7 Security and privacy
91. We heard during our inquiry that government's
special security requirements increase commercial and technical
complexity, thereby increasing cost and reducing competition.
The Government argued that its status meant that it was more likely
to be the subject of hostile attack than private sector organisations.[120]
92. IBM highlighted security as one area where "gold-plating"
of specifications often takes place:
The security arena is often an area where excessive
constraints may distance the programme from the original operational
need.[121]
93. Similarly one SME argued that government needs
to be more realistic about its security needs and "not
ask for American Defence Department standards for systems that
no one is going to want to hack."[122]
Another described it as being equivalent to using "a
sledgehammer to crack a nut."[123]
Bracknell Forest Council said that the current arrangements were
"too draconian and seen as a hindrance by most outside
of the security industry."[124]
We were also told that "overly prescriptive security conditions
limit adoption of newer technologies and limit data exchange."[125]
Soctim concurred with this view. [126]
94. Logica argued that:
Security issues also pose a challenge to the
co-ordination of technology policy. Different government departments
can interpret security policies in a way that can mean that solutions
agreed by one department are not accepted by another.[127]
95. However, we also heard some encouraging evidence
from SMEs who had spoken with CESG[128]
and believed they were in the process of adopting a more
pragmatic approach. The BCS were also less critical of the current
arrangements saying that the "Government's approach to
information security and information assurance has improved significantly
over the last decade and policy is more pragmatic and generally
understood by users". However, they also raised concerns
about the lack of a holistic approach to data security. [129]
96. A number of organisations expressed concerns
about the Government's record in guarding the personal information
it holds, with particular reference to incidents where disks or
laptops had been lost.[130]
The Information Commissioner emphasised the importance of Privacy
Impact Assessments (PIAs), which assess the data protection implications
of new projects, stating that these needed to be "more
than mere paper exercises."[131]
The BCS recommended that Government should have "
broader
and deeper adoption of the 'Privacy by Design' principles espoused
by the Information Commissioner's Office".[132]
97. The over-classification of data was another problem
highlighted. Protectively marking information when not required
has enormous cost implications and prevents Government taking
advantage of commodity products and services, including the adoption
of commercial cloud services.
98. Following a number of high profile data losses
by departments a number of reviews were undertaken examining and
strengthening in the Government's information assurance capability.[133]
In its guidance the Government recognises that over classifying
data has negative consequences:
Applying too high a protective marking can inhibit
access, lead to unnecessary and expensive protective controls,
and impair the efficiency of an organisation's business.[134]
99. Governments have learnt that they must secure
both personal data and data relating to national security, whilst
also guarding against gold-plating its security requirements -
which can greatly inflate costs without delivering any tangible
benefits. Over-classifying routine administrative and operational
information causes unnecessary technology and operational costs,
and prevents the public sector taking advantage of the economies
and efficiencies of commodity software and new opportunities.
It also acts as a further barrier to more effective use of SMEs
in the supply of IT goods and services. Government must do more
to demonstrate how a risk-based approach is helping achieve a
better balance in information assurance.
120 Q 516 Back
121
Ev w131 Back
122
Ev w3 Back
123
Ev w4 Back
124
Ev w13 Back
125
Ev 91 Back
126
Ev 102 Back
127
Ev w50 Back
128
CESG is the Information Assurance (IA) arm of GCHQ. It is the
UK Government's National Technical Authority for IA, responsible
for "enabling secure and trusted knowledge sharing" Back
129
Ev 96 Back
130
Ev w43, Ev 98 Back
131
Ev w43 Back
132
Ev 98 Back
133
See for example Cabinet Office, Data Handling Procedures in
Government: Final Report, June 2008 Back
134
Error! Bookmark not defined.para 19 Back
|