ICO: Uber data breach raises huge concerns
The ICO and NCSC will investigate the impact on UK customers
The ICO said the way in which Uber dealt with a major data breach has raised "huge concerns" over the company's data protection policies and ethics.
The UK's data regulation body said concealing a data breach should come with a much larger fine than the standard penalities imposed on organisations that fail to sufficiently protect their customers' data. Uber is alleged to have paid the hackers $100,000 not to mention it had hacked the taxi booking app's systems, according to Bloomberg.
"It's always the company's responsibility to identify when UK citizens have been affected as part of a data breach and take steps to reduce any harm to consumers," ICO deputy commissioner James Dipple-Johnstone said in a statement.
"If UK citizens were affected then we should have been notified so that we could assess and verify the impact on people whose data was exposed."
The ICO said it would investigate into the breach, including ascertaining how many UK citizens have been affected and to what extent. Uber revealed that information such as names, email addresses and mobile phone numbers had been accessed, but there's currently no evidence that social security numbers, payment details and trip data was stolen.
"We'll be working with the National Cyber Security Centre (NCSC) plus other relevant authorities in the UK and overseas to determine the scale of the breach, how it has affected people in the UK and what steps need to be taken by the firm to ensure it fully complies with its data protection obligations," Dipple-Johnstone added.
The NCSC has also spoken out against Uber's actions, saying that any company that finds it has been subject of a cyber attack shoud report it immediately for the safety of citizens.
"The more information a company shares in a timely manner, the better able we are to support them and prevent others falling victim," it said.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now