfishOne ( 756076 ) on Monday November 19, 2007 @06:18AM (#21405689)
    ..that a group of people who want to know more and more personal details about you, especially in the last 6 years,.. are now coming up with legislation that should help to take the privacy of people seriously.
    • This information worths more when it is only in THEIR possession, or when they got PAID for it.
      Information stolen from them means loss they want to mitigate.
      Coincidentally, this is to your own benefit as well.
      • Don't get me wrong: I'm not stating that there are no benefits from legislation like this. Just that it's has a 'two opposite thoughts in ones mind' kind of feeling to it.
    • by vidarh ( 309115 )
      Different government agencies have different agendas. It's not like the government is one cohesive whole.
    • What's so odd? They've collected your data and now they want to take good care of it.
  • by BadAnalogyGuy ( 945258 ) <BadAnalogyGuy@gmail.com> on Monday November 19, 2007 @06:19AM (#21405697)
    I'm all for hardening our security systems in order to both prevent these types of accidents in the first place and to minimize the impact of such accidents in their inevitable occurences. I can't think of any reason a laptop would need to carry that sort of data, much less have it contained on the hard disk in an unencrypted filesystem.

    But what I can't fathom is the animal-like need for vengeance against the poor government employees who lost the data as the result of one of these accidents. Unless we can show that the person was deliberately taking the information off-line and then staging the theft, how can we possibly in good conscience ruin this person's life just because he forgot a rule. These aren't the Queen's guards, we're talking about. These are people who work for the government (take that in any way you want).

    Why are we not holding banks liable for having a system that encourages identity theft by making it as easy as stealing a laptop? Or holding wallet makers responsible for not securing wallets with anything stronger than a clasp? The reason is because we realize that there are limits to the abilities of these companies that can't be stretched much further. Government employees are mentally stretched to their breaking points. How dare we threaten them with jail time when we can't expect any more from them in the first place?

    Might as well squeeze blood from a stone.
    • by FireHawk77028 ( 770487 ) on Monday November 19, 2007 @06:28AM (#21405745)
      Giving your identity information to a bank is optional, you can choose not to do business with that bank. You cannot choose not to provide that information to the US Government. Tax dollars pay for that government. Encrypting hard drives doesn't require any special abilities. Maybe a couple of brain cells.
      • Re: (Score:2, Funny)

        by Anonymous Coward
        Encrypting hard drives doesn't require any special abilities. Maybe a couple of brain cells.

        Maybe things are different over on that side of the pond.
      • Re: (Score:3, Funny)

        by Anonymous Coward
        Giving your identity information to a bank is optional ... You cannot choose not to provide that information to the US Government.

        I can and do actually, when I chose not to visit your silly country.
      • Re: (Score:3, Insightful)

        by mrjb ( 547783 )
        Giving your identity information to a bank is optional, you can choose not to do business with that bank. So which bank allows you to do business with them without providing them with your ID information? Or would you propose to work only with cash? How would you consider your chances of finding a job if you tell all prospective employers 'I only accept cash'?
        • by julesh ( 229690 )
          So which bank allows you to do business with them without providing them with your ID information?

          As I understand it, there are a few such banks operating out of Switzerland, and some in the Cayman Islands, and a few others in odd places like those. Of course, they'll charge you quite a bit for the privelege, but if you really *are* concerned about people knowing who you are, there are options.
      • You cannot choose not to provide that information to the US Government.

        Not even if you live in the UK.

    • Why are we not holding banks liable for having a system that encourages identity theft by making it as easy as stealing a laptop?

      The FSA is doing precisely that. Nationwide got fined about a million pounds earlier this year. http://www.thisismoney.co.uk/saving-and-banking/article.html?in_article_id=417453&in_page_id=7 [thisismoney.co.uk]

      I know from personal contacts that this woke the banks up pretty sharply (Nationwide are small and were the first: the FSA have told the big four that they'll get far fiercer treatm

      • In practice the big four have been quite careful, and have tended to use fairly good encryption: it's no accident that the former building societies have found things harder

        Sorry, I'm not sure I follow you. Pretty much all of the big names have been caught with their pants down failing to follow even basic security procedures, such as shredding documents before chucking them in a waste bag out the back of the office or restricting employee access to privileged personal data about customers. These failings have been repeatedly highlighted by consumer advocacy groups and critical media. I'm not aware that any groups within the financial sector have a particularly good record h

        • by igb ( 28052 )
          The big four have decent procedures, and the failures are individual branches. Reprehensible, yes, and a problem for the consumer, yes, but fixable by enforcement. Nationwide got clobbered because they didn't have the processes in place: even if you followed the rulebook to the letter, it still wouldn't be good enough. Fixing those sorts of things is harder.
    • by Dr_Barnowl ( 709838 ) on Monday November 19, 2007 @06:50AM (#21405851)
      In the modern world, people really need to learn more about data hygiene and security. If criminal charges are what it takes for large organizations and also the general public to become more serious about the routine security of information, then perhaps this is not such a bad thing.

