News Hub

PSNI data breach: The role of human error and how to prevent it

Written by Mon 21 Aug 2023

The Police Service of Northern Ireland (PSNI) suffered its worst ever data breach after personal information of all of its 10,000 staff was mistakenly published online due to ‘human error’.

What happened?

The accidental publication of a spreadsheet containing more than 345,000 pieces of data on the website ‘WhatDoTheyKnow’ stemmed from a Freedom of Information (FOI) request, which had asked for a breakdown of PSNI staff and their ranks. The exact question was ‘Could you provide the number of officers at each rank and number of staff at each grade?’.

In addition to the requested information, the spreadsheet also included staff surnames, initials and other data including their base, unit, and responsibility.

The information was available online for over two hours before being taken down by PSNI, but it is not yet clear to what extent the spreadsheet was accessed and shared, and by whom.

It has now been revealed that PSNI is also investigating a second data breach relating to the theft of a spreadsheet containing the names of more than 200 serving officers and staff, as well as a police laptop and radio, from a private vehicle in Belfast.

Why are the effects of this breach so potentially harmful?

The disastrous effects that data breaches can have on organisations have been well noted. On face value, one may question the severity of this case – after all, the disclosed data contained names and job titles – information, which can often be easily found in the public domain.

However, the political context is important here to be able to understand the scale of the incident and the potentially serious consequences for the individuals involved.

PSNI have long been the target of threats and physical attacks – most recently in February 2023 – by dissident groups in the region. The terrorist threat level in Northern Ireland was raised to ‘severe’ in March this year due to the fatal shooting of an off-duty PSNI officer.

The public identification of individuals serving on the force has therefore caused them to fear for their personal security, especially as many had been keeping their association with PSNI a secret – including from friends and family.

The role of human error in a data breach

The cause of the data leak in this case was down to a ‘simple’ human error with a ‘monumental’ impact. This is unfortunately not uncommon.

According to a research report by Stanford University and Tessian, 88% of all data breaches are caused by human error, including falling susceptible to phishing, sending emails to the wrong recipient and reusing weak passwords.

Although manual processes are inevitably subject to an element of human error, it is important to ensure that appropriate, and often simple, controls are implemented to mitigate these risks. For example, documents can be marked highly sensitive, made password-protected and certain information can be encrypted.

How to prevent data breaches and what is required by data protection regulation?

In the case of data breaches, especially sensitive situations like the case of PSNI, the focus is often on how to remedy the breach, and less on how to prevent breaches from occurring in the first place and ensuring compliance with legal obligations in relation to personal data.

This is particularly the case in time-pressured situations, such as FOI requests, which have a deadline of 20 days, increasing the risk of human error. This makes it imperative for organisations to fully understand their obligations under data protection regulation from the outset.

There are a number of data protection principles and rules to mitigate data breaches:

  • Data minimisation and purpose limitation: Personal data must be collected and processed only as necessary for the intended purpose and for specified, explicit and legitimate purposes. In the PSNI case, the spreadsheet containing the additional information not required by the FOI request goes beyond these principles and increases the risk of harm to individuals.
  • Technical measures and safeguards: Organisations are required to implement appropriate technical and organisational measures to ensure an adequate level of security for personal data and to protect it from unauthorised access, disclosure, alteration or destruction. The fact that the sensitive PSNI information was able to be so easily disclosed by one individual, and the data was not password protected or encrypted, highlights the lack of safeguards in place to prevent such an incident and to minimise any impact on individuals.
  • Accountability, reporting and notification requirements: Organisations are required to notify the relevant supervisory authority of a personal data breach within 72 hours of becoming aware of it, unless the breach is unlikely to result in a risk to individual’s rights and freedoms. In the case of the PSNI, the authority is the Information Commissioner’s Office (ICO). Here, the information was taken down quickly by PSNI and reported to the ICO within the relevant window.

Key takeaways

The PSNI case is a reminder of how even what appears to be a minor human error can have significant and far-reaching consequences. It highlights the need for organisations to implement and maintain robust data handling practices and security measures and that any individuals handling personal data are sufficiently trained and vigilant in the face of incidents.

Until a security-by-design mindset is adopted and integrated into an organisation’s daily operations and wider business plan, the number of incidents will continue to rise.

Norfolk and Suffolk Police released personal data of over 1,000 victims of crime as part of a FOI request due to a ‘technical error’.

Although not all cases will have the same external factors as with PSNI, it can be useful to conduct a risk assessment of foreseeable consequences and wider implications of a potential breach to help shape an organisation’s approach to data governance.

As is the case in the context of cyberattacks, it is important for organisations to ensure that they consider their legal obligations from the outset and to consult lawyers early on to assist with tailored drafting and reviewing policies and procedures as well as in the aftermath of a data breach.

Next steps

The ICO has said in its statement that it is currently investigating the incident as a matter of urgency but that it can’t determine the extent to which the personal data disclosed was accessed before it was taken down. However, it is working with PSNI to assess the level of risk and to mitigate any harmful consequences.

PSNI apologised for the error and emphasised its commitment to investigating the circumstances surrounding the breach, as well as working with the ICO to mitigate any security risks to officers and their families.

About the Author

David Varney is a partner in the technology team at independent UK law firm Burges Salmon. He advises on a range of data protection, technology, intellectual property and commercial matters for clients in a number of sectors, including technology, financial services, media, retail and energy.

Marija Nonkovic is a solicitor in the commercial team at Burges Salmon. She has a specific focus on technology and data protection.

Hungry for more tech news?

Sign up for your weekly tech briefings!

Written by Mon 21 Aug 2023

Send us a correction Send us a news tip