University of Greenwich fined £120,000 for breach of sensitive data

Data breach exposed students' health data via unsecured microsite

The University of Greenwich must pay a 120,000 fine after an unpatched security flaw led to the leak of students' and staff's personal data.

Nearly 20,000 people were affected by the "serious breach", which occurred in 2016 when hackers discovered a vulnerability in an unsecured microsite built back in 2004.

The exposed data included names, addresses and phone numbers, but also sensitive information on 3,500 people that concerned details about student's extenuating circumstances, learning difficulties and staff sickness records.

While the microsite was built specifically for a training conference at the university's Computing and Mathematics School, which was devolved at the time, it was never shut down or made secure, and was first compromised in 2013.

Hackers then used the same vulnerability to access the web server, gaining access to 19,500 staff and students' information.

"Whilst the microsite was developed in one of the university's departments without its knowledge, as a data controller it is responsible for the security of data throughout the institution," said Steve Eckersley, head of enforcement at the Information Commissioner's Office (ICO).

"Students and members of staff had a right to expect that their personal information would be held securely and this serious breach would have caused significant distress. The nature of the data and the number of people affected have informed our decision to impose this level of fine."

The 120,000 penalty is the first the data protection watchdog has issued to a university under the Data Protection Act 1998, out of a maximum 500,000 fine it can impose.

However, new EU data protection rules come into force on Friday that introduce higher sanctions. The General Data Protection Regulation (GDPR) will allow regulators to fine organisations that suffer data breaches a maximum of 20 million, or 4% of their annual turnover.

When IT Pro reported on the breach at the time, university secretary Louise Nadal called it "a serious, unprecedented error", and said she would conduct an investigation into what happened.

In response to the ICO fine, university secretary Peter Garrod outlined the results of that review, including new investment and an overhaul of the university's security practices.

"We acknowledge the ICO's findings and apologise again to all those who may have been affected," he said in a statement. "Since 2016 when the unauthorised access to some of the university's data was discovered, we have carried out a major review of our data protection procedures and made a number of key changes.

"Specifically, we have invested significantly in new technology and staff; overhauled the information technology governance structure to improve internal accountability; and implemented new monitoring systems and a rapid response team to anticipate and act on threats."

He added: "No organisation can say it will be immune to unauthorised access in the future, but we can say with confidence to our students, staff, alumni and other stakeholders, that our systems are far more robust than they were two years ago as a result of the changes we have made. We take these matters extremely seriously and keep our procedures under constant review to ensure they reflect best practice."

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
What is single sign-on (SSO)?
single sign-on (SSO)

What is single sign-on (SSO)?

2 Dec 2021