overview
networks
tapes
laptops
sale
law
prevention
responses
studies
costs

related
Guides:
Security &
InfoCrime
Consumers
& Trust

related
Profiles
& Notes:
ID Theft,
ID Fraud
|
laptops and other devices
This page highlights recent examples of large scale exposure
of sensitive consumer information through loss or theft
of laptops and other devices.
It covers -
introduction
Why is exposure of data through theft or misplacement
of personal computers (desktop machines, laptops and PDAs)
and other devices, including servers, an issue?
One reason is that those devices often contain substantial
amounts of sensitive information in a readily usable form
and without protection such as encryption of individual
files or password protection to access the device. It
is much easier to walk out of an office or a cafe with
someone's laptop than it is to purloin 20 metres of paper
files.
Another reason is that the characteristics that make laptops,
PDAs and mobile phones
so valuable to users - their portability, adaptability
and potential to signify the owner's status - are characteristics
attractive to thieves. Much theft appears to have an opportunistic
basis; many thieves are interested in the device rather
than the information it contains.
The NSW Bureau of Crime Statistics estimated in 2004 that
3.4% of laptops are stolen each year, arguably under-reporting
because people without insurance often do not bother making
a report. In 2000 the Australian Minister for Defence
acknowledged that around 1.8% of the 7,000 laptops used
across his portfolio went AWOL each year, claiming that
"the portable computer loss rate in the private sector
is much higher at between 10% and 15%".
That acknowledgement is useful as an indication that loss
is not restricted to the private sector. In 2003 some
90 desktop and 25 laptop computers were either stolen
or lost from Australian defence establishments, up from
73 laptops and 105 desktop machines in 2001 (of which
13 held classified information and three held commercially
sensitive information). In 2000 the Defence Department
reported that 54 laptops were lost and 73 stolen. Overall,
in the 2001 financial year some 650 federal government
computers were reported stolen, with 30 laptops missing
from ASIO, the National Crime Authority and the Australian
Federal Police.
The UK Ministry of Defence reported that 594 laptops were
lost or stolen from 1996 to 2003, with around 30% containing
"sensitive" information. One MI5 employee famously
lost his laptop after he put it on the ground while buying
a train ticket. In 2006 the US Commerce Department reported
that it had lost 1,137 laptops since 2001, 672 from the
Census Bureau (of which 246 contained some personal data).
The National Oceanic & Atmospheric Administration
reported 325 missing computers.
The Ponemon Institute, in a controversial study sponsored
by Dell, asserted in 2005 that around 637,000 laptops
are lost in US airports each year, "most commonly"
at security checkpoints, with 65% not being reclaimed.
Critics of the study claim that actual losses are around
6% of Ponemon's figure.
Individuals continue to place laptops with unencrypted
sensitive information in ordinary air luggage. The statistics
for loss of baggage by major airlines are sobering. In
2007 the Air Transport Users Council (AUC) revealed that
BA mishandled 23 bags for every 1,000 passengers, losing
about 3,000 bags every day and over 1.047 million items
of luggage in 2006. BA, in an echo of comments by data
custodians, described its performance as "unacceptable"
and stated that "we fully apologise to customers
who have been affected by delayed baggage in the past
year". (Presumably a full apology is better than
the partial variety.) Lufthansa and Air France lost a
mere 982,000 items respectively.
CRA (2004)
In 2004 the Canadian Revenue Agency (the equivalent of
the federal ATO in Australia) reported the loss of six
laptop and desktop devices from its Laval, Quebec office.
One of the machines, used to test computer applications,
contained around two million records from four confidential
personal information databases. CRA notified over 120,000
affected individuals of the security breach.
universities
In 2004 two University of California Los Angeles laptops
were stolen. They contained unencrypted personal information
concerning 145,000 blood donors and 62,000 health patients
A University of California Berkeley laptop stolen in 2005
held the social security numbers and other personal information
about 98,369 graduates. During the same year a laptop
containing data on 20,000 students and faculty in the
Vermont State College system was stolen from a vacationing
employee's locked car in Montreal. The laptop featured
unencrypted names, addresses, Social Security numbers,
payroll information and academic records on students.
