This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


  • terrorists seeking to misuse or disrupt government resources. 4.2.11 Service providers wil also need to consider attack groups acting from within the e-
    Government service provision boundary, such as government whistleblowers and other disgruntled government employees, employees of service providers who may not have been subject to the same vetting procedures as government employees, maintenance staff and cleaners, etc. These attack groups are considered elsewhere and are beyond the scope of this guidance.

Email this to a friend.
Previous itemNext item.


Well, hang on. Surely the corrupt or incompetent insider is the biggest single risk group. This is considered elsewhere? Where? This is one of the biggest potential obstacles to public trust in e-enabled public services. I really dont think terrorists or foreign powers are going to screw around with my administrative data. But I need reassurance that public servants cant, and that if they manage to they'll be disciplined.

Posted by William on 2007-02-14 16:30:38.
Link. Report abuse to Back to the main document list


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site