Nationwide blanch at laptop theft

Information on an unknown number of Nationwide customers that was held on a company laptop has been stolen from an employee’s house.

Information on an unknown number of Nationwide customers that was held on a company laptop has been stolen from an employee’s house.

A spokesperson for the building society said a customer data set to be used for market research was on the password-protected laptop stolen during a “normal domestic burglary”.

The information did not include customer’s password, Pins or account balance information and could not be used on its own to commit ID fraud, the spokesperson added.

“Customers haven’t lost a penny, nor will they. We have a customer promise that if you’re a victim of fraud, you won’t pay.”

But the spokesperson said Nationwide could not provide information on the number of customers whose data had been on the laptop because this could hamper police inquiries.

The building society is cooperating with the police and the Financial Services Authority over the data theft.

Laptop data security is a matter of increasing concern. A survey released in August by the Ponemon Institute and data security firm Vontu revealed that more than four out of five firms had lost a laptop computer containing sensitive data in the past year.

The scale of potential losses was illustrated by the theft of a US Department for Veterans Affairs laptop holding confidential information on 26.5 million former soldiers.

Comment on this article: computer.weekly@rbi.co.uk

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close