      A couple of examples ;

      My wife wanted to use my credit card (she doesn't have one) to pay the fees for a educational conference. The conference organisers had a system for collecting payment ; just email all your credit card details (in plaintext) to the secretary! She looked a bit surprised when I refused. When I explained that it would be like writing my card information on a postcard, with a postal service composed of, well, anyone, who would be at liberty to take "photocopies" of the postcard anywhere along it's journey, she was a little more understanding. (I made her telephone the person concerned instead). Perhaps if the iconography of email programs was more "postcardy" instead of "envelopy", this would happen less.

      Our office VPN is secured at the concentrator by two-factor authentication. Each user is issued an RSA SecureID token. Last year, they issed the PIN correctly ; the administrator pushes a button and says "NOW" and you remember the first four digits the token is showing - and then you are only person who knows it. This year, they preset them all and mailed them out. Email, that is. In plaintext. This undermines the basic security of the system ; anyone who gains access to those emails now has a list of PINs, most people clip them to the same lanyard as their security pass, identifying the token user. Or even easier, they can do what I did, walk into the office, say "Hi there, can I have my new token...." only to be waved towards the table where they ALL sat, in named envelopes, without my ID even being checked. And this is from people who are supposed to know about information security.

      Hopefully the stick of criminal penalties will be wielded diffidently. But people have to shift their perceptions ; data on paper is treated with reverence and locked in a safe, when the data on the computer is left lying around for literally anyone to get hold of. Perhaps this attitude comes from the ease with which computers generate the data in the first place ; it feels cheap and thus "disposable". Which seems silly to a person who knows that a properly managed digital signature is MUCH more secure and reliable than its paper equivalent, but is counter-intuitive to anyone else who still thinks the gold standard is a notary.
      • by afidel ( 530433 )
        That's an especially crappy use of SecureID! SecureID allows for the user secret to be just about anything so any sane installation uses your companies normal password rules and then adds the SecureID on as an additional security layer. Using a simple PIN is just kind of stupid.
      • Perhaps if the iconography of email programs was more "postcardy" instead of "envelopy", this would happen less.

        Probably not. It's not like putting a snail-mail document in an envelope renders it invulnerable to interception. Any postal employee with a sufficient lack of gruntles would be able to read anything you send through the mail via a hacking technique known as "opening the envelope".

        So why doesn't mail theft happen more often? Because letter carriers are penalized if they mishandle the materials
        • by Ajehals ( 947354 )

          Any postal employee with a sufficient lack of gruntles
          Is that any postal employee with a lack of scruples, or any disgruntled postal employee? I assume that as disgruntled means malcontent a lack of gruntle would be a lack of contentment, but plural?
          If you combine scruples and gruntles we could have scruntles or even gruples. Both seem to work, I'm sure employers would prefer employees with scruntles over ungrupulous ones.
          It made me giggle anyway.
    • But what I can't fathom is the animal-like need for vengeance against the poor government employees who lost the data as the result of one of these accidents.

      This is the UK. Typically, unless the employee is criminally negligent the liability would fall on the employer even if the employee had broken the employers rules - e.g. leaving the laptop unattended in a car.

      The employer will be expected to take reasonable steps to prevent data loss as a result of carelessness of employees - typically this would mean
    • by Aliks ( 530618 ) on Monday November 19, 2007 @07:35AM (#21406097)
      I disagree.

      The government department has the responsibility for making sure the systems are secure enough for the data they are processing. That includes providing encryption on laptops that process privileged data.

