title for Data Losses note
home | about | site use | resources | publications | timeline   spacer graphic  
blaw

overview

networks

tapes

laptops

sale

law

prevention

responses

studies

costs



















related pages icon
related
Guides:


Security &
InfoCrime


Consumers
& Trust




related pages icon
related
Profiles
& Notes:


ID Theft,
ID Fraud

















section heading icon     laptops and other devices

This page highlights recent examples of large scale exposure of sensitive consumer information through loss or theft of laptops and other devices.

It covers -

     introduction

Why is exposure of data through theft or misplacement of personal computers (desktop machines, laptops and PDAs) and other devices, including servers, an issue?

One reason is that those devices often contain substantial amounts of sensitive information in a readily usable form and without protection such as encryption of individual files or password protection to access the device. It is much easier to walk out of an office or a cafe with someone's laptop than it is to purloin 20 metres of paper files.

Another reason is that the characteristics that make laptops, PDAs and mobile phones so valuable to users - their portability, adaptability and potential to signify the owner's status - are characteristics attractive to thieves. Much theft appears to have an opportunistic basis; many thieves are interested in the device rather than the information it contains.

The NSW Bureau of Crime Statistics estimated in 2004 that 3.4% of laptops are stolen each year, arguably under-reporting because people without insurance often do not bother making a report. In 2000 the Australian Minister for Defence acknowledged that around 1.8% of the 7,000 laptops used across his portfolio went AWOL each year, claiming that "the portable computer loss rate in the private sector is much higher at between 10% and 15%".

That acknowledgement is useful as an indication that loss is not restricted to the private sector. In 2003 some 90 desktop and 25 laptop computers were either stolen or lost from Australian defence establishments, up from 73 laptops and 105 desktop machines in 2001 (of which 13 held classified information and three held commercially sensitive information). In 2000 the Defence Department reported that 54 laptops were lost and 73 stolen. Overall, in the 2001 financial year some 650 federal government computers were reported stolen, with 30 laptops missing from ASIO, the National Crime Authority and the Australian Federal Police.

The UK Ministry of Defence reported that 594 laptops were lost or stolen from 1996 to 2003, with around 30% containing "sensitive" information. One MI5 employee famously lost his laptop after he put it on the ground while buying a train ticket. In 2006 the US Commerce Department reported that it had lost 1,137 laptops since 2001, 672 from the Census Bureau (of which 246 contained some personal data). The National Oceanic & Atmospheric Administration reported 325 missing computers.

The Ponemon Institute, in a controversial study sponsored by Dell, asserted in 2005 that around 637,000 laptops are lost in US airports each year, "most commonly" at security checkpoints, with 65% not being reclaimed. Critics of the study claim that actual losses are around 6% of Ponemon's figure.

Individuals continue to place laptops with unencrypted sensitive information in ordinary air luggage. The statistics for loss of baggage by major airlines are sobering. In 2007 the Air Transport Users Council (AUC) revealed that BA mishandled 23 bags for every 1,000 passengers, losing about 3,000 bags every day and over 1.047 million items of luggage in 2006. BA, in an echo of comments by data custodians, described its performance as "unacceptable" and stated that "we fully apologise to customers who have been affected by delayed baggage in the past year". (Presumably a full apology is better than the partial variety.) Lufthansa and Air France lost a mere 982,000 items respectively.

     CRA (2004)

In 2004 the Canadian Revenue Agency (the equivalent of the federal ATO in Australia) reported the loss of six laptop and desktop devices from its Laval, Quebec office. One of the machines, used to test computer applications, contained around two million records from four confidential personal information databases. CRA notified over 120,000 affected individuals of the security breach.

     universities

In 2004 two University of California Los Angeles laptops were stolen. They contained unencrypted personal information concerning 145,000 blood donors and 62,000 health patients

A University of California Berkeley laptop stolen in 2005 held the social security numbers and other personal information about 98,369 graduates. During the same year a laptop containing data on 20,000 students and faculty in the Vermont State College system was stolen from a vacationing employee's locked car in Montreal. The laptop featured unencrypted names, addresses, Social Security numbers, payroll information and academic records on students. (One might question practice in taking such data in unprotected formats on vacation.)

