Independent review of Scottish Government's use of mobile messaging apps and non-corporate technology

Emma Martins' report of her independent review


23. Appendix 9. WhatsApp Risk Mapping Table

Risk Category

Potential Impact

Risk Description

Mitigation

Ethical Considerations

Likelihood

Severity

Risk Grade

Encryption Concerns

Compromised National Security

End-to-end encryption hindering interception and analysis of potential threats.

Implement alternative communication channels with encryption but also allow controlled interception by security agencies.

Balancing privacy rights with national security concerns.

Med

High

Med

Data Privacy

Breach of Sensitive Information

Collection of user data by messaging apps, raising concerns about privacy and data breaches.

Educate users on data privacy best practices. Implement policies restricting sharing sensitive information via messaging apps.

Protecting user privacy while ensuring the security of government data.

High

High

High

Unauthorized Data Access

Unauthorized access to sensitive government information stored or transmitted via MMA, leading to data breaches or leaks.

Implement robust encryption measures for data in transit and at rest. - Enforce strict authentication and access controls. - Regular security audits and updates.

Respect for individuals' privacy and confidentiality of information.

High

High

High

Data Leakage

Leakage of sensitive information due to improper handling or transmission via MMA, leading to reputational damage.

Provide comprehensive training on data handling and security protocols. - Establish clear guidelines for what information can be shared via MMA.

Ensuring transparency and accountability in handling sensitive information.

High

High

High

Malware and Phishing

Compromised System Integrity

Susceptibility to malware and phishing attacks leading to compromise of sensitive information.

Implement security awareness training programs for government workers. Employ advanced threat detection software and protocols.

Balancing security measures with user convenience and usability.

High

High

High

Device Vulnerabilities

Malware and Exploits

Exploitation of vulnerabilities in MMA software or underlying devices, leading to unauthorized access or control.

Regularly update MMA software and device operating systems. - Employ mobile device management solutions for centralized security control.

Ensuring the security and integrity of government IT infrastructure.

High

High

High

Device Theft or Loss

Theft or loss of devices containing sensitive information, potentially leading to data breaches or leaks.

- Implement device encryption and remote wipe capabilities. - Enforce strict physical security measures for device handling.

Protecting sensitive government information from unauthorized access or disclosure.

Med

High

High

Communication Integrity

Message Tampering

Tampering or alteration of messages sent via MMA, leading to misinformation or manipulation.

Use digital signatures or other cryptographic techniques to verify message integrity. - Enable features like message deletion after a certain period.

Ensuring the accuracy and reliability of communication within government agencies.

Medium

High

High

Lack of Traceability

Difficulty in tracing or retrieving messages sent via MMA, hindering investigations or audits.

Implement logging and monitoring mechanisms for MMA usage. - Regularly review and archive communication records.

Ensuring accountability and transparency in government operations.

High

Medium

High

Live Location Tracking

Physical Threats or Surveillance

Risk of exposing government officials' whereabouts, making them vulnerable to physical threats or surveillance.

Disable live location tracking feature. Educate users on the risks associated with sharing location information. Implement secure communication protocols.

Ensuring the safety and security of government personnel.

Medium

High

Medium

Third-party Access

Unauthorized Data Access

Concerns about third-party access to sensitive conversations and potential misuse of data.

Implement data encryption and access control measures. Conduct regular security audits of messaging app providers.

Protecting sensitive government information from unauthorized access.

High

High

High

Dependency on External

Control Over Data and Infrastructure

Reliance on external platforms subjecting government to the security measures and policies of private companies.

Develop in-house communication platforms with stringent security measures. Partner with trusted vendors adhering to government security standards.

Balancing security requirements with the need for efficient communication tools.

High

High

High

Regulatory Compliance

Legal and Regulatory Violations

Use of messaging apps not meeting regulatory requirements regarding data storage, access, and transmission.

Ensure messaging apps comply with relevant regulations. Implement policies for secure data storage and transmission. Monitor changes in regulations.

Upholding legal and regulatory standards while maintaining effective communication.

Medium

High

Medium

This risk mapping table provides an overview of the various risks associated with government workers using messaging apps like WhatsApp, along with potential impacts, risk descriptions, mitigation strategies, ethical considerations, likelihood, severity, and overall risk grades.
Risk Grade:
Low: Risk has minor impact and is easily manageable.
Medium: Risk has moderate impact and requires active monitoring and mitigation.
High: Risk has significant impact and demands immediate attention and comprehensive mitigation efforts.

This mapping table provides a structured overview of the potential risks associated with using MMA like WhatsApp in government contexts, along with mitigation strategies and ethical considerations to address these risks effectively.

Contact

Email: helen.findlay@gov.scot

Back to top