Who is Reading the Data on Your Old Computer?
|
|
|
- Harold McCarthy
- 10 years ago
- Views:
Transcription
1 Who is Reading the Data on Your Old Computer? Vivienne Mee Rits Information Security Citywest Business Campus Co. Dublin ABSTRACT Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers? The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party. Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site. What is wrong with the methods currently being used for discarding of our old PCs? With this question in mind, Rits Information Security embarked on a study to highlight the problems home users, and corporate users face when discarding retired PCs. In this paper, Rits Information Security describes research in which a number of hard disks were taken from computers after they had been released for resale on Irish online auction sites. The research that was undertaken involved an analysis of the disks to determine if any information remained on these disks, and whether the information could be easily recovered using commonly available tools and techniques. From this analysis, a number of disks could be traced to specific organisations, including large financial institutions, various consultancy firms, numerous small trade organisation, auctioneers, and insurance brokers. In addition to these, a number of computers were found to have originated from the home environment. The results indicate that careless disposal of computers and storage media in the Republic of Ireland is a significant problem. Very few of the disks tested had undergone a thorough or efficient cleansing process. The level of information that could be recovered from the majority of the disks tested would have proven useful for corporate espionage, identity theft, blackmail, and fraud. 25
2 Keywords: Data protection Act, Forensics, secure disposal, legislation, recovered data 1. INTRODUCTION In Ireland, a problem arises for the disposal of redundant computer hardware. This problem is faced daily by the home user, governments, industry and academia. Computers have a useful life span of only two to three years. After this period of time they become obsolete with little or no second hand market. As the computers are no longer valuable, the proper disposal of the information from these computers is considered an insignificant factor for the general user. Whereas for industries and governments, the costs of removing the data from the systems and ensuring all data is properly removed before they are disposed of can be a significant factor. Large organisations tend to dispose of obsolete equipment either through their own procedures or by use of third party organisations. It is clear from the results of the disk study that many organisations have neglected their responsibilities and good business sense in disposing of the data correctly. It is also common practise of organisations to give computers as gifts to members of staff. It is evident from the research that either work from home PCs were given to the staff or that computers from the office environment were given as gifts to the personnel. Often, when this is the case, a simple new operating system is installed over the old operating system, and given to the staff member. This however, does not remove all data from the PC therefore the data can easily be retrieved. The computers still contain business or personally sensitive information. Home users tend to discard their PCs in the conventional manner, in the general purpose rubbish bins, taking them to local civic amenity sites or by selling them on to other private buyers or in some cases, by trading them in or selling them at auction. Home users believe they do not have any data that would be of use to anyone or have taken the steps of deleting the files from the computer. Home users are not aware of the implications of the data that can be retrieved from their computers. The research on the disks that originated from individuals personal computers revealed information that could be used for identity theft This is not just a problem identified in Ireland. In 2003, two MIT students, Simon Garfinkel and Abhi Shelat, performed a study into disks available on the second hand market in the United States of America. The study was to become part of Garfinkel s PhD thesis. The study started out with the students buying 158 used hard drives from computer stores, small businesses and ebay, the online auction site(bruce, 2004). The students recovered a vast amount of financial information and personal information of the disks. 26
3 From this study, similar disk studies have been taking place yearly since 2003, in the United Kingdom, Australia, Germany and other countries with the aim to cause awareness amongst the public of the importance of secure disposal. In January 2005, a joint report was published by the University of Glamorgan in Wales and Edith Cowan University in Australia detailing the investigation of a number of second hand hard disks. The investigation revealed that a large number of the disks examined still contained significant volumes of sensitive information (Jones, A., Mee,V.,et al, 2005). In 2006, British Telecommunications (BT) and Life Cycle Services (LCS) published a report from disks acquired from not only the UK and Australia, but also disks from Germany and North America. Again these disks were purchased at computer auctions, computer fairs or through E-bay in the respective geographic areas (Jones A, Valli C, Sutherland I and Thomas P, 2006). This paper describes the research carried out in Ireland in 2007 that repeated the research performed in previous years in the other countries mentioned. It is the first known study of its kind in Ireland. This paper contains all of the initial results found of the research, reporting the types of data that was found along with the implications of such data. 2. THE RESEARCH A number of disks were acquired from various Irish online auction sites, computer fairs and second hand shops. In total 26 disks were obtained. This seems quite a small number in relation to the number of computers are sold each year in Ireland. In the UK the same study was performed in 2005 and 2006, in which approximately 111 and 200 respectively disks were used. In comparison to the UK this small number was deemed adequate considering the geographical size of Ireland. In 2004 it was estimated that the PC market in Ireland was estimated to be million PCs in This has grown by an estimated 15% annually. However, there are no statistics available for how many of these PCs that are disposed of annually in Ireland. One can estimate that the life of a PC can be estimated as 3 years in the corporate sector, with perhaps 5 to 7 years for the home user. In Australia an estimated 1.6 million computers are disposed of annually (Scott, 2007) The objective of the research was to determine whether there was any information on the disks that was visible or recoverable with readily available tools. These tools used for the research performed similar functions to the Windows Unformat and Undelete commands, and a hex editor that allows the user to view information that existed in the unallocated portions of the disk. These tools are available to anyone who potentially could obtain the disks. 27
4 The research was undertaken using forensically sound methodologies. Each of the hard disks were forensically imaged, and then placed into secure storage. Any further research was carried out on the image of the original disk. While some may query this methodology, as the disks were essentially not computer evidence but discarded equipment, it was thought to be essential practice as it allowed all the research to be performed in a non-intrusive manner, therefore, it did not affect or change any of the original information obtained. It also was used as a precautionary step, as in the research performed in 2006 by BT, material found on two of the disks necessitated them being passed to the police for further information (Jones 2006). In this research, no material was considered necessary to be passed onto the Garda Síochána (Irish Police law enforcement). Once all the disks were imaged, it was then possible to start the analysis. Each of the disks were analysed using the tools outlined above. The analysis was broken into two phases. The first phase of the analysis was to identify whether or not the hard disk had any data that was visible during the initial examination. This involved loading the forensic image and looking to see if a file structure was present. Of the 26 disks, 20 disks were found to have file structures present. This phase was just an initial look at the disk images, no further tools or techniques were used in this phase. The second phase of the analysis was to look for specific information on the disks that would allow for the identification of the user or organisation from where the disk originated. This included usernames, organisation names, addresses, or documents and databases. The purpose of this phase was to establish the amount of the disks that could be traced to the individual or organisation. 3. RESEARCH FINDINGS Of the 26 disks that were obtained for the research, 5 of the disks had mechanical faults and were not accessible. The remaining 21 disks were fully functional, and the following was revealed: Totally blank: (0/21) 0% of the disks was totally blank and contained no file structure or data. This implies that no disks were securely wiped. Attempts of Removal of data: (8/21) 38% Attempts of removal was clear. This was a simple format, a simple delete or where a new installation of an operating system was performed. All of the data on these disks was recoverable, and all data was clearly found. (13/21) 62% of the disks had no attempts of data removal. 28
