Correct information destruction procedures have become increasingly more important in light of legislative developments concerning Data Protection. Brian Sims examines the escalating problem of ID theft in UK plc, and outlines ways in which security professionals might dispose of confidential material to help tackle the issue. Photographs courtesy of the BSIA

March 1998... Punch magazine carries out some undercover work, including a random check on rubbish bags outside 14 banks. Reporters uncover what should have been confidential information concerning more than 5,000 customers (which would have rendered the banks liable to Court proceedings under the Data Protection Act 1998)...

1999... In the Mohammed-Al-Fayed versus Neil Hamilton Court case, documents detailing the proposed line of questioning by Hamilton’s legal team are allegedly discovered in bins outside their premises. These documents are then sold on to the Harrods business mogul ahead of the trial...

Later in the year, a number of ‘wiped’ computers from Deutsche Bank are obtained by individuals who re-constitute the hard drives and duly uncover details of share dealings involving high profile customers such as former Beatle Paul McCartney...

2000... The rubbish bins of three Cabinet ministers are rummaged as part of a ‘dirty tricks’ campaign. It emerges that one of Tony Blair’s key advisers has thrown away sensitive memos received from the Prime Minister along with the rest of his household waste...

There’s more... 75% of the UK’s local authorities claim that the ‘tactic’ of ‘bin raiding’ is taking place regularly within their areas of jurisdiction (‘Is it really a load of old rubbish?’, SMT, June 2005, p43-44). Those bin raiders would have had a field day if they’d come across the findings of a recent report published by credit reference agency Experian investigating the information disposed of by businesses and private householders alike. An agent to the stars, for example, was found to have ‘canned’ records containing the names, addresses and mobile numbers of well-known film and TV personalities... A travel agent discarded photocopies of passports showing passport numbers, dates of birth and photos.

Again, there’s more... An educational establishment threw away the full financial details of applicants for some of its courses... A mortgage broker had disposed of numerous completed mortgage applications containing clients’ financial details.

ID theft: a massive problem

Whether you are a security professional, the head of a corporation, a politician or a member of the general public, the latest Government statistics on identity theft make for uncomfortable reading. Home Office studies estimate that more than 100,000 individuals are affected by this type of theft each year, costing the British economy over £1.3 billion per annum.

Today’s more intelligent breed of criminal is committing identity theft by stealing personal information – either in written form, by making contact with someone and pretending to be from a legitimate organisation or by logging-on to the Internet. On that note, cybercrime – as the computer ‘whizzkids’ have dubbed it – is now costing UK businesses something in the region of £2.4 billion every year. Unsuspecting individuals are susceptible to identity scams when they’re shopping online, banking online or even when voting in a General or Local Election (as demonstrated by the controversy surrounding postal ballots submitted for the recent St Albans By-Election in Hertfordshire).

From a business perspective, confidential data in the form of directors’ signatures and financial information can provide criminals with more than enough ammunition to defraud a company. And don’t forget customer records, marketing plans, internal memoranda, the minutes of meetings, payroll data, costings, (new) product information, personnel details, flipchart materials from seminars and workshops. Even rough notes. Oh yes, and let’s not fail to mention computer hard disks and CDs/DVDs. In the wrong hands, information gleaned from all of these media might even bring a business to its knees.

Sadly, a great many corporations are ignorant of this problem and its side-effects. They remain so at their peril... An increased focus in society on personal privacy and wider confidentiality issues inevitably means a far greater scrutiny of business performance in relation to this issue. Perceived shortcomings may well lead to reputational damage that is nigh on impossible to repair.

The Data Protection Act 1998

Ignorance is most certainly not bliss. The responsibilities of organisations relating to confidential data have become far more stringent since the implementation of the Data Protection Act 1998 from March 2000. Companies must destroy (under secure conditions) any data containing personal information (including name, address, financial and legal details). The Act itself covers computer records, information held in manual files (eg index cards and filing systems, etc), computer disks and CDs.