      If the employee turns encryption off, or uses a bog standard laptop for convenience when they should have used an approved hardened laptop, then the employee should face the consequences. Too many times employees put their own convenience above the public, or try to say they are too busy to find out what kind of obligations they have when handling confidential data.
    • Why should we? (Score:5, Insightful)

      by Anonymous Brave Guy ( 457657 ) on Monday November 19, 2007 @08:00AM (#21406207)

      Why are we not holding banks liable for having a system that encourages identity theft by making it as easy as stealing a laptop? Or holding wallet makers responsible for not securing wallets with anything stronger than a clasp? The reason is because we realize that there are limits to the abilities of these companies that can't be stretched much further. Government employees are mentally stretched to their breaking points. How dare we threaten them with jail time when we can't expect any more from them in the first place?

      Perhaps they should have thought of that before legally compelling me to disclose sensitive private data that could be used to ruin my life if it was abused or fell into the wrong hands?

      If the situation is reversed, and a member of the public fails to follow procedures that have been shown to be too complicated for the average citizen to get right, the government has no trouble with imposing instant fines instead of allowing people to fix honest mistakes.

      I have absolutely no sympathy for the government here. They make the rules. No-one is forcing them to make laws like this, and no-one is forcing anyone to work for departments with lax security. If you make a pact with the devil, expect to go to hell.

  • by Slashidiot ( 1179447 ) on Monday November 19, 2007 @06:21AM (#21405707) Journal
    I tend not to worry too much about my personal data, but I understand why some people do. If somebody is stupid enough to loose (or get stolen) a computer with other people's data in it, s/he should have to face the consecuences. I guess at some point anybody who is given other people's personal data should have signed something, taking responsibility of their acts.

    I'm not saying the punishment should be high, but just as killing someone by not being careful enough is homicide, I think this same idea should be applied in this case.

    In any case, if the loss of data has been purely accidental, with no lack of carefulness by the perpetrator, there should be no punishment at all.
    • Once there is any sort of `punishment' (ie: a fine, maybe) involved, folks just won't report things as lost or stolen. After all, why pay a fine when you can claim there was no data on the laptop when it accidentally got crushed by a trash compactor? If and when the data surfaces, there are always other vectors the data could've leaked through.

      Also, how is losing a laptop with data different from having stupid security (or a stupid security bug) on a website or server?
    • Like the average government employee knows anything about encrypting hard drives... who the heck issued them a laptop in this condition? It is very likely that the person with this data is someone just like your mom(govt hires quite a number of women). You want them thrown in jail for this?
  • Enforcement? (Score:5, Insightful)

    by afidel ( 530433 ) on Monday November 19, 2007 @06:52AM (#21405861)
    How do they propose to enforce this. I would bet damn near 100% of data breaches are self reported by the losing party. If you are suddenly going to face criminal charges I bet it will be a damn rare case where thefts actually get reported. So the statistics will show that data loss is at an alltime low and yet people will actually be at MORE risk due to the fact that companies that would have previously reported the incident and paid the couple hundred thousand for identity protection for a year or two will now keep things quite. Beyond which I also know from published studies that lost information devices have resulted in basically no known identity theft but lack of shredding (dumpster diving) and unsecured databases have led to a heck of a lot of cases.
    • Re: (Score:3, Interesting)

      by bcattwoo ( 737354 )

      How do they propose to enforce this. I would bet damn near 100% of data breaches are self reported by the losing party. If you are suddenly going to face criminal charges I bet it will be a damn rare case where thefts actually get reported.
      And how will they prove that unencrypted data was present on the now missing laptop anyway?

      "I admit my laptop was stolen last night, but...I...uh had just wiped the hard drive to downgrade to XP. Yeah, that's it."
    • by MobyDisk ( 75490 )
      They need to start rewarding the whistle blowers instead of punishing them. Not a week goes by on Slashdot where someone isn't fired, sued, or arrested for revealing a security breach. I worked at a company where I found credit card numbers on a public share folder, and after the moron who put them there refused to do anything, I took it to the company security head. Instead of taking me into a dark room and asking me why I was browsing the public share folders, I was given an award and $50 gift certific
  • Good idea (Score:5, Interesting)

    by gweihir ( 88907 ) on Monday November 19, 2007 @06:57AM (#21405879)
    I think this is a good idea. Of course as soon as due diligence was used (encrypted drive, reasonable system administration, firewall, malware scanner if it is Windows), it should not be criminal anymore. But this will get people to finally think about what they have to do to ensure minimal security standards. About time.
    • Re: (Score:3, Insightful)

      by sakdoctor ( 1087155 )
      Wouldn't due diligence specifically exclude using windows?
      • by julesh ( 229690 )
        Wouldn't due diligence specifically exclude using windows?