     MCI, ACS, Boeing and Omega (2005)

An MCI laptop stolen from an employee car in 2005 contained the names and social security numbers of 16,500 current and former MCI employees.

In 2005 thieves stole two computers from Motorola's HR services provider Affiliated Computer Services, with information on Motorola's US staff.

An Omega World Travel laptop stolen in 2005 contained names and credit card details of 80,000 customers, inc US Department of Justice employees. During the same year Boeing lost a laptop that featured "sensitive" but unprotected information on 161,000 current and former employees, including names, Social Security numbers, birthdates and banking information.

In 2006 Boeing lost another laptop featuring the names and Social Security numbers of 382,000 workers and retirees, along with residential addresses, phone numbers, birth dates and some files salary information. The data was apparently not encrypted. A Boeing spokesperson commented that

It's very disturbing to us when things like this happen, and there are certain steps you can take right away ... but we realize we need to go above and beyond those.

     NSWSTA (2005)

The NSW State Transit Authority, a government agency, auctioned 12 servers in 2005. One of the buyers discovered that the STA had failed to delete payroll and financial information, Sydney public transport passenger counts, ticketing system codes, incident reports and employee access PINs.

Elsewhere on this site we have noted that effective security may involve physical destruction of disks, rather than erratic use of magnets or 'erase' programs.

     Ameriprise and Fidelity (2005)

In 2005 an Ameriprise Financial laptop was stolen from an employee's parked car. It contained unencrypted lists with personal information of about 230,000 customers and advisers, including names and Social Security numbers of 70,000 current/former financial advisers and the names and internal account numbers of some 158,000 customers.

Ameriprise subsequently agreed to a settlement with Massachusetts, on the basis that much of the missing data related to the state's citizens. Ameriprise was required to hire a third-party consultant to review its policies for laptops and for taking information or equipment home. It agreed to pay a derisory US US$25,000 to cover the costs of the investigation.

A year later Fidelity Investments reported the theft of a laptop containing personal information about 196,000 current and former HP employees.

The Fidelity email to those employees stated

This is to let you know that Fidelity Investments, record-keeper for the HP retirement plans, recently had a laptop computer stolen that contained personal information about you, including your name, address, social security number and compensation

Later in the year General Electric revealed theft of a company laptop containing the names and Social Security numbers of 50,000 current and former employees. GE made the standard offer of a year's free access to a credit-monitoring service.

     YMCA (2006)

In 2006 the Providence (Rhode Island) YMCA lost a laptop containing unencrypted personal information about some 65,000 members. That data included credit card and debit card numbers, checking account information, Social Security numbers, the names and addresses of children in daycare programs and medical information about the children (eg allergies and the medicine they take).

     US VA, IRS and FTC (2006)

In May 2006 the US Government revealed that a Veterans Affairs laptop with personal data on 26.5 million veterans stolen from an official's home (PDF), with admission that employee had been taking home sensitive data for preceding three years. The data included names, birth dates, social security numbers, phone numbers and some addresses. VA offered to pay for a year of credit monitoring for the veterans, which it said would cost US$160.5 million (somewhat more than the cost of encrypting the data on the laptop). The device was recovered in June 2006 after a US$50,000 reward.

Later in 2006 the government announced that an Internal Revenue Service employee lost an agency laptop as luggage aboard a commercial flight. The device contained sensitive personal information on 291 workers and job applicants (including unencrypted names, birth dates, Social Security numbers and fingerprints) but was protected by a double-password system.

Shortly thereafter the Federal Trade Commission disclosed theft of two laptops containing personal and financial data on consumers. The data on 110 people was "gathered in law enforcement investigations and included, variously, names, addresses, Social Security numbers, dates of birth, and in some instances, financial account numbers." The laptops were password protected, although the effectiveness of that protection is unclear.

In February 2007 the US Department of Veterans Affairs (VA) announced loss of an external hard drive containing the personal records of 48,000 military veterans. Some 20,000 personal records were not encrypted.

