Results 281–300 of 7459 for hack

Did you mean back?

Parliamentary Constituencies Bill - Report: Amendment 11 (8 Oct 2020)

Lord Hayward: My Lords, first I comment on the reference by the noble Lord, Lord Thomas of Gresford, to “party hacks”. I shall disregard that description, given that I spent so many hours, days and weeks at so many inquiries, initially, and then hearings, and I take his comment in the spirit in which I hope it was intended. This amendment is really divided, as the noble and learned Lord, Lord Thomas of...

Parliamentary Constituencies Bill - Report: Amendment 2 (8 Oct 2020)

Lord Taylor of Holbeach: ...to get to know her or his constituency—to become acquainted with it and have the support of their constituents—and to be able to come to the House of Commons as a representative, not a party hack”.—[ Official Report, 8/9/20; col. GC 165.] While I would not have supported my noble friend Lord Forsyth in Committee, I believe that the more frequent the review the better. Eight years...

Written Answers — Department for Work and Pensions: Universal Credit (7 Oct 2020)

Justin Madders: To ask the Secretary of State for Work and Pensions, what information his Department holds on online security breaches and hacking of universal credit accounts.

Gang-associated Girls — [Sir Christopher Chope in the Chair] (6 Oct 2020)

Nickie Aiken: .... In Pimlico, it was more of a business, with young people using violence to secure their clients and their areas. It culminated in the horrific murder of a young man called Hani, who was hacked to death in Pimlico on a Sunday afternoon when people and families were going about their business. The boys who were eventually found guilty—and sentenced, rightly, to many years in...

Immigration and Social Security Co-ordination (EU Withdrawal) Bill - Report (2nd Day) (Continued): Amendment 18 (5 Oct 2020)

Baroness Williams of Trafford: ...and others will be able to use this. Of course, we want a robust and secure system that is both efficient and convenient. My noble friend Lady Shackleton pointed out the horrors of having anything hacked. We are at the beginning of this important journey and we recognise that some people may not see it this way, but I urge noble Lords to persevere and let us see this journey unfold...

Questions to the Mayor of London — Tube Map incorporating Thames Link: Tube Map incorporating Thames Link (15 Sep 2020)

Navin Shah: ...s Transport Committee this year called for TfL to incorporate Thameslink services on the Tube Map by August 2020 which unfortunately has not happened. TravelWatch have produced new series of travel hacks which will help transport users to travel north to south across London without using the Tube. Please confirm if TfL is planning to produce a co-ordinated map or not?

Scottish Parliament: Dirty Camping (11 Aug 2020)

Christine Grahame: There have been huge problems with dirty campers at Gladhouse reservoir in Midlothian South in my constituency. Fires have been left unattended, trees have been hacked down, human waste has been left behind and verbal abuse has been directed at local people. Does the cabinet secretary think that the access code needs to be revisited, and should there be an increase in fines?

Written Answers — Home Office: Twitter: Hacking (24 Jul 2020)

Chi Onwurah: To ask the Secretary of State for Home Department, what recourse there is for UK citizens who have lost money through the hack of high profile Twitter accounts on 15 July 2020.

Covid-19 Update (16 Jul 2020)

Matthew Hancock: ...around the world. We are using our official development assistance money to help ensure that there is broad global access, should they work. On the question about cyber-security and potential hacking, the hon. Member will understand why I cannot go into the full details, but I can reassure him that the National Cyber Security Centre is taking this very seriously.

Written Ministerial Statements — Foreign and Commonwealth Office: Cyber Security: Update (16 Jul 2020)

Dominic Raab: ...to interfere in our democratic processes, alongside our international partners. We fully support the recent action taken by our German partners who exposed Russian responsibility for the hack of their Parliament in 2015 as well as their intention to act against those responsible under the cyber sanctions regime. The UK Government laid the statutory instrument for our own cyber sanctions...

UK Telecommunications (14 Jul 2020)

Kevan Jones: ...out of the legislation? Will we ban Nokia and Ericsson from using components manufactured in China, as they do now? Will he be honest with the public? It is not about the hardware; it is about hacking and the software. That is what we should be concentrating on, not this.

Terrorism Act 2000 (Video Recording with Sound of Interviews and Associated Code of Practice) (Northern Ireland) Order 2020 - Motion to Approve (10 Jul 2020)

Lord Bruce of Bennachie: ...in Northern Ireland. To follow up on the concerns raised about data security, in some ways you could argue that old-fashioned, physically located data that is not accessible through the cloud or hacking is more secure than digital data. The Minister will recognise that there is a need to ensure that the digital data is comprehensively protected and to address whether old data in...

