Wednesday, February 12, 2025
HomeCyber Security NewsNorthern Ireland Police to Pay £750,000 Fine Following Data Breach

Northern Ireland Police to Pay £750,000 Fine Following Data Breach

Published on

SIEM as a Service

Follow Us on Google News

The Police Service of Northern Ireland (PSNI) has been ordered to pay a £750,000 fine following a significant data breach last year.

The breach involved the accidental release of the personal details of 9,400 officers and staff. Despite representations to the Information Commissioner’s Office (ICO) to reduce the penalty, the fine remains unchanged.

Details of the Data Breach

In August last year, the PSNI inadvertently published sensitive information under a Freedom of Information (FOI) request.

This included personnel’s surnames, initials, ranks, and roles. The data was available online for several hours before removal but not before dissident Republicans obtained it.

The UK’s Information Commissioner, John Edwards, labeled this incident “the worst data breach” his office encountered.

He emphasized the severe impact on PSNI officers and staff, many of whom had taken measures to conceal their employment due to security concerns.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

Financial Implications for PSNI

According to the BBC report, Chief Constable Jon Boutcher regretted the fine, highlighting its impact on the PSNI’s strained budget.

The service faces a £34 million shortfall, and Boutcher noted that the penalty would “further compound” financial challenges. He stated that the PSNI has implemented measures to mitigate risks and protect its workforce since the breach.

These include crime prevention advice and support for officers and their families. 

The ICO had initially considered a £5.6 million fine but reduced it in recognition of the organization’s public nature. Despite this concession, the £750,000 fine is still the largest ever imposed on a public body in the UK.

Reactions and Accountability

The Police Federation also voiced disappointment over the financial penalty. Chairman Liam Kelly argued that funds could have been better allocated to enhance data security and invest in community initiatives like road safety and CCTV partnerships.

However, Information Commissioner John Edwards maintained that accountability has been upheld even if no individual job losses occurred.

He reiterated that his role is to protect information rights through appropriate fines. The incident underscores the critical importance of robust data management practices within public bodies, especially those handling sensitive information. 

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing...

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing...