<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Law and Labour &#187; Information Commissioner&#8217;s Office</title>
	<atom:link href="http://lawandlabour.com/tag/information-commissioners-office/feed/" rel="self" type="application/rss+xml" />
	<link>http://lawandlabour.com</link>
	<description>Employment law issues</description>
	<lastBuildDate>Wed, 26 Mar 2025 18:43:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>Morrisons faces huge bill following data theft</title>
		<link>http://lawandlabour.com/morrisons-faces-huge-bill-following-data-theft/</link>
		<comments>http://lawandlabour.com/morrisons-faces-huge-bill-following-data-theft/#comments</comments>
		<pubDate>Sat, 07 Nov 2015 16:27:41 +0000</pubDate>
		<dc:creator><![CDATA[Law and Labour]]></dc:creator>
				<category><![CDATA[Digital business]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Energy and Utilities]]></category>
		<category><![CDATA[Financial services]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Hospitality]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Public sector]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[Company policy]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Information Commissioner's Office]]></category>

		<guid isPermaLink="false">http://lawandlabour.com/?p=2288</guid>
		<description><![CDATA[<p>It’s a scenario designed to spread fear into the hearts of most businesses. A disgruntled employee bent on seeking revenge against his employer. Said employee steals confidential company data and spreads it far and wide over the Internet, much to the horror of his soon-to-be former employer.</p>
<p>In the case of Morrisons, the nightmare scenario became reality when their internal auditor Andrew Skelton stole the banking details of 100,000 Morrisons staff and published this data on a variety of websites. Skelton had been angered by the company’s handling of an internal disciplinary matter. In July he was jailed for eight years after being found guilty of fraud, unauthorised access to computer material and unlawful disclosure of personal data.</p>
<p>The nightmare is not yet over for Morrisons, however. Last month more than 2,000 of the employees affected by Skelton’s actions took Morrisons to court in order to seek financial compensation for their loss. The company have already forked out millions of pounds to repair the damage caused by the data theft and they look to be facing another sizeable bill to defend these claims.</p>
<p>The Morrison saga is a tale of woe that could befall any business. Under the laws governing data protection with which every employer is required to comply, information security is of paramount importance:</p>
<p>“Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.” Data Protection Act 1998, seventh data protection principle</p>
<p>All employers should ensure they have adequate security measures in place to prevent such thefts from occurring in the first place. In the Morrisons case, Skelton had a level of access to confidential and sensitive data beyond that of the ordinary employee. With hindsight Morrisons will probably wish they had monitored his activities more closely following his disciplinary matter.</p>
<p>If, despite the best precautions, the worst should happen and data go missing, then the Information Commissioner’s Office (ICO) recommends a four-part response. Click on the headers below for more information:</p>
Containment and recoveryInvestigate the breach and take steps to prevent any ongoing loss, such as changing security codes.Risk assessmentIdentify the potential adverse consequences of the theft, particularly for employees.NotificationNotify the ICO of any serious breach, for example, where there is potential harm to employees as a result of the theft or a large volume of data has been stolen. Notify employees of the theft and give them advice on how to respond.ResponseReview and update any information security procedures and policies in light of the failings exposed by the breach.
<p>Photo: MacBook Pro backlit keyboard Tom Eversley</p>
]]></description>
		<wfw:commentRss>http://lawandlabour.com/morrisons-faces-huge-bill-following-data-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