Written Answers — Department of Health and Social Care: Contact Tracing: Computer Software (30 Jun 2020)

Baroness Finlay of Llandaff: ...in contact with COVID-19 (1) works on a broad range of mobile phones and operating systems; (2) can send notifications to contacts within minutes of symptoms having been reported; (3) can detect hacking attempts and prevent notifications being sent maliciously; and (4) can apply corrective algorithms to ensure that distance is measured accurately.

Northern Ireland Assembly: Ministerial Statement: NSMC Institutional Meeting (23 Jun 2020)

Jim Allister: ...that you have just announced are not even there. Three faces jump out at you — Jimmy Spratt, Timothy Cairns and Councillor Greenfield. Are the appointments to these just sinecures for political hacks who do not need to have any expertise on the subject matter?

Written Answers — Department of Health and Social Care: Contact Tracing: Computer Software (18 Jun 2020)

Rachael Maskell: To ask the Secretary of State for Health and Social Care, what assessment his Department make of the level of risk that the covid-19 tracking app could be hacked; and what steps he has taken to protect the app against such attacks.

Public Bill Committee: Immigration and Social Security Co-ordination (EU Withdrawal) Bill: EU Settlement Scheme: physical documented proof (16 Jun 2020)

Holly Lynch: ...IT risks when relying on purely digital proof for immigration status. The truth is that the Government cannot completely rule out the possibility of an irretrievable data loss or, even worse, the hacking of a data system. It is less than two years since the so-called WannaCry cyber-attack caused havoc for the IT systems of the NHS, locking users out of personal computers and resulting in...

Public Bill Committee: Immigration and Social Security Co-ordination (EU Withdrawal) Bill: Examination of Witness (9 Jun 2020)

...physical proof of their status. We also had concerns about the availability of an online status; there may be instances when the status is not available for IT reasons. Also, online systems can be hacked. There are real security risks. Finally, we also have concerns about the newness of the digital-only scheme. It is essentially being tested on over 3 million people. A digital-only...

Questions to the Mayor of London — TfL Ticket refunds (3): TfL Ticket refunds (3) (8 Jun 2020)

Sadiq Khan: ...Online accounts were accessed maliciously due to the account holders using the same username and password on multiple websites. Where one of these other sites had been compromised in a previous hack, the correct login credentials were then used to access these customers’ Oyster Online accounts.

Telecommunications Infrastructure (Leasehold Property) Bill - Virtual Committee (1st Day): Amendment 9 (19 May 2020)

Baroness Falkner of Margravine: ...’s servers was being transmitted back to Shenzhen covertly in those hours, hence the server activity. There are many other examples of Huawei’s cyberactivities. The Equifax consumer credit hack recently resulted in millions of US consumers’ data being stolen. Additionally, 12.3 million Britons had their credit card details stolen. That hack was linked to Huawei and the People’s...

Private International Law (Implementation of Agreements) Bill [HL] - Virtual Committee: Amendment 14 (13 May 2020)

Lord Judge: ..., although I cannot identify a particular Henry VIII clause here save and except the usual ones about amending and getting rid of primary legislation, is that, from his underworld, Henry VIII has hacked into departmental computers. Alternatively, he has been inserted—resurrected and put into departmental computers. We must be very careful about attaching so much weight to the use of...


Create an alert

Advanced search

Find this exact word or phrase

You can also do this from the main search box by putting exact words in quotes: like "cycling" or "hutton report"

By default, we show words related to your search term, like “cycle” and “cycles” in a search for cycling. Putting the word in quotes, like "cycling", will stop this.

Excluding these words

You can also do this from the main search box by putting a minus sign before words you don’t want: like hunting -fox

We also support a bunch of boolean search modifiers, like AND and NEAR, for precise searching.

Date range

to

You can give a start date, an end date, or both to restrict results to a particular date range. A missing end date implies the current date, and a missing start date implies the oldest date we have in the system. Dates can be entered in any format you wish, e.g. 3rd March 2007 or 17/10/1989

Person

Enter a name here to restrict results to contributions only by that person.

Section

Restrict results to a particular parliament or assembly that we cover (e.g. the Scottish Parliament), or a particular type of data within an institution, such as Commons Written Answers.

Column

If you know the actual Hansard column number of the information you are interested in (perhaps you’re looking up a paper reference), you can restrict results to that; you can also use column:123 in the main search box.