Header image

Lewisham Residents Caught in 11 Month Data Breach

156 residents affected by breach of personal data.

The personal details of residents of Lewisham Council were published online and remained online for almost a year.

According to BBC News, the names, addresses and contact details of 156 people were uploaded to Lewisham Council’s website and remained online for 11 months.

The details related to residents who had commented on the planning application for Hither Green railway station, and the council subsequently removed the document containing the residents’ details and wrote to those whose details were published.

The council said the breach did not meet the threshold for notifying the Information Commissioner’s Office (ICO), the public body responsible for data privacy.

An ICO spokesperson said organisations must notify the ICO within 72 hours of becoming aware of a personal data breach, unless it does not pose a risk to people’s rights and freedoms.

“If an organisation decides that a breach doesn’t need to be reported they should keep their own record of it, and be able to explain why it wasn’t reported if necessary," a spokesperson said.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

11
Jul

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image