|
|
<p>The following computers, mobile telephones, BlackBerrys and other pieces of IT equipment have been lost or stolen from the Department in the financial year 2010-11, 2011-12 and 2012-13:</p><p><table><thead><tr><td valign="top">2010-11<br /></td></tr><tr><td valign="top">Itemslost or stolen from theDepartment<br /></td><td valign="top">Recovered<br /></td></tr></thead><tbody><tr><td valign="top">12laptopcomputers<br /></td><td valign="top">4<br /></td></tr><tr><td valign="top">1mobilephone<br /></td><td valign="top">0<br /></td></tr><tr><td valign="top">10BlackBerrys<br /></td><td valign="top">2<br /></td></tr><tr><td valign="top">11other pieces of ITequipment<br /></td><td valign="top">0<br /></td></tr></tbody></table></p><p><table><thead><tr><td valign="top">2011-12<br /></td></tr><tr><td valign="top">Itemslost or stolen from theDepartment<br /></td><td valign="top">Recovered<br /></td></tr></thead><tbody><tr><td valign="top">8laptopcomputers<br /></td><td valign="top">5<br /></td></tr><tr><td valign="top">0mobilephones<br /></td><td valign="top">n/a<br /></td></tr><tr><td valign="top">17BlackBerrys<br /></td><td valign="top">2<br /></td></tr><tr><td valign="top">29other pieces of ITequipment<br /></td><td valign="top">3<br /></td></tr></tbody></table></p><p><table><thead><tr><td valign="top">2012-13<br /></td></tr><tr><td valign="top">Itemslost or stolen from theDepartment<br /></td><td valign="top">Recovered<br /></td></tr></thead><tbody><tr><td valign="top">8laptopcomputers<br /></td><td valign="top">2<br /></td></tr><tr><td valign="top">0mobilephones<br /></td><td valign="top">n/a<br /></td></tr><tr><td valign="top">11BlackBerrys<br /></td><td valign="top">0<br /></td></tr><tr><td valign="top">34other pieces of ITequipment<br /></td><td valign="top">0<br /></td></tr></tbody></table></p><p>All the laptop computers involved in these incidents were encrypted devices that are not accessible without a security token and more than one password. The BlackBerrys are also password protected.</p><p>No tokens or passwords were left with these items, and so there was no data loss, and steps were taken, as soon as the theft of these electronic items were reported, to ensure that they provided no means of access to any of the Department’s IT systems.</p> |