Corporate concerns must now have a Data Control Policy in place, and use processing methods that indicate they are employing appropriate methods to prevent unlawful processing/disclosure of data, and the accidental loss or destruction of – or damage to – personal data. Putting information in the bin and hoping that it will be destroyed in an appropriate manner at a later juncture was never the answer, and most certainly isn’t now.

The aforementioned Act states that if a company’s appointed Data Controller (ie those originating the data) is using a sub-contractor as their preferred data processor, then they must choose one that offers cast-iron guarantees on security measures, and one that takes reasonable steps to ensure compliance with those measures. There must also be a legally-binding, written contract in place between Data Controller and Data Processor such that destruction is evidenced in writing (this is covered under Principle 7 of the Act).

Make no mistake that both client and data destruction company are both liable for any breaches of the Data Protection Act 1998. Penalties for non-compliance can now include a fine of up to £5,000, the threat of a criminal record for company directors and/or the company Data Controller and, ultimately, the closure of a going business concern. As you can see, ID theft and the need for destroying confidential data are very serious matters indeed. Be warned: at present, the trend is that prosecutions are on the increase.

Assess your security risks

Security and IT managers seeking to tackle this issue need look no further than the British Security Industry Association (BSIA), which has just produced a dedicated audit procedure (see panel ‘The Security Waste Audit’ on page 31) designed to encourage all businesses to assess the risk of identity fraud and related crimes.

Quite rightly, the Association’s emphasis shies away from the use of conventional waste or recycling companies since they are unlikely to provide the necessary degree of security to ensure that important documents do not fall into the wrong hands. The employment of professional information companies, on the other hand, can help in ensuring that your Data Protection requirements are met by shredding documents to a size from which vital details cannot be obtained, using thoroughly vetted personnel and providing a full and comprehensive audit trail concerning the whereabouts of confidential data.

In practice, professional information destruction companies will collect confidential waste at source and provide a fully-trackable service up to the point of destruction. The actual destruction process consists of waste collection by secure transport, inspection, the removal (and destruction) of rubbish and the shredding, pulping and recycling (or incineration) of other materials. Some companies also provide mobile services that can take care of destroying waste on site.

Those on the BSIA’s list of endorsed companies include: Brett Waste Management, the Control Recycling Group, Confidential Destruction Services, London Recycling, the PW Commercial Company, Securishred and Shredall. A full listing is available on the BSIA’s web site at www.bsia.co.uk/shredding

Checklist for in-house managers

For the in-house security manager to guarantee this level of professional service from their chosen information destruction company, they must make sure that the organisation they select to entrust with their data is reliable, and operates to quality standards. A useful checklist by which to abide runs as follows:

  • ensure that the information destruction company has a genuine understanding of your needs and is capable of helping you to improve upon your ID processes (ie they must not be providing a mere ‘off-the-shelf’ solution);
  • ensure that the company concerned is well-equipped to undertake ID work in your region (ie are their only premises away from your region, and what problems might this cause?);
  • check on their ability to provide a quality service that’s consistently in line with your company’s needs (BSIA-registered and approved companies, for example, must be registered to the quality system standard BS EN ISO 9000, and adhere to the Association’s defined Code of Practice);
  • adherence to standards should encompass staff vetting… do the company’s procedures instil you with confidence in relation to their employees’ honesty and professionalism?;
  • the ID company you choose must have a demonstrably comprehensive knowledge and understanding of the Data Protection Act 1998, and be capable of giving you advice on this;
  • the company should be officially registered as a waste carrier with the Office of the Information Commissioner (this can be verified by logging on to the Data Protection web site at www.informationcommissioner.gov.uk)

A reputable data disposal company will also provide you with a signed Certificate of Destruction for each completed batch of documents, etc. Be aware of the need for a signed Duty of Care waste transfer note when waste is handed over for destruction.

What is being done?

In collaboration with other Government departments, various private sector organisations, finance houses and the police service, the Home Office has established the Identity Fraud Steering Committee (www.identity-theft.org.uk) with the aim of leading a cross public/private sector work programme aimed at tackling identity theft and identity fraud. The programme is designed to co-ordinate existing activity while also identifying new projects and initiatives.

