Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

ContactPoint Database Abolished

Overtis Systems : 12 August, 2010  (Technical Article)
Child protection database replacement system must be equipped with user activity management to protect data from unauthorised access according to Overtis
Following the coalition's abolition of the ContactPoint database, CESG-approved security software vendor, Overtis Systems, has called for any replacement system to prioritise user activity management, to safeguard the privacy and safety of under 18s.

The ContactPoint database, containing the records of 11 million UK children, was set up after 8 year old Victoria Climbié was murdered by her carers, following months of abuse, despite being known to social workers, police and medical staff. The database was designed to make it easier for welfare agencies to share information so that they could identify vulnerable children and intervene sooner to protect them.

On 6th August, 15,000 access log ins were deleted after the coalition identified ContactPoint as an expensive resource that was impeding child protection professionals.

Children's charities have criticised the abolition of ContactPoint before a replacement system has been established. However, privacy campaigners claimed the database risked exposing children's data if it was compromised.

Overtis has called for endpoint security and user activity management to be put at the heart of any replacement information sharing service being considered by the coalition:

"While ContactPoint was established for all the right reasons, our concern was always that the endpoint was the weakest point in the system. Whilst security at the centre was strong, with two factor authentication required for access from specific IP addresses, there was too little visibility of what trusted users did locally. They could still copy, paste and print information. There were also a significant number of users with privileged access." says Richard Walters, CTO, Overtis.

"We have seen too many instances of highly sensitive information being exposed by diligent employees taking work home in spreadsheets and then losing a USB key or having their laptop stolen. Using technology that monitors and controls all user activity, without disrupting legitimate sharing of information, will help to achieve the original aims of ContactPoint, while maintaining the privacy of children's data," advises Walters.

Overtis develops VigilancePro endpoint security software that monitors all user activity and controls interaction with data, across all devices in and out of the cloud.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo