
MOD fined for personal data breach involving would-be Afghan evacuees

The Ministry of Defence has been fined £350,000 for disclosing the personal information of people seeking relocation to the UK shortly after the Taliban retook control of Afghanistan in 2021.
This was an "egregious breach" that "let down those to whom our country owes so much", said the UK Information Commissioner's Office (ICO) which issued the fine.
The details of 265 people were compromised in an email data breach weeks after the Taliban took over.
The ICO found that on 20 September 2021, the MOD sent an email to a distribution list of Afghan nationals who were eligible for evacuation using the "To" field, with personal information relating to 245 people being inadvertently disclosed.
Email addresses could be seen by all recipients, with 55 people having thumbnail pictures on their email profiles. Two people "Replied All" to the entire list of recipients, with one of them even providing their location.
The ICO report says that the original email was sent by the team in charge of the UK's Afghan Relocations and Assistance Policy (ARAP), which is responsible for assisting the relocation of Afghan citizens who worked for or with the UK Government in Afghanistan.
"The data disclosed, should it have fallen into the hands of the Taliban, could have resulted in a threat to life," said the ICO.
Following the data breach, the ICO reported that the MOD contacted the people affected asking them to delete the email, change their email address and inform the ARAP team of their new contact details via a secure form.
The MOD also conducted an internal investigation, made a statement in Parliament about the data breach and updated the ARAP’s email policies and processes, including implementing a "second pair of eyes" policy for the ARAP team when sending emails to multiple external recipients.
"Such a procedure provides a double check whereby an email instigated by one member of staff is cross-checked by another," the ICO said.
The ICO highlighted that the guidance "makes it clear that organisations should use bulk email services, mail merge, or secure data transfer services when sending any sensitive personal information electronically".
It added: "The ARAP team did not have such measures in place at the time of the incident and was relying on 'blind carbon copy' (BCC), which carries a significant risk of human error."
'No substitute for being prepared'
John Edwards, the UK Information Commissioner, said: "This deeply regrettable data breach let down those to whom our country owes so much. This was a particularly egregious breach of the obligation of security owed to these people, thus warranting the financial penalty my office imposes today.
"While the situation on the ground in the summer of 2021 was very challenging and decisions were being made at pace, that is no excuse for not protecting people's information who were vulnerable to reprisal and at risk of serious harm. When the level of risk and harm to people heightens, so must the response.
"I welcome the MOD's remedial steps taken and its collaboration with my office to ensure its bulk email policies and processes are improved so such errors are not repeated.
"By issuing this fine and sharing the lessons from this breach, I want to make clear to all organisations that there is no substitute for being prepared.
"Applying the highest standards of data protection is not an optional extra - it is a must, whatever the circumstances. As we have seen here, the consequences of data breaches could be life-threatening.
"My office will continue to act where we find poor compliance with the law that puts people at risk of harm."

MOD response
A Ministry of Defence spokesperson said: "The Ministry of Defence takes its data protection obligations incredibly seriously.
"We have cooperated extensively with the ICO throughout their investigation to ensure a prompt resolution and we recognise the severity of what has happened. We fully acknowledge today's ruling and apologise to those affected.
"We have introduced a number of measures to act on the ICO's recommendations and will share further details on these measures in due course."
The ICO added: "Taking into consideration the representations from the MOD, the fine was reduced from a starting amount of £1,000,000 to £700,000 to reflect the action the MOD took following the incidents and recognising the significant challenges the ARAP team faced.
"Under the ICO's public sector approach, the fine was further reduced to £350,000.
"This fine serves as a deterrent to data breaches, ensuring that both the MOD and other organisations have appropriate policies and training in place to minimise the risks of people's information being inappropriately disclosed via email."

Details of the infringement
The ICO found the following infringements by the MOD:
:: The MOD infringed the UK General Data Protection Regulation (UK GDPR), between August and September 2021, by failing to have appropriate technical and organisational measures in place.
The ICO said: "This failure left the security of personal information processed by the ARAP team at significant risk, in particular by way of disclosure through human error."
:: In addition to the 20 September 2021 incident, the MOD's internal investigation found two other similar data breaches, including on 7 September 2021 involving 13 individual email addresses, and on 13 September 2021 involving 55 individual email addresses – both using the "To" field.
The ICO added: "In some instances, the same email address was involved and so the total number of unique email addresses disclosed was 265."
:: At the time of the infringement, the MOD did not have operating procedures in place for the ARAP team to ensure group emails were sent securely to Afghan nationals seeking relocation.
Staff joining the ARAP team had to rely on the MOD's broader email policy and were not given specific guidance about the security risks of sending group emails when communicating sensitive information.