5 This is similar to previous study in the UK in 2005 where it was clear that an attempt of data removal was clear for 48% of the disks. Operating System: (18/21) 86% of the disks analysed had an installation of the Windows operating system. (2/21) 9.5% of the disks had an installation of the Apple Mac operating system, whereas (1/21) 4.5% of the disks operating system was unrecognisable. This could have been due to the attempts of removal, however, information was still extracted from these disks. Organisation identifiable: (7/21) 33% of the disks originated from the corporate sector, which the organisation could be identified. These ranged from large financial institutions, marketing consultancies, auctioneers, electrical companies, heating and plumbing companies, legal solicitors and mobile communication companies. Information included customer s names and addresses, invoices, financial records of past jobs, s, organisation charts and other relevant documents relating to the organisation. In the UK study in % of the disks originated from the corporate sector, and in % of the disks were identified as corporate. Personal Information: (13/21) 62% of the disks were identified as personal computers, or home user PCs, where (1/21) 5% were unrecognisable. In the UK study in 2005 and 2006, 59% and 49% respectively hard disks contained information that was user identifiable. From the 62% of the Personal computers, (7/13) 54% of the Personal Computers could identify their previous owner, this included names, addresses, phone numbers, date of birth, and in some cases even bank records, and Revenue and Social Insurance (RSI) number. (2/21) 10% of the disks contained RSI numbers. Of the 10% of the Disks, (1/2) 50% was from corporate sector and (1/2) 50% was from private home user. Financial: (5/21) 24% of the disks contained credit card information. (3/21) 60% of these disks that contained credit card information originated from the corporate sector. Alarmingly one of these disks contained a spreadsheet of at least 300 credit card details, along with expiry numbers, names and addresses. This disk came from the corporate sector that was involved in the organisation of sponsorship for a large charity event held in Ireland. Passwords: (10/21) 48% of the disks contained passwords. These ranged from passwords to online sites, sites, mobile phone sites, 29
6 etc. Illegal Material: (12/21) 57% of the hard disks contained illegal material. Of the 57% of the hard disks, (3/12) 25% of the disks were originating from the corporate sector and the remaining (9/12) 75% were from home users. The extent of the illegal material was from illicit photographs, references to illicit sites, or pirated material. Illicit in this context is used to mean images that may be considered to be pornographic. Pirate material may be considered to be pirated music or movies, downloaded illegally from online sources. Period of Life: (20/21) 95% of the disks could identify the period of time when the system was in use. These dates dated from 1994, to as recent as (1/21) 5% of the disks dates could not be identified. The types of information recovered from the disks were quite detailed and specific. A document retrieved from one disk that originated from a marketing consultancy revealed over 300 names, addresses and credit card details from sponsorship of a large charity event held in Ireland. A number of other small organisation s disks revealed RSI numbers for their staff, along with VAT numbers, s containing invoices to customers and also quotations for future work. One particular disk included installation details of electrical work, and also manuals for electrical services installed at various sites around the country, some of which were academic institutions, and civic offices. Another disk found originated from an insurance broker. The disk had full installation of various insurance quotation packages. This disk also revealed lists of potential customers, with contact names, addresses and phone numbers, along with quotation prices. Bank details for this insurance broker were also found on this disk. Day to day running of a solicitors office notes were found on a disk believed to be originated from a leading employment law firm. The disk may have been from the office administrator, as notes were found, and letters of correspondence to clients were also found. These letters contained information regarding various employment law cases, along with names, addresses and contact details of the clients involved. A mobile telecommunications company disk was also found. This disk contained various s to clients. Various credit card numbers, along with names and addresses were found belonging to business customers. Lots of network information was found on this disk, along with internal IP addresses. One gave full details, along with username and passwords, for an internal website. It was evident that this machine was used in the customer 30
7 service department of the company. 4. IMPLICATIONS There are many implications resulting from the data retrieved from the research. These include, and are not limited to: Identity theft The level of information available on the disks that belonged to the corporate sector and individuals could make it possible for identity theft or cloning. This information ranged from name, address, RSI number, address, online banking details, credit card numbers, date of birth and other passwords to online mobile phone accounts etc. In Ireland in 2006, an estimated 15,000 people suffered from some sort of identity theft, and cost to business and consumers of approximately 250 million a year (MxSweep, 2006). Many Personal CVs were found, these could also be used as a great source of information for identity theft. One of the disks revealed information regarding a user using an online networking site. The information revealed a member chatting on an online chat room, relating to