(One might question practice in taking such data in unprotected
formats on vacation.)
MCI, ACS, Boeing and Omega
(2005)
An MCI laptop stolen from an employee car in 2005 contained
the names and social security numbers of 16,500 current
and former MCI employees.
In 2005 thieves stole two computers from Motorola's HR
services provider Affiliated Computer Services, with information
on Motorola's US staff.
An Omega World Travel laptop stolen in 2005 contained
names and credit card details of 80,000 customers, inc
US Department of Justice employees. During the same year
Boeing lost a laptop that featured "sensitive"
but unprotected information on 161,000 current and former
employees, including names, Social Security numbers, birthdates
and banking information.
In 2006 Boeing lost another laptop featuring the names
and Social Security numbers of 382,000 workers and retirees,
along with residential addresses, phone numbers, birth
dates and some files salary information. The data was
apparently not encrypted. A Boeing spokesperson commented
that
It's
very disturbing to us when things like this happen,
and there are certain steps you can take right away
... but we realize we need to go above and beyond those.
NSWSTA (2005)
The NSW State Transit Authority, a government agency,
auctioned 12 servers in 2005. One of the buyers discovered
that the STA had failed to delete payroll and financial
information, Sydney public transport passenger counts,
ticketing system codes, incident reports and employee
access PINs.
Elsewhere on this site we have noted
that effective security may involve physical destruction
of disks, rather than erratic use of magnets or 'erase'
programs.
Ameriprise and Fidelity
(2005)
In 2005 an Ameriprise Financial laptop was stolen from
an employee's parked car. It contained unencrypted lists
with personal information of about 230,000 customers and
advisers, including names and Social Security numbers
of 70,000 current/former financial advisers and the names
and internal account numbers of some 158,000 customers.
Ameriprise subsequently agreed to a settlement with Massachusetts,
on the basis that much of the missing data related to
the state's citizens. Ameriprise was required to hire
a third-party consultant to review its policies for laptops
and for taking information or equipment home. It agreed
to pay a derisory US US$25,000 to cover the costs of the
investigation.
A year later Fidelity Investments reported the theft of
a laptop containing personal information about 196,000
current and former HP employees.
The Fidelity email to those employees stated
This is to let you know that Fidelity Investments, record-keeper
for the HP retirement plans, recently had a laptop computer
stolen that contained personal information about you,
including your name, address, social security number
and compensation
Later
in the year General Electric revealed theft of a company
laptop containing the names and Social Security numbers
of 50,000 current and former employees. GE made the standard
offer of a year's free access to a credit-monitoring service.
YMCA (2006)
In 2006 the Providence (Rhode Island) YMCA lost a laptop
containing unencrypted personal information about some
65,000 members. That data included credit card and debit
card numbers, checking account information, Social Security
numbers, the names and addresses of children in daycare
programs and medical information about the children (eg
allergies and the medicine they take).
US VA, IRS and FTC
(2006)
In May 2006 the US Government revealed that a Veterans
Affairs laptop with personal data on 26.5 million veterans
stolen from an official's home (PDF),
with admission that employee had been taking home sensitive
data for preceding three years. The data included names,
birth dates, social security numbers, phone numbers and
some addresses. VA offered to pay for a year of credit
monitoring for the veterans, which it said would cost
US$160.5 million (somewhat more than the cost of encrypting
the data on the laptop). The device was recovered in June
2006 after a US$50,000 reward.
Later in 2006 the government announced that an Internal
Revenue Service employee lost an agency laptop as luggage
aboard a commercial flight. The device contained sensitive
personal information on 291 workers and job applicants
(including unencrypted names, birth dates, Social Security
numbers and fingerprints) but was protected by a double-password
system.
Shortly thereafter the Federal Trade Commission disclosed
theft of two laptops containing personal and financial
data on consumers. The data on 110 people was "gathered
in law enforcement investigations and included, variously,
names, addresses, Social Security numbers, dates of birth,
and in some instances, financial account numbers."
The laptops were password protected, although the effectiveness
of that protection is unclear.
In February 2007 the US Department of Veterans Affairs
(VA) announced loss of an external hard drive containing
the personal records of 48,000 military veterans. Some
20,000 personal records were not encrypted.