In July 2007 the Governor of Ohio revealed that the names and Social Security numbers of over 786,000 taxpayers were on a "computer storage device" stolen from a state intern's unlocked car in June. The device included data on 561,126 taxpayers with uncashed state income refund cheques, the names and Social Security numbers of 64,000 state employees and of lottery winners who have yet to cash winning tickets, the names and case numbers of the state's 84,000 welfare recipients, names and bank account information and Social Security numbers of 8,100 former state employees and the tax identification numbers of about 87,000 vendors.

A subsequent investigation (PDF) revealed that the "device" comprised unencrypted computer tapes, reflecting -

a questionable but longstanding practice in which OAKS supervisors, contractors and, eventually, college interns took backup tapes to their homes on a daily basis.
... Although OAKS is a $158 million IT project and the State of Ohio is a $52 billion business enterprise, OAKS administrators had not encrypted the data on the stolen backup tape and had authorized a succession of interns to take the tapes home for the previous two years with only an admonition to store the tapes in a safe place.

     Hummingbird (2006)

Toronto software provider Hummingbird disclosed that an employee lost "a piece of computer equipment" that contained the names and social security numbers of 1.3 million American students. Those students were customers of Texas Guaranteed, a US non-profit entity that administers a family education loan program. Hummingbird had been hired to develop a document management system.

Hummingbird's CEO stated that

The privacy of customer data is of utmost importance to us and we take our responsibility to safeguard it very seriously. We deeply regret that this incident has occurred. ... We continue to investigate the facts surrounding this loss of information and are taking all necessary action in order to ensure that such occurrences do not happen in the future.

The device was password protected; the files were not encrypted.

     E&Y, ING and CS Stars (2006)

A laptop stolen from the trunk of an Ernst & Young employee's car contained the names and credit card numbers of some 243,000 customers of Hotels.com.

Although the loss occurred in February 2006, Ernst & Young was reportedly unable to determine what was on the device until early May, at which time it and Hotels.com began notifying affected individuals. Earlier in the year Ernst & Young had exposed data from Goldman Sachs; another lost E&Y laptop featured names and social security numbers of IBM, BP and Sun Microsystems staff.

The UK Register, in reporting on those incidents and loss of four E&Y laptops from a conference room in Miami while the staff were at lunch, sniffed that

Ernst and Young has failed to issue a public statement about these breaches despite being a major advocate of transparency in such issues in its role as an auditor and corporate advisor.

In responding to the Hotels.com theft E&Y stated that it had no reason to believe the thief was specifically seeking the information on the computer. It has since added new security protections to the laptops of its 30,000 employees in the US and Canada.

Later in 2006 a laptop containing personal data of 13,000 Washington DC workers and retirees was stolen from the home of an employee of ING US Financial Services. The device was not protected by a password or encryption. ING executives commented, as well they might, that they believed the laptop was stolen for its value as hardware and that thieves might not have been unaware of the data it contained.

For us, this is very unfortunate. But we're moving forward, we're very focused and committed to find any other laptops that don't have encryption software and to fix that. This incident revealed a gap.

Critics noted that ING should have been well aware of that gap, as two of its 5,000 laptops had been stolen in 2005. Those devices contained unencrypted sensitive data regarding 8,500 Florida hospital workers.

In 2006 an unencrypted hard drive was lost during shipping back to the American Institute of Certified Public Accountants (AICPA) by a computer repair company. The drive held the names, addresses and Social Security numbers of 330,000 AICPA members. Later in that year a laptop stolen from a Deloitte & Touche employee's car featured home addresses, phone numbers, Social Security numbers and salary information on 12,000 Armstrong World Industries employees.

Also in 2006 insurance brokerage CS Stars lost "computer hardware" from a "secured facility". That hardware featured the names, addresses and Social Security numbers of around 540,000 injured people in the New York workers' compensation system. The device was owned by the state but "cannot be located''. CS Stars offered identity theft insurance, 12 months free credit reports and access to fraud resolution specialists.

