Filter
Back

Keeping Your Laptops Safe and Sound: How and What Should Be Done?

2017-07-31

Introduction

The Privacy Commissioner for Personal Data (the “Commissioner”) has recently published an Investigation Report on the loss of two notebook computers containing personal data of about 1,200 Election Committee members (the “EC members”) and about 3.78 million Geographical Constituencies electors including EC members (the “Electors”), which were under the custody of the Registration and Electoral Office (the “REO”), as reported on the day following the 2017 Chief Executive Election.

In this newsletter, we shall discuss the findings of the Commissioner and the precautions that we should take in order not to make the kind of mistakes similar to the REO.

The Laptops

There are two laptops involved in this case. The first laptop contained the names of the EC members only (the “First Laptop”). The second laptop contained names and addresses available to the public in the Final Register of Electors as well as the Hong Kong Identity Card numbers of all the Electors (the “Second Laptop”). All the information has been encrypted and protected by multiple encryptions that are extremely difficult to break through. Upon discovering the loss of these laptops, the REO verbally notified the office of the Commissioner of the matter and also submitted a “Data Breach Notification Form”, which prompted the Commissioner’s investigation as required under section 38 of the Personal Data (Privacy) Ordinance (Cap. 486) (the “Ordinance”).

The relevant principle under the Ordinance in this case is Data Protection Principle (“DPP”) 4(1), which provides that:

“All practicable steps shall be taken to ensure that personal data… held by a data user [being the REO] are protected against unauthorized or accidental access… loss or use having particular regard to –

(a)     the kind of data and the harm that could result if any of those things should occur;

(b)     the physical location where the data is stored;

(c)     any security measures incorporated (whether by automated means or otherwise) into any equipment in which the data is stored;

(d)     any measures taken for ensuring the integrity, prudence and competence of persons having access to the data; and

(e)     any measures taken for ensuring the secure transmission of the data.”

As there are five factual elements under DPP 4(1) to be considered by the Commissioner, the fact-finding process during the investigation was immense.

Findings

The First Laptop

With regard to the First Laptop, the Commissioner took the view that harm would unlikely be done to the EC members even if their names were leaked due to the loss as it contained only the names of the EC members which are public data anyway and are not considered as sensitive personal data. The security measures (i.e. the use of passwords and the location of the First Laptop being in a locked room) were adequate. The Commissioner also considered that it was acceptable to download the names of the EC members for the purpose of recording the re-issuance of name badges.

In the circumstances, the Commissioner concluded that the REO did not contravene DPP 4(1) of the Ordinance for the loss of the First Laptop.

The Second Laptop

As the Second Laptop contained Hong Kong Identity Card numbers of all the Electors, they are considered as sensitive personal data which are not accessible by the public members. The Electors would suffer serious harm if culprits obtain the data. The Commissioner found that the REO contravened DPP 4(1) of the Ordinance based on the following reasons:

  • the REO brought all Electors’ data for the Chief Executive Election where only 1,194 EC members were eligible to vote, which is a disproportionate and imbalanced act;
  • the REO did not set out clear policies or internal guidelines on the storage of Electors’ personal data in the laptops and the protection measures needed; and
  • the security measures adopted by the REO were not proportional to the degree of sensitivity of the data and the harm that might result from a security incident.

The Commission served an enforcement notice on the REO directing it to (i) prohibit the download or use of Geographical Constituencies electors’ personal data (except their names and addresses) for the purpose of handling enquiries in Chief Executive Elections; (ii) issue notice on this to the relevant staff on a regular basis; (iii) set internal guidelines in respect of the processing of personal data; and (iv) implement effective measures to ensure staff’s compliance with the above policies and guidelines.

Are you one of the Electors whose personal data are being stolen?

If you were one of the Electors whose personal data were stored in the missing Second Laptop and have suffered damages due to the contravention of the REO, you may be able to rely on section 66(1) of the Ordinance for compensation from the REO for damages. Nonetheless, the REO may be able to rely on the defence under section 66(3) that the REO had taken care in all the circumstances that was reasonably required to avoid the contravention concerned.

Do you carry your corporate laptop around?

We all know the importance of keeping our personal laptops safe or else our personal data could easily be disclosed to unauthorised persons. The basic security measures include setting a boot password to the laptop, using data encryption and never leave the laptop unattended. However, if you often carry your corporate laptop to places, chances are that you will need more than the basics. Corporate laptops may, say, for example, contain information of clients, so technical security measures should be heightened. In light of what were suggested by the Commissioner to the REO and in order not to contravene DPP 4(1) of the Ordinance, we suggest that the following measures should be put in place insofar as reasonably practicable:

  • Encryption – laptops should be protected by multiple encryption layers where the strongest layer should meet the industrial standard;
  • Password – for every unsuccessful login after inputting the wrong passwords, the protection layer should delay the login time so as to strengthen the difficulty of decryption. Two-factor authentication should also be adopted for accessing client’s data; and
  • Internal practices – if passwords to access client’s data are shared amongst the staff, encrypted emails should be used to circulate such passwords. A comprehensive guideline should also be provided to staff members requiring them to transmit passwords through reliable means.

Although it is not a statutory requirement for data users to inform the Commissioner or the data subjects about any data breach incident, in case of breach, data users should consider reporting the matter promptly, since it would not only mitigate the potential harm but also help improve the security system in the future.


For enquiries, please feel free to contact us at:

E: employment@onc.hk                             T: (852) 2810 1212

W: www.onc.hk                                           F: (852) 2804 6311

19th Floor, Three Exchange Square, 8 Connaught Place, Central, Hong Kong

Important: The law and procedure on this subject are very specialised and complicated. This article is just a very general outline for reference and cannot be relied upon as legal advice in any individual case. If any advice or assistance is needed, please contact our solicitors.
Published by ONC Lawyers© 2017

Our People

Michael Szeto
Michael Szeto
Partner
Michael Szeto
Michael Szeto
Partner
Back to top