        Err... no. There are perfectly good, secure, disk encryption schemes available for Windows that should make it impossible for anyone to access the data (save via user incompetence).
    • Re:Good idea (Score:4, Insightful)

      by totally bogus dude ( 1040246 ) on Monday November 19, 2007 @08:00AM (#21406201)

      Agreed. It's not that people don't think about it; I work in IT, and we think about it all the time. But it's very difficult to actually enforce meaningful security if nobody understands the point of it. It simply gets seen as a hassle imposed by IT because they're control freaks trying to make themselves look important to the rest of the organisation. The top management doesn't care; all they hear is the hassle it's causing their Executive Directors when IT won't let them log on to the VPN while they're at the airport because they left their RSA token at home.

      Unfortunately, if you set up good security and the users don't understand it, they'll circumvent it: the private key used to unlock the laptop's encrypted drive will be stored on a USB stick with the laptop, along with a sticky note with the user's password and their RSA SecureID token. So not only do people resent you when you try improve security standards, but they actively seek to undermine it. Even a single crappy password like "Wednesday1" is better than having everything you need to access sensitive data neatly packed with the laptop.

      Therefore, to get proper security, everyone needs at least an intermediate level understanding of computer security. That's a massive undertaking for most organisations, where people's main job function isn't anything to do with computers. Most people don't want to understand computers at all, they just want to use them. Kind of like telephones: most people don't even consider for a moment if their phone is secure or not, and have no interest in learning how the call they make from their office phone gets from their desk to the other side of the country.

      Really, before you even have a shot at putting in place meaningful, consistent security, you need a long-term commitment from all levels of management to establish and maintain strong security and train the staff to use it properly, even when it causes inconveniences. Given how much trouble we have getting people to use the records management system properly, this actually seems like a very high mountain to climb.

      The possibility of being embarrassed because of data theft isn't anywhere near a strong enough motivation for most organisations. Therefore, legislation like this is probably a good move -- though I think it should apply to any organisation that collects personal information, government or not. But you have to start somewhere.

      Furthermore, it shouldn't require actually losing data before there's a possibility of punishment. One should be able to report agencies and companies that aren't taking their duty of care seriously, and report them. Otherwise it's still easier for a lot of organisations to say "it won't happen to us" and only pay lip-service to information security. So, if your bank is using dubious client-side "security", report them!

      There'd be a lot of short-term pain, but long term gain. It might even slow down the pace at which computers take over the world, and maybe us folk that program and administrate them can catch the fuck up with what users are expecting from it all.

      • by gweihir ( 88907 )
        I completely agree. You not only have it right in every point you mention, you also mention all the important points!

        It also applies on a bit a different level: Computers need competent administration. If users self-administrate, they need to aquire at least an intermediate level of understanding, of what their system does.
      • ...It simply gets seen as a hassle imposed by IT because they're control freaks trying to make themselves look important to the rest of the organisation...

        But, many times they -are- a bunch of control freaks trying to make themselves look important. Face it, IT and security aren't an end in themselves. They're a means. They're the support function. If that support function interferes with the mission (ie: to make money, etc.) then it's the support function that must be re-thought, not the mission.
  • by Opportunist ( 166417 ) on Monday November 19, 2007 @07:19AM (#21406013)
    It's one thing to leave the notebook running on your passenger seat and another one having it taken from you at gunpoint. What I'd expect to happen is this:

    1) Create sensible security rules that should keep the data safe, even when on a notebook. Current notebooks are fairly easy to secure to the point where theft of the notebook doesn't mean theft of data. That includes, but is not limited to, choosing secure hardware and software, limiting laptop use to work, reducing user rights to the minimum for operation.

    2) Train people and give them a fairly heavy "or else" to follow those rules.

    3) If they follow the rules and still have their notebook stolen, no problem. If they're careless, throw the briefcase at them.

    What I want to see is the government as a whole to react to the threat. Not finding a scapegoat to take the blame, sack him and go on with the same shit.
    • 1) Create sensible security rules that should keep the data safe, even when on a notebook.
      Proposed draft of said rule: do not, ever, put sensitive data on a notebook. Or you're fired.
  • If some official loses public data, punish them by publishing their data. All of it. And in the first year if they change their passwords and PINs, publish the new ones too.