pregnancy. In recent reports in Ireland 2 in 5 people who use social online networking sites, have been victims of Identity theft, as people put too much personal information on their sites (Breaking News, 2007). These sites include the popular Bebo, and Facebook. ID theft does not only happen to individuals. In May of this year, M&S in Northern Ireland became a victim of Identity theft security, when one of their laptops was stolen. The laptop contained salary details, addresses, dates of birth, national insurance and phone numbers of some 26,000 employees has been stolen from a printing firm, which was tasked with the job of writing to workers about pension changes (Leyden, J, 2007). Fraud In many cases, the range and dept of information found belonging to the corporate sector would allow a fraudster to either manipulate the information to advantage or to generate false invoices, as many invoices were found on the disks. Other types of fraud could generate false documentation, such as quotes, references or letters of qualifications from the information revealed on the disks. Blackmail Of the PCs which contained inappropriate material, the users could be identified, and hence this information could be used to blackmail the user as they were downloading or browsing pornographic material, and in one instance, while at work. Industrial Espionage The level of information gathered concerning the dayto-day running of various organisations, along with financial figures, customer details, organisation charts, a competitor would be able to perform a very accurate analysis of the financial capability of a number of operations run by 31
8 the organisation. The potential financial cost of this information, becoming known could potentially be rated as high. Legislation neglect Some of the disks that originated from the corporate sector had various levels of information regarding client data. As part of the corporate sector, dealing with clients, they have a responsibility and duty of care for this information from both the business perspective and the individuals in question. The duty of care is incorporated in a range of legislation, the most obvious and relevant area being the Data Protection Act. With all of the disks originating from the corporate sector, 33% in total, it is certain that these were in breach of the Data Protection Act and have failed in their duty of care to the business. 5. CONCLUSIONS The results of the research mirror the results found in the USA in 2003, and the UK and other countries where the research has also been performed in 2005 and This shows that it is an ongoing problem not only in Ireland, but in all parts of the world. The table below shows a comparison of the results of the 2005 and the 2006 disk surveys in the UK along with the results of the study performed in Ireland in Table 1: Comparison of results of the 2005 and 2006 surveys Total Number of Disks UK * 2006* 2007 Total Number of Disks Ireland 26 Faulty/Unreadable 13 (13 %) 90 (36 %) 5 (19%) Wiped 17 (16 % 1 ) 73 (45 % 1 ) 0 (0% 1 ) Commercial Data Present 60 (70 % 2 ) 42 (47 % 2 ) Individual data present 51 (59 % 2 ) 44 (49 % 2 ) 7(33% 2 ) 13 (62% 2 ) 1 Percentages are of the readable disks 2 Percentage of readable disks that had not been wiped * Results taken from UK 2006 report (Jones, 2006) 32
9 This research should make general computer users and members of the public aware of the implications of careless disposal procedures. In the cases of the organisations disposing of their information, members of the public should enquire about the standards and procedures in place for the disposal, as the system could contain their information. Home users should take adequate measurements to dispose of their data also in a manner whereby they are not at risk for their information to be accessed by a fraudster. A simple format or deletion of files will not remove information from the PC hard disk. Large organisations should be aware of the proper disposal of information methods, as it is necessary by legislation. If they have these practises already in place it is clear that their procedures are not being managed properly. Hard drive wiping tools are available, both commercial and freeware, that will adequately overwrite the data on the hard drive. These wiping tools offer user s options of overwriting every sector on the hard drive from once to a hundred times. These tools overwrite every sector of the hard drive with binary 1's and 0's. There are tools available that meet government security standards even overwrite each sector multiple times for added protection. These tools can be found widely on the Internet. Home users and corporate sectors should use such wiping tools before they dispose of their hardware. ACKNOWLEDGEMENTS The author would like to thank all those involved in making the research for this paper possible. These include, Rits Pondera who made the disks available for the research, Rits Information Security personnel who helped and supported the research, and University of Glamorgan making previous years statistics available for this paper. AUTHOR BIOGRAPHY Vivienne Mee is the leading author of this research paper. Vivienne joined Rits Information Security, Dublin in March 2007, as a Computer Forensic Consultant. Before joining Rits, she studied for a number of years up to Doctorate level in Computer Forensics in the University of Glamorgan in Wales. While at the University of Glamorgan, Vivienne also took part in various research studies and work in their forensic lab. At Rits Information Security, Vivienne has completed forensic assignments for blue chip and government clients. Vivienne manages the Computer Forensic Laboratory and is responsible for procedures development and process management. 33