In terms of developing and sharing Best Practice, the Home Office, the UK Passport Service and the Driver and Vehicle Licensing Agency have worked closely with the Association of Payment Clearing Services, the Finance and Leasing Association and CIFAS (the UK’s Fraud Prevention Service) to support the production of ‘Identity Fraud: The UK Manual’. This manual includes examples of known security features from UK passports and driving licences, providing guidance to help spot forgeries immediately.

In addition, last September the Home Office minister Andy Burnham launched an awareness campaign to advise members of the public on how to avoid becoming a victim of identity theft and fraud, and details of the action to be taken if you’re ‘caught’.

The Security Waste Audit

Product destruction is the fastest-growing sector of the ID industry. Of the estimated 150,000 tonnes of waste destroyed by BSIA-registered ID companies each year, approximately 30,000 tonnes is made up of non-paper material (such as IT equipment, uniforms, branded goods and counterfeit items), writes Brian Sims.

With identity theft on the rise, the secure disposal of confidential data is absolutely essential. To this end, the BSIA’s ‘Security Waste Audit’ is designed to make companies think twice about their current attitudes to waste disposal.
If you can answer ‘No’ to one or more of the following questions, then you should consider reviewing your shredding and recycling procedures:

  • have you assessed the risk to your business
    if your confidential information falls into the wrong hands?

  • do you dispose of your paper records separately from your general waste?

  • identity theft is growing – do you know what happens to your company’s waste materials prior to collection?

  • are you aware of the responsibilities you harbour as a Data Controller under the terms of the Data Protection Act 1998?

  • have you drawn up information procedures,
    and are you satisfied that they are being carried out?

  • do you use an ISO 9000-approved company to
    destroy your confidential waste?

  • does your contractor provide a Certificate of
    Destruction and a fully-auditable trail to an approved standard?

  • would you like to see more secure recycling
    within your company?

  • Security Management Today readers can download a free copy of the ‘Security Waste Audit’ at: www.bsia.co.uk/shredding

How secure are your company’s electronic documents?

Electronic documents created on computer systems will often be sent under manual or automatic control to other systems.

Many existing electronic document communications systems are insecure, and thus there is a possibility of the files being intercepted and amended during the transmission process without the knowledge of the sender and/or the recipient, writes Brian Sims. With this in mind, users of electronic communication systems are being asked by their companies, Government departments and other employers to review the legal issues relevant to their deployment.

BSI Business Information has just published a new Code that defines operational procedures which comply with Best Practice in the field of electronic document communications. The Code offers recommendations on how organisations can implement well-controlled and structured systems – with minimum risk to authenticity and of any security breaches. Compliance with the Code represents responsible business management.

The ‘Code of Practice for Legal Admissibility and Evidential Weight of Information Communicated Electronically’, authored by Peter Howes and Alan Shipman, is particularly relevant where evidence is required in disputes outside of the legal system. It concentrates on e-mail, SMS, web services, XML and electronic data interchange.

Copies are available, priced at £55, direct from BSI Customer Services (telephone 020 8996 9001, e-mail: orders@bsi-global.com)

Fraud prevention: useful web sites for the security manager


The following web sites provide general information and advice on fraud and how to protect yourself and members of the company from becoming a victim...

www.homeoffice.gov.uk The main Home Office web site
www.homeoffice.gov.uk/crime-victims/reducing-crime/fraud Fraud information page on the Home Office’s main site
www.uk-fraud.info The Fraud Reduction web site is published by the National Working Group on Fraud on behalf of ACPO, and deals primarily with commercial fraud in a policing context – the information contained in these pages is intended to teach individuals and businesses how they can recognise fraud, how to avoid it (through various preventative measures) and how to respond to suspected frauds www.crimestoppers-uk.org Details of how to report crimes, with the option of reporting anonymously
www.fco.gov.uk Know before you go... Tips for keeping documents and money safe while working or travelling abroad courtesy of the Foreign and Commonwealth Office