    This would be a useful deterrent, as well as an object lesson for the "you have nothing to fear if you have nothing to hide" anti-privacy muppets.
  • by zappepcs ( 820751 ) on Monday November 19, 2007 @07:23AM (#21406039) Journal
    Here we go again, as mentioned, we are trying to enact laws that punish the wrong person(s). The fact that they have personal data on a laptop that is not physically secured is a sign that the organization that they work for is corrupt or inept. Please please please let's look at how such incidents happen, then punish the culpable, not simply state that the bag man is going to hang.

    I believe that you will find that in more than 90% of such cases, the end user was following the given policies for the data they were using. We ALREADY have laws for how that data is to be treated. Breaches of those laws must be processed before we look for new laws. I cannot cite any specific regulations, but financial institutions and basic corporations now have legal requirements on how to treat privacy information. SarBox law in the US, and I'm sure that the UK has similar regulations. The fact that the information is getting 'lost' to someone in the public is not indication of criminal activity, but lax processes in the organization for which they work. Laptop theft is rampant, some would say, because they are easy to take. Often because the theft is easy, and done by someone who has no idea what is on the laptop hard drive.

    So, lets just have guidance on how to process the legal side of such breeches. Find out what safeguards were in place, if they were being used, if the end user was obviously ignoring them etc. There is seldom need for new laws, simply better processes or guidelines for using what currently exists. Remember, tax evasion was used to get some mobsters? Misuse of government equipment? How about dereliction of duty? There are tons of ways to punish someone without creating new laws. I sometimes think that people would enact a law to prohibit large turds if it would stop the problems with the outdated treatment plants. Look at all the silly laws that are still on the books. Do we really need a new law that will be useless in 5 years?

    Politicians and the Internet.... oil and water.
    • Here we go again, as mentioned, we are trying to enact laws that punish the wrong person(s). The fact that they have personal data on a laptop that is not physically secured is a sign that the organization that they work for is corrupt or inept. Please please please let's look at how such incidents happen, then punish the culpable, not simply state that the bag man is going to hang.

      The summary is very clear that the charges would be against the person who lost the laptop, rather than the organization that lost it. The article seems to be slightly less clear about this, so it may not actually be the case.

      Information commissioner Richard Thomas and his deputy, David Smith, revealed to members of eth House of Lords they had called on the Ministry of Justice to make it a criminal offence "for those who knowingly and recklessly flout data protection principles" where there are serious c

    • Re: (Score:3, Interesting)

      by jimicus ( 737525 )
      You ever heard the saying "In the valley of the blind, the one-eyed man is king"?

      It applies within governments as well as anywhere else. Frequently more so, as governments tend to outsource systems development to outside companies - who sometimes work with departments to turn requirements into something which can be sensibly implemented, but as often as not nod their heads and implement whatever they're told.

      I can easily imagine how such a system could come into being.
      • A manager who couldn't do something on
    • by julesh ( 229690 )
      SarBox law in the US, and I'm sure that the UK has similar regulations

      No, thank God, the UK does *not* have anything similar to Sarbanes-Oxley. The only real requirement we have is the Data Protection Act, which requires only that "appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data." The law offers little or no means to identify what an "appropriate technica
  • by petes_PoV ( 912422 ) on Monday November 19, 2007 @07:28AM (#21406059)
    Physically losing a laptop, is not in itself a crime. The negligence aspect of containing confidential data on an unsecured device is what turns stupidity into an offence. A logical extension would be to view a lack of "protection" to internet attacks/theft in a similar way.

    If a PC (or laptop, or a server)that holds confidential data is audited and shown to be vulnerable to external attack, then this is just as negligent as leaving unprotected data open to theft and should be treated in the same way.

    • by ranulf ( 182665 ) on Monday November 19, 2007 @08:40AM (#21406425)
      Physically losing a laptop, is not in itself a crime. The negligence aspect of containing confidential data on an unsecured device is what turns stupidity into an offence.

      Securing and encrypting the drive is a job for the organisation's IT infrastructure team, not the end employee. Given that government officials are generally not the most tech-savvy people around, it seems crazy to punish them for something that should already be pre-installed on their machine when they receive it.
  • by pyr3 ( 678354 ) on Monday November 19, 2007 @07:49AM (#21406155)
    The problem that I see with this is that government agencies (or corporations) aren't being penalized. I don't think that the employee can be blamed when the corporate policy allows the employee to have sensitive information on their laptop *and* take the laptop off-site.