     EDS, FBI and Mercantile Potomac (2006)

A laptop computer containing pension data of former employees of US supermarket chains Stop & Shop, Tops and Giant was lost by an EDS employee (and "may have been stolen") during a commercial flight in the US. The data included names, Social Security numbers, employee birth dates, benefit amounts and related administrative information. The device went as cargo rather than carry-on luggage. It was password-protected but the data was not encrypted.

EDS and its client Royal Ahold NV declined to say how many former employees were affected.

Bethesda-based Mercantile Potomac Bank anounced that a laptop containing Social Security and account numbers for nearly 50,000 customers was stolen from an employee's car.

In 2007 the US Federal Bureau of Investigation reported (PDF) at least 160 of its laptops had been lost or stolen over the past four years. Ten contained highly sensitive classified information; at least one included "personal identifying information on FBI personnel". In 2002 the FBI had roughly 11 laptops stolen or lost each month.

     AIG, Nationwide, M&S and (2006)

In June 2006 global insurance behemoth American International Group revealed that a burglar stole computer equipment in March from one of its US offices. That device contained personal information on 930,000 people, including names, Social Security numbers and some medical information.

In November 2006 the UK's largest building society, Nationwide, disclosed loss three months earlier of an employee laptop that featured names and account numbers for 11 million customers. The device disappeared during a domestic burglary. It featured a password but the customer details were not encrypted. In February 2007 Nationwide was fined £980,000 by the Financial Services Authority, which noted (PDF) that Nationwide did not commence investigating the significance of the loss until three weeks after the theft.

The building society was criticised by the FSA for not taking early action and for inadequate procedures. Nationwide conceded that the device held a considerable amount of confidential customer data; it would not confirm the exact nature of the data, claiming it had been advised by UK police to limit the level of detail revealed about the computer.

The FSA's director of enforcement commented

Nationwide is the UK's largest building society and holds confidential information for over 11 million customers. Nationwide's customers were entitled to rely upon it to take reasonable steps to make sure their personal information was secure.

A year later UK retail giant M&S revealed loss of a laptop that held unencrypted personal details of 26,000 employees. The Information Commissioner's Office found that M&S had breached the Data Protection Act and ordered it M S to ensure all hard drives were fully encrypted by April 2008.

In April 2008 the Bank of Ireland belatedly informed Ireland's Data Protection Commissioner that personal data of around 10,000 customers was held on four laptops stolen from the bank between June and October 2007. The data was not encypted. It included those customers' medical history, life assurance details, bank account details, names and addresses. The Bank alerted the customers in April 2008.

     UK government

In January 2007 the UK Ministry of Defence (MoD) announced loss of a laptop containing details of 600,000 potential recruits, stolen from a Royal Navy officer.

The stolen laptop contained personal information relating to some 600,000 people who have either expressed an interest in, or have joined, the Royal Navy, Royal Marines and the Royal Air Force.

That included bank details of 3,500 people, the names of people who made casual enquiries about joining the armed forces and "extensive personal data" such as passport and National Insurance numbers, driving licence details, family details, doctors' addresses and National Health Service numbers. The data was not encrypted.

The MoD announced that it was treating the loss "with the utmost seriousness", contacting those whose bank details were on the database but as of January apparently not alerting other people.

     HSBC

Global bank HSBC admitted in 2008 to losing a computer server holding transaction data of 159,000 account holders in a Hong Kong branch office.

It "lost track" of the server (now believed to have been stolen) during renovation work at the office. The data included account numbers, customer names, transaction amounts and transaction types, but did not contain customer PINS, passwords or user IDs. HSBC indicated that the data was password protected.

     UK Bar Council

In 2008 thieves stole four back-up hard drives and a laptop from the offices of the Bar Council. That hardware held contact details of over 12,000 practising barristers, along with bank account numbers and 1,500 complaints records (including the names and contact details of barristers, complainants and witnesses).

The Council noted that the information was encrypted and password protected, and that the contact details were routinely published on websites and print directories.





icon for link to next page   next page (sale)

 


this site
the web

Google

version of December 2008
© Bruce Arnold
caslon.com.au | caslon analytics