In July 2007 the Governor of Ohio revealed that the names
and Social Security numbers of over 786,000 taxpayers
were on a "computer storage device" stolen from
a state intern's unlocked car in June. The device included
data on 561,126 taxpayers with uncashed state income refund
cheques, the names and Social Security numbers of 64,000
state employees and of lottery winners who have yet to
cash winning tickets, the names and case numbers of the
state's 84,000 welfare recipients, names and bank account
information and Social Security numbers of 8,100 former
state employees and the tax identification numbers of
about 87,000 vendors.
A subsequent investigation (PDF)
revealed that the "device" comprised unencrypted
computer tapes, reflecting -
a
questionable but longstanding practice in which OAKS
supervisors, contractors and, eventually, college interns
took backup tapes to their homes on a daily basis.
... Although OAKS is a $158 million IT project and the
State of Ohio is a $52 billion business enterprise,
OAKS administrators had not encrypted the data on the
stolen backup tape and had authorized a succession of
interns to take the tapes home for the previous two
years with only an admonition to store the tapes in
a safe place.
Hummingbird
(2006)
Toronto software provider Hummingbird disclosed that an
employee lost "a piece of computer equipment"
that contained the names and social security numbers of
1.3 million American students. Those students were customers
of Texas Guaranteed, a US non-profit entity that administers
a family education loan program. Hummingbird had been
hired to develop a document management system.
Hummingbird's CEO stated that
The
privacy of customer data is of utmost importance to
us and we take our responsibility to safeguard it very
seriously. We deeply regret that this incident has occurred.
... We continue to investigate the facts surrounding
this loss of information and are taking all necessary
action in order to ensure that such occurrences do not
happen in the future.
The
device was password protected; the files were not encrypted.
E&Y, ING and CS Stars
(2006)
A laptop stolen from the trunk of an Ernst & Young
employee's car contained the names and credit card numbers
of some 243,000 customers of Hotels.com.
Although the loss occurred in February 2006, Ernst &
Young was reportedly unable to determine what was on the
device until early May, at which time it and Hotels.com
began notifying affected individuals. Earlier in the year
Ernst & Young had exposed data from Goldman Sachs;
another lost E&Y laptop featured names and social
security numbers of IBM, BP and Sun Microsystems staff.
The UK Register, in reporting on those incidents
and loss of four E&Y laptops from a conference room
in Miami while the staff were at lunch, sniffed that
Ernst
and Young has failed to issue a public statement about
these breaches despite being a major advocate of transparency
in such issues in its role as an auditor and corporate
advisor.
In responding to the Hotels.com theft E&Y stated that
it had no reason to believe the thief was specifically
seeking the information on the computer. It has since
added new security protections to the laptops of its 30,000
employees in the US and Canada.
Later in 2006 a laptop containing personal data of 13,000
Washington DC workers and retirees was stolen from the
home of an employee of ING US Financial Services. The
device was not protected by a password or encryption.
ING executives commented, as well they might, that they
believed the laptop was stolen for its value as hardware
and that thieves might not have been unaware of the data
it contained.
For
us, this is very unfortunate. But we're moving forward,
we're very focused and committed to find any other laptops
that don't have encryption software and to fix that.
This incident revealed a gap.
Critics
noted that ING should have been well aware of that gap,
as two of its 5,000 laptops had been stolen in 2005. Those
devices contained unencrypted sensitive data regarding
8,500 Florida hospital workers.
In 2006 an unencrypted hard drive was lost during shipping
back to the American Institute of Certified Public Accountants
(AICPA) by a computer repair company. The drive held the
names, addresses and Social Security numbers of 330,000
AICPA members. Later in that year a laptop stolen from
a Deloitte & Touche employee's car featured home addresses,
phone numbers, Social Security numbers and salary information
on 12,000 Armstrong World Industries employees.
Also in 2006 insurance brokerage CS Stars lost "computer
hardware" from a "secured facility". That
hardware featured the names, addresses and Social Security
numbers of around 540,000 injured people in the New York
workers' compensation system. The device was owned by
the state but "cannot be located''. CS Stars offered
identity theft insurance, 12 months free credit reports
and access to fraud resolution specialists.
