We focus on the latest news surrounding data breaches, leaks and hacks plus daily internet security articles.
As investigations into the Police Federation of England and Wales cyber attack continue, we’ve taken cases forward on a No Win, No Fee basis.
The investigations into the two malware attacks that hit the PFEW on 9th March and 21st March 2019 are underway, and we’ve agreed to take claims forward. Our legal team who are fighting for justice in dozens of data breach group actions have been contacted for help. As with the other group and multi-party actions we’re running, we have offered No Win, No Fee compensation representation.
It’s understood that the data for some 120,000 police employees may have been exposed in the incident. At this stage, information exposure or theft cannot be ruled out.
We’ve started taking cases forward on a No Win, No Fee basis for victims of the PFEW cyber attacks that were announced recently.
Some 120,000 police employees may have been affected by this data breach, spanning 40 different forces. The PFEW (Police Federation of England and Wales) cannot determine whether any information was exposed, so on the basis that it cannot be ruled out, we’ve agreed to take cases on.
Another key factor is that there were two separate incidents that spanned over a number of weeks. The first incident took place on 9th March 2019, and the second took place on 21st March 2019. It’s believed that the attacks were a part of a wider operation as opposed to specifically targeting PFEW.
The (PFEW) Police Federation of England and Wales data breach incidents were announced earlier this month, and they’re potentially huge. The PFEW cyber attacks may have affected 120,000 police employees.
Although PFEW say that they don’t believe any information was exposed, they cannot rule it out. For the potential victims of the breaches, this isn’t helpful. It’s hard enough these days being on the police force with constant cuts and under-staffing.
This kind of added stress in the current environment of policing isn’t helpful at all.
A former candidate for Houghton Regis Town Council has been fined in a bizarre incident that led to a Bedfordshire Police data breach.
The former candidate had reportedly been arrested at his home when an officer left her netbook unattended with him. He then took a photo of the notebook and uploaded it online. He has been fined £200.00 and made to pay additional costs in the sum of £115.00.
This is certainly one of the more bizarre police data breach incidents we’ve ever come across before. It’s a prime example of just how easy it is for personal and potentially sensitive data to be breached and shared.
The incredibly serious Wokingham Council data breach that came to light in the last few weeks was a severe example of how bad a council data breach can be.
This particular breach was said to be an error that’s among a number that had been identified with Wokingham Council. Councils and local authority agencies hold a great deal of incredibly personal and sensitive data about thousands of individuals. This includes vulnerable people and children.
As such, any council data breach can be severe. This latest Wokingham Council breach is one of the worst we’ve seen.
A sickening Staffordshire police data breach has led to an officer being sacked and being handed a 12-month prison sentence.
With the police handling very sensitive and personal information, we expect the best from them. Unfortunately, they do fall short on some occasions. The police have been embroiled in a number of data breach incidents for several years. A concerning element is where officers are using police data when they’re not supposed to.
This hearings in the Staffordshire police data breach at the centre of this article resulted in the instant dismissal for the officer involved.
Former PC Sarah Corner has resigned a week before a hearing over the Norfolk Police data breach she was embroiled in.
The 24-year-old was due to face a gross misconduct hearing last month following allegations of a serious data breach. Ms Corner was investigated for illegally obtaining information from a police computer. This is a monumental breach of data protection.
Although she resigned prior to the hearing, she would have been dismissed in any event. With the wealth of data that police hold, any police data breach can be a serious one.
The Cleveland Police data breach was another example of a preventable public sector data breach that should never have happened in the first place.
As a result of what’s being classed as a “human error” incident, the personal details of 1,661 people were leaked online. As part of the police’s procedures for disclosing data about “use of force”, information was put online that was accidentally not redacted. What should have been generic information about people who had been restrained by the police between April and June this year instead disclosed far more information.
Anyone affected by the Cleveland Police data breach may be eligible to pursue legal action.
A signed undertaking has come into force over a Humberside police data breach that involved incredibly sensitive notes for an alleged rape.
In October 2016, the Information Commissioner’s Office (ICO) was informed about the loss of interview disks and written notes about an alleged rape. The disks were reportedly created after an interview had been conducted with another force, and the disks were not encrypted or even password-protected.
The loss of sensitive police data that wasn’t even encrypted and protected is inexcusable.
The 2016 Gloucestershire police data breach has led to a fine imposed by the Information Commissioner’s Office (ICO) in the sum of £80,000.00.
The incident that took place on 19 December 2016 involved a Gloucestershire police offer sending an update to 56 individuals in respect of allegations of abuse. The officer inadvertently placed the email addresses of the recipients into the “To” field instead of the “BCC” field, resulting in the identities of the recipients being revealed to one another.
The email itself is thought to have revealed information about schools and other organisations being investigated as part of the allegations.
Fill out our quick call back form below and we'll contact you when you're ready to talk to us.