10 REFERENCES Bruce, L., 2004, Removing Financial Data from your Computer, Date accessed: 03/04/08 Jones, A., Mee,V.,et al, 2005, Analysis of Data Recovered from Computer Disks released for Resale by organisations, Journal of Information Warfare, Vol 4 (2) Jones A, Valli C, Sutherland I and Thomas P, 2006, The 2006 Analysis if Information Remaining on Disks Offered for Sale on the Second Hand Market, Journal of Digital Forensics, Security and Law, Vol. 1(3) 23 Leyden, J, 2007, M&S in ID theft flap over stolen laptop, Date accessed: 14/08/07 Breaking News, 2007, MySpace users warned about identity theft, Date Accessed: 14/08/07 MxSweep, 2006, Fear of online identity theft could cost Irish businesses up to 250 million a year, Date accessed: 14/08/07 Scott, R., 2007, What Happens When your Computer or Gadget is Defunct?, Date accessed: 03/04/07 34
The Importance of Data Retention
Section 2 Information Systems Security & Web Technologies and Security Abstract Information Security Leakage: A Forensic Analysis of USB Storage Disks A.Adam and N.L.Clarke Centre for Information Security
Hard drives dumped; information isn't DON'T BE SMUG IN THINKING PERSONAL DATA HAS BEEN ERASED By Larry Magid Special to the Mercury News
Erase Your Hard Drive Permanently erase files, emails, & Data from hard drive. Guaranteed! O&O DiskRecovery V3.0 Data Recovery for Windows with DeepScan function - Free Trial Delete porn history files
How to protect your identity. Identity fraud explained
How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,
EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS
Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.
How To Manage A University Computer System
PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
Zombie Hard disks Data from the Living Dead
Zombie Hard disks Data from the Living Dead Iain Sutherland 1,3, Gareth Davies 1, Andy Jones 2, 3, 4, Andrew J.C. Blyth 1 1 University of Glamorgan Information Security Research Group Pontypridd, Wales,
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
University of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
Our agreement with you
Our agreement with you Virgin Credit Card Terms CREDIT CARD AGREEMENT REGULATED BY THE CONSUMER CREDIT ACT 1974 You can ask us for a copy of this agreement at any time. 1. Who provides the credit card?
Chapter 15: Computer Security and Privacy
Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some
Terms & conditions Section 1. General Information
Terms & conditions Section 1. General Information Your Credit Manager membership is governed by 3 separate key documents (together, your agreement ): 1) Your welcome letter (which you will have received
Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone: 020 8315 0005. Email: [email protected].
Business details Services and price list 2010 Monday Friday 10:00am 6:00pm Saturday 10:00am 5:00pm We offer professional IT services for home and business users at a cost effective price. We have a team
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
How To Make A Contract Between A Client And A Hoster
Web Hosting Terms & Conditions Please read these web-hosting terms carefully, as they set out our and your rights and obligations in relation to our web hosting services. AGREEMENT: Whereas: (1) The Ruby
Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer
1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists
IT Trading UK Ltd Computer & IT Equipment Disposal Specialists Unit 4A Scott's Close, Downton Business Centre, Downton, Salisbury, Wiltshire, SP5 3RA Tel: 01725 513403 Fax: 01725 513714 Email: [email protected]
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
ABERDARE COMMUNITY SCHOOL
ABERDARE COMMUNITY SCHOOL IT Security Policy Drafted June 2014 Revised on....... Mrs. S. Davies (Headteacher) Mr. A. Maddox (Chair of Interim Governing Body) IT SECURITY POLICY Review This policy has been
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
Grasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
MORTAL Membership Terms and Conditions
MORTAL Membership Terms and Conditions 1. General This document sets out the terms and conditions of your Membership and is the agreement between You and MORTAL Limited. It is important that you read and
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
POLICY AND PROCEDURE FOR THE DISPOSAL OF AN ASSET
POLICY AND PROCEDURE FOR THE DISPOSAL OF AN ASSET POLICIES Scope Assets are the property of the University and it is therefore essential that the act of disposing of an asset is in accordance with University
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Providing utility procurement solutions for SME & Corporate customers across the UK & Ireland...
In Partnership with IU Consult: Providing BMF Members with Competitive Energy Prices The British Marine Federation (BMF) is always looking to find ways to save its members money, so therefore we have partnered
Personal Injury? What to Do?
Personal Injury? What to Do? 1 If you have been involved in a road traffic accident, an accident at work or an accident in a public place, you may be liable for a compensation! Every personal injury case
This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business.
FSA factsheet for All firms This factsheet is for: Senior management of small firms that handle, store or dispose of customers personal data in the course of their business. It explains: What you should
How To Cancel A Passport In North Ireland
Cancellation of Passports Introduction Deceased holders Information provided to the public Changes to Death Certificates in Northern Ireland Passports containing visas Passport cancelled on system: holder
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead
Gadget Insurance. Terms and Conditions. @ w. phone: email: web
phone: email: web @ w Customer Services 1890 818 040 [email protected] www.protectyourbubble.com Gadget Insurance Terms and Conditions Gadget Insurance Terms and Conditions This
SMALL BUSINESS REPUTATION & THE CYBER RISK
SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to
(1) Helastel Ltd. (2) You WEBSITE HOSTING AGREEMENT
(1) Helastel Ltd (2) You WEBSITE HOSTING AGREEMENT Helastel Ltd Website Hosting Agreement 1 THIS AGREEMENT IS BETWEEN: (1) Helastel Ltd a company registered in United Kingdom under number 05146061 whose
7-Eleven Prepaid Visa Card
7-Eleven Prepaid Visa Card TERMS AND CONDITIONS 03.2013 Terms & Conditions of the Card Australia and New Zealand Banking Group Limited ABN 11 005 357 522 ( ANZ ), AFSL 234527 is the issuer of this 7-Eleven
ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DIRECT END USER LICENCE
ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DIRECT END USER LICENCE Introduction This licence permits the use of PAF Data by an end user. Details of other licences available for the use of PAF Data can
MOBILE PHONE & COMPUTER USE POLICY
MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.
Pet Metrics: Consumer Approaches to Pet Insurance in Selected Global Markets
Pet Metrics: Consumer Approaches to Pet Insurance in Selected Global Markets Series Prospectus August 2014 1 Prospectus contents Page What is the research? Which titles are available? What is the rationale?
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Words defined in the Trading Platform Terms and Conditions have the same meaning in this Acceptance form. The same rules of interpretation apply.
Acceptance form for Black People This Acceptance form is part of the Welkom Yizani Trading Platform Terms Conditions. If you want to trade on the Welkom Yizani trading platform, you must sign this document
Notes. Business Management. Higher Still. Higher. www.hsn.uk.net. HSN81200 Unit 1 Outcome 2. Contents. Information and Information Technology 1
Higher Business Management Unit 1 Outcome 2 Contents Information and Information Technology 1 Data and Information 1 Information Sources 1 Information Types 2 The Value of Information 3 The Use of Information
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
The Impact of Hard Disk Firmware Steganography on Computer Forensics
The Impact of Hard Disk Firmware Steganography on Computer Forensics Iain Sutherland Faculty of Advanced Technology University of Glamorgan CF37 1DL +44(0)1443 654085 isutherl @glam.ac.uk Gareth Davies
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Terms & Conditions SECTION 1. GENERAL SECTION. Your eligibility. Definitions of words used in your agreement
Terms & Conditions SECTION 1. GENERAL SECTION Your Identity Secure membership is made up of 2 key documents - your welcome letter or email and this document which includes the Terms and Conditions and
Cumberland Business Debit Card. Terms & Conditions
Cumberland Business Debit Card Terms & Conditions These Conditions apply to the use of business debit cards issued by Cumberland Building Society ( the Society ) by which you can: withdraw money, or obtain
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Website Hosting Agreement
Website Hosting Agreement This Agreement is Between: (1) Tutch Media Limited, a company registered in England whose office is at 121c London Road, Knebworth, Herts, SG3 6EX ( the Host ) and (2) The Client
The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.
Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together
Words In The News. Teacher s pack Lesson plan and student worksheets with answers
Words In The News Teacher s pack Lesson plan and student worksheets with answers Britain information blunder 21 November 2007 CONTENTS 1. Level, topic, language, aims, materials 2. Lesson stages 3. Student
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
Helping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
TOP TRUMPS Comparisons of how to pay for goods and services online
Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face
Acceptable Use of Information Systems Standard. Guidance for all staff
Acceptable Use of Information Systems Standard Guidance for all staff 2 Equipment security and passwords You are responsible for the security of the equipment allocated to, or used by you, and must not
HSBC Insurance Aspects: Mobile Phone Insurance
HSBC Insurance Aspects: Mobile Phone Insurance Policy Terms and Conditions Please read this policy document and keep it for reference Please take time to read this booklet as it contains important information
Your Virgin Essential Current Account
Your Virgin Essential Current Account The Terms July 2015 These are the Terms of your Virgin Essential Current Account. These Terms, along with our Welcome guide, make up our agreement with you. We give
Special Terms and Conditions Debit MasterCard Personal Card
www. danskebank. co. uk Special Terms and Conditions Debit MasterCard Personal Card Ef fect ive from 15 September 2015 Special Terms and Condit ions - Debit MasterCard Personal Card These Special Terms
Perception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
ATM/Debit Terms and conditions
ATM/Debit Terms and conditions www.bankofireland.com Bank of Ireland is regulated by the Central Bank of Ireland. 37-1108R (11/11) Terms and Conditions ATM Card and Visa Debit Card 1.0 Definitions of Terms
The guidance applies to all records, regardless of the medium in which they are held, including e-mail, spreadsheets, databases and paper files.
Best Practice in Disposing of Records For whom is this guidance intended? This guidance is intended for all University staff that need to dispose of records, on an occasional or regular basis. It is likely
IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper
IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper A data breach has the potential to cost retailers millions in lost customers and sales. In this paper we discuss a number of possible
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your
Journal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
Your guide to getting the most from your card
Your guide to getting the most from your card Ulster Bank debitcard Welcome to your Ulster Bank debitcard Your Ulster Bank debitcard is accepted in 30 million outlets around the world wherever you see
Terms and Conditions for Experian s website services
Terms and Conditions for Experian s website services Last Modified Version: 2.1 Dated: 17/12/14] Contents list 1. Definitions 2. About us 3. Important information about these Terms and Conditions 4. Our
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Basic cash account. This document can be made available in Braille, large print or audio upon request. Please ask any member of staff for details.
Basic cash account www.bankofireland.co.uk This document can be made available in Braille, large print or audio upon request. Please ask any member of staff for details. Bank of Ireland UK is a trading
Registered No. xxxx. * Electrical Contracting Limited is a small company as defined by Section 350 of the Companies Act 2014.
(SMALL COMPANY*) DIRECTORS REPORT & FINANCIAL STATEMENTS YEAR ENDED 31 DECEMBER 2014 Registered No. xxxx * Electrical Contracting Limited is a small company as defined by Section 350 of the Companies Act
CUSTOMER COPY Credit Agreement
CUSTOMER COPY Credit Agreement IMPORTANT INFORMATION 1. Amount of credit limit: Credit limit is notified to you from time to time. 2. Duration of agreement: No fixed period, see Condition 8 of the Terms