EDS, FBI and Mercantile Potomac
(2006)
A laptop computer containing pension data of former employees
of US supermarket chains Stop & Shop, Tops and Giant
was lost by an EDS employee (and "may have been stolen")
during a commercial flight in the US. The data included
names, Social Security numbers, employee birth dates,
benefit amounts and related administrative information.
The device went as cargo rather than carry-on luggage.
It was password-protected but the data was not encrypted.
EDS and its client Royal Ahold NV declined to say how
many former employees were affected.
Bethesda-based Mercantile Potomac Bank anounced that a
laptop containing Social Security and account numbers
for nearly 50,000 customers was stolen from an employee's
car.
In 2007 the US Federal Bureau of Investigation reported
(PDF)
at least 160 of its laptops had been lost or stolen over
the past four years. Ten contained highly sensitive classified
information; at least one included "personal identifying
information on FBI personnel". In 2002 the FBI had
roughly 11 laptops stolen or lost each month.
AIG, Nationwide, M&S and
(2006)
In June 2006 global insurance behemoth American International
Group revealed that a burglar stole computer equipment
in March from one of its US offices. That device contained
personal information on 930,000 people, including names,
Social Security numbers and some medical information.
In November 2006 the UK's largest building society, Nationwide,
disclosed loss three months earlier of an employee laptop
that featured names and account numbers for 11 million
customers. The device disappeared during a domestic burglary.
It featured a password but the customer details were not
encrypted. In February 2007 Nationwide was fined £980,000
by the Financial Services Authority, which noted (PDF)
that Nationwide did not commence investigating the significance
of the loss until three weeks after the theft.
The building society was criticised by the FSA for not
taking early action and for inadequate procedures. Nationwide
conceded that the device held a considerable amount of
confidential customer data; it would not confirm the exact
nature of the data, claiming it had been advised by UK
police to limit the level of detail revealed about the
computer.
The FSA's director of enforcement commented
Nationwide
is the UK's largest building society and holds confidential
information for over 11 million customers. Nationwide's
customers were entitled to rely upon it to take reasonable
steps to make sure their personal information was secure.
A
year later UK retail giant M&S revealed loss of a
laptop that held unencrypted personal details of 26,000
employees. The Information Commissioner's Office found
that M&S had breached the Data Protection Act and
ordered it M S to ensure all hard drives were fully encrypted
by April 2008.
In April 2008 the Bank of Ireland belatedly informed Ireland's
Data Protection Commissioner that personal data of around
10,000 customers was held on four laptops stolen from
the bank between June and October 2007. The data was not
encypted. It included those customers' medical history,
life assurance details, bank account details, names and
addresses. The Bank alerted the customers in April 2008.
UK government
In January 2007 the UK Ministry of Defence (MoD) announced
loss of a laptop containing details of 600,000 potential
recruits, stolen from a Royal Navy officer.
The
stolen laptop contained personal information relating
to some 600,000 people who have either expressed an
interest in, or have joined, the Royal Navy, Royal Marines
and the Royal Air Force.
That
included bank details of 3,500 people, the names of people
who made casual enquiries about joining the armed forces
and "extensive personal data" such as passport
and National Insurance numbers, driving licence details,
family details, doctors' addresses and National Health
Service numbers. The data was not encrypted.
The MoD announced that it was treating the loss "with
the utmost seriousness", contacting those whose bank
details were on the database but as of January apparently
not alerting other people.
HSBC
Global bank HSBC admitted in 2008 to losing a computer
server holding transaction data of 159,000 account holders
in a Hong Kong branch office.
It "lost track" of the server (now believed
to have been stolen) during renovation work at the office.
The data included account numbers, customer names, transaction
amounts and transaction types, but did not contain customer
PINS, passwords or user IDs. HSBC indicated that the data
was password protected.
UK Bar Council
In 2008 thieves stole four back-up hard drives and a laptop
from the offices of the Bar Council. That hardware held
contact details of over 12,000 practising barristers,
along with bank account numbers and 1,500 complaints records
(including the names and contact details of barristers,
complainants and witnesses).
The Council noted that the information was encrypted and
password protected, and that the contact details were
routinely published on websites and print directories.
next page (sale)
|
|