Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Lost council laptop had data on 200 Aberdeenshire pupils

Post Thumbnail

The loss of a laptop with details of 200 school children was among dozens of “disturbing” data breaches by north and north-east councils in recent years.

A new report released by the privacy campaign group Big Brother Watch found UK local authorities flout information rules an average of four times every day.

The study showed there were 4,176 data breaches across Britain between 2011 and 2014 – a four-fold increase on the previous four years.

A total of 11 breaches were reported from Aberdeenshire Council in the period, including the loss of a laptop containing unencrypted school reports and other details about 200 youngsters in August 2011.

The local authority said last night that the laptop was stolen during a break-in at an employee’s locked home, and that it was later recovered by police.

Other breaches highlighted in Aberdeenshire included the release of personal data as part of a Freedom of Information response, and a paper file being lost after being left on the roof of a car.

There were 13 data breaches at Aberdeen City Council in the period, according to the report, mainly relating to the access of confidential information by unauthorised individuals.

Moray Council reported 12 breaches between 2011 and 2014, including papers being left in a café and a pen drive being found containing personal files.

Three breaches were recorded at Highland Council, with the incidents described as “negligent behaviour regarding laptop and sensitive data”, as well as “unacceptable use of ICT and access to files for personal use”, and “release of confidential information”.

Argyll and Bute Council and Orkney Islands Council both reported one breach during the period.

Emma Carr, director at Big Brother Watch, said: “Despite local councils being trusted with increasing amounts of our personal data, this report highlights that they are simply not able to say it is safe with them.

“A number of examples show shockingly lax attitudes to protecting confidential information. For so many children and young people to have had their personal information compromised is deeply disturbing.

“With only a tiny fraction of staff being disciplined or dismissed, this raises the question of how seriously local councils take protecting the privacy of the public.”

She added that far more should be done to prevent and deter data breaches from occurring.

“Better training, reporting procedures and harsher penalties available for the most serious of data breaches, including criminal records and custodial sentences are all required,” she said.

“Until we see these policies implemented, the public will simply not be able to trust local councils with their data.”

A spokeswoman for Aberdeenshire Council said: “In August 2011 a laptop containing school pupil reports, language profiles and lessons was stolen during a break-in of an employee’s locked home.

“The laptop was later recovered by police and no disciplinary action was taken as the member of staff was not at fault.

“Aberdeenshire Council was at the time in the process of encrypting all laptops, a process that has since been completed.

“All council employees must undertake mandatory training surrounding the Data Protection Act 1998 as part of staff induction.”

A Moray Council spokesman said: “We take our responsibility under the DPA very seriously, and following all the breaches detailed we either undertook refresher training or a review of processes.

“What the report fails to demonstrate is the impact of the breaches; we are confident that our prompt actions following each breach meant that no damage was caused to individuals or their reputation.”