Police Officers At Severe Risk As Personal Data Exposed

Northern Ireland police officers and staff have become very vulnerable after a massive data breach published their personal details including their surnames, rank, location and private addresses.

The UK Information Commissioner’s Office (ICO) has launched an investigation into this apparent accidental data breach. This is the worst data breach in the ICO’s history and it has published details of more than 10k police officers and staff in Northern Ireland.

Chief Constable Simon Byrne has cut his family holiday short to attend the emergency Policing Board meeting following the force’s devastating data breach, where he will have questions about the breach. The force also said it has declared the breach a “critical incident”.

The agency, which regulates data privacy laws, is working with the Police Service to establish the level of risk amid warnings that the leak may compel officers to leave the force or move their home address.

“People have the right to expect that their personal information is kept safe and not disclosed when it shouldn't be. This incident raises serious concerns as it shows how even the smallest of human errors can have major consequences,’ said the ICO statement.

“We recognise the potential impact on the people and families affected by this breach, and we expect appropriate action to be taken by the Police Service of Northern Ireland as a matter of urgency.

“This incident raises serious concerns as it shows how even the smallest of human errors can have major consequences,” the statement says. “The incident demonstrates just how important it is to have robust measures in place to protect personal information, especially in a sensitive environment.”

Political leaders and police representatives in the region are grappling with the security and financial implications of an error that could expose officers, including those who work undercover, to terrorist intimidation and attack.

Officers were frightened and their friends and family were in “jeopardy”, said Naomi Long, the leader of the Alliance party who served as justice minister from 2020 to 2022. She said it would be all but impossible to eradicate the digital footprint of the data breach, which gave the rank and grade data of all employees at the PSNI, including surnames, initials and what department they worked in.

The debacle comes as Northern Ireland is facing a budgetary and political crisis. The region’s power-sharing executive and assembly have been paralysed for more than a year in a row over Brexit.

The Guardian:     ICO:     BBC:     Belfast Telegraph:     Financial Times:     BBC:     Sky

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Threads Loses 50% Of It’s Users
Massive Breach Of British Voter Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Garrison

Garrison

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.