ICO fines Heathrow over USB stick fiasco

Airport hit with £120,000 penalty for failing to secure personal data within its network

Heathrow Airport has been accused of a "catalogue of shortcomings" and fined 120,000 by the ICO over data protection failings.

The ICO began an investigation into the airport after a member of the public found a USB stick which had been lost by a Heathrow employee in October last year.

The stick, which contained 76 folders and more than 1,000 files, was neither encrypted nor password protected, which allowed the member of the public to view its contents at a local library.

"Data Protection should have been high on Heathrow's agenda," said the ICO's director of investigations, Steve Eckersley. "But our investigation found a catalogue of shortcomings in corporate standards, training and vision that indicated otherwise.

"Data protection is a boardroom issue and it is imperative that businesses have the policies, procedures and training in place to minimise any vulnerabilities of the personal information that has been entrusted to them."

Although the amount of sensitive and personal data held on the stick comprised a small amount of the total files, the ICO said it was concerned about a training video, which exposed the details of 10 individuals. The information included their names, dates of birth, passport numbers and the details of up to 50 other Heathrow aviation security personnel.

The leak became public knowledge when the stick was passed to a national newspaper, which took copies of the data before giving the stick back to Heathrow Airport Ltd (HAL). A number of standard remedial actions were taken by HAL once it was informed of the breach, such as reporting the matter to the police and engaging a third-party specialist to monitor the internet and the dark web.

However, the ICO's investigation found further evidence that HAL's staff were not up to scratch with just two percent of the 6,500-strong workforce having received data protection training.

Other concerns noted during the investigation included the widespread use of removable media in contradiction of HAL's own policies and guidance, as well as ineffective controls preventing personal data from being downloaded onto unauthorised or unencrypted media.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Most Popular

SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021