    Let's face it. I'm sure *a lot* of employees don't even know much about encryption software, let alone which ones to use and how they work. I don't see the sense in blaming an employee that "should have known better" when it's possible that the company didn't provide the tools/training to allow employee to know what to do.

    That being said, the employee has some responsibility to bear as well. If they take it to a restaurant and accidentally leave it there, that's their fault. If the company *does* have a policy about encrypting private information and the employee doesn't follow it, then it's the employee's negligence. If the company says, "No private data offsite," and the employee leaves with it on his/her laptop. It's that employee's own fault.
    • Heck these employees probably don't even have administrative rights on their machines and couldn't install encryption software if they wanted to.
    • The problem that I see with this is that government agencies (or corporations) aren't being penalized. I don't think that the employee can be blamed when the corporate policy allows the employee to have sensitive information on their laptop *and* take the laptop off-site.

      Corporations and government agencies are comprised of people. And it is people who do the daftest things when it comes to security. In fact, 95% or better of security problems involve the USER carelessness for the problem.

      Let's face i

  • And in other news... (Score:3, Interesting)

    by seanyboy ( 587819 ) on Monday November 19, 2007 @07:59AM (#21406187)
    So, The number of lost laptops is going to drop to zero, and the number of stolen laptops (stolen, no doubt by Middle Eastern gentlemen of unspecified heights) is going to go up.

    If they're going to enforce anything, they should enforce encryption on the laptops. Punishing minor officials for honest mistakes is a pretty stupid thing to do.
    • The law states that businesses, government (except The Home Office of course) have to take reasonable precautions. Whether the laptop the data is on is lost or it's stolen doesn't matter. It's the lack of precautions which matter. Particularly when it's as simple as:

      http://www.truecrypt.org/ [truecrypt.org]

       
  • by blcamp ( 211756 ) on Monday November 19, 2007 @08:14AM (#21406279) Homepage

    Ok... hypothetical (but realistic) situation:

    What about if your job calls for you to take a laptop that you don't necessarily "want", but it's now part of your job (as a travelling salesman, a consultant, or whatever)? And what if the lunkheads who image that laptop don't bother to put any encryption or other data protection software on it? And you're not allowed to add any "unauthorized software" to help protect yourself?

    Guess what? Your employer has made you the IT equivalent of a soft target.

    Under the above scenario, it seems enormously unfair to become subject to criminal charges due to the negligence of your employer. Easy for all you critics to say "go get another job"... while that certainly would be the ultimate solution, that's hard to do in an economy where consolidation and right-sizing still rule the day.
    • Does UK law have a defence that boils down to not being a free agent, i.e. you had no influence over the events?
    • by Fzz ( 153115 )
      What about if your job calls for you to take a laptop that you don't necessarily "want", but it's now part of your job (as a travelling salesman, a consultant, or whatever)? And what if the lunkheads who image that laptop don't bother to put any encryption or other data protection software on it? And you're not allowed to add any "unauthorized software" to help protect yourself?

      Then my understanding is that the data protection law would not place the blame on the person carrying the laptop, but on the per

  • if they wheeled a filing cabinet full of records out into the parking lot and left it to be stolen then I would expect them to be punished, I would expect this to be no different.

    sounds entirely reasonable to me.

    and of course, mandated encryption as well.
  • Enforcement is expensive, the amount of legislation this government has past is amazing, any problem they legislate, not look at the actual problem. Yes this is (partially) true of all governments, but it's particularly true with this one.
  • Government-regulated common sense and responsibility. I agree with it, but it seems unnecessary. I mean, this people are supposed to be professionals.
  • Sorry but humans lose things.

    You need to design things assuming that people will lose things.

    Humans are not perfect.
  • When private information is lost, you want it reported *immediately*, so you can minimize the impact. If you penalize the person who lost a laptop, he will spend more time trying to find it and/or hiding the loss. This is a bad thing. (tm)
  • 1. Make Law requiring people hand over encryption keys.
    2. Make Law requiring all laptops with personal data be encrypted.
    3. Decrypt laptops.
    4. ?
    5. Send them to Prison!
  • Charging someone who negligently loses a laptop with personal information is understandable. I can even see charging them if they leave it in a place where it can easily be stolen, like leaving it in a car overnight. But, what if someone breaks into a person's house and steals a laptop? I envision this law becoming a convenient way of making someone into a scapegoat....

A committee takes root and grows, it flowers, wilts and dies, scattering the seed from which other committees will bloom. -- Parkinson

Working...