Anatomy of a Breach

Anatomy of a Breach: Morrison's — The Insider Leak That Made Employers Liable for Staff Data Theft

> series: anatomy_of_a_breach —— part: 063 —— target: wm_morrison —— records: 100,000_employees —— legal_precedent: employer_liability<span class="cursor-blink">_</span>_

Hedgehog Security 31 March 2014 14 min read

A disgruntled employee. 100,000 colleagues' bank details. And the Supreme Court ruling that changed everything.

In January 2014, Andrew Skelton — a senior internal auditor at Wm Morrison Supermarkets — used his legitimate access to payroll data to copy the personal details of approximately 100,000 Morrison's employees. The stolen data included names, addresses, phone numbers, dates of birth, bank account details, National Insurance numbers, and salary information. Skelton posted the data on file-sharing websites and sent copies to three UK newspapers, which immediately alerted Morrison's rather than publishing.

Skelton had a personal grudge against Morrison's — he had previously received a verbal warning for minor misconduct and perceived the company as having treated him unfairly. His data theft was an act of deliberate revenge. He was arrested, convicted under the Computer Misuse Act and the Data Protection Act, and sentenced to eight years in prison. But the case's most significant impact was not criminal — it was civil. Affected employees launched a group action against Morrison's, and the case eventually reached the Supreme Court, which in 2020 ruled that Morrison's was vicariously liable for Skelton's actions — establishing the principle that employers can be held responsible for data breaches caused by rogue employees acting within the scope of their employment.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Vicarious liability — your employee's data theft is your responsibility.

The Morrison's case established a landmark legal principle in UK data protection law: an employer can be vicariously liable for a data breach committed by an employee, even if the employee acted deliberately and maliciously, provided the employee was acting within the broad scope of their employment when they accessed the data. The Supreme Court ultimately ruled in Morrison's favour in 2020, overturning the earlier Court of Appeal decision — but the case established the legal framework within which employer liability for insider data breaches would be assessed going forward.

Employer Liability for Insider Breaches
The Morrison's litigation put every UK employer on notice: if your employee steals data using access their role provides, you may be held legally liable for the consequences. This makes insider threat controls not just a security investment but a legal risk management necessity. Our <a href="/penetration-testing/infrastructure">internal penetration testing</a> assesses insider threat controls.
Access Controls Must Be Proportionate
Skelton was a senior auditor who had legitimate access to payroll data as part of his role. But the question the case raised was whether that access was appropriately controlled — could he bulk-export 100,000 records without any alert? <a href="https://www.socinabox.co.uk/blog/data-loss-prevention-small-business">Data loss prevention</a> through <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects exactly this type of bulk extraction.
The Grudge Factor
Skelton's motivation was personal — a grievance against his employer. Disgruntled employees are a known insider threat category that our <a href="/blog/sector-under-the-microscope-professional-services">professional services analysis</a> and <a href="/blog/sector-under-the-microscope-retail">retail sector analysis</a> examine. Behavioural indicators — increased access outside normal hours, unusual data queries, expressions of grievance — can be detected through monitoring.
The Newspapers Did the Right Thing
Three UK newspapers received the stolen data and immediately alerted Morrison's rather than publishing. This responsible handling was critical to limiting the breach's impact. But it relied on editorial judgment, not technical controls — if Skelton had posted the data anonymously on the dark web instead, no such safeguard would have existed.

Insider threat controls are now a legal obligation.

The Morrison's case transformed insider threat controls from a security best practice into a legal risk management requirement for every UK employer. If an employee can bulk-export personnel data without detection, and that data is subsequently misused, the employer may face both regulatory action from the ICO and civil liability from affected individuals. The cost of implementing data loss prevention and behavioural monitoring is a fraction of the cost of defending a group action from 100,000 affected employees.

Cyber Essentials certification establishes baseline access controls. Our penetration testing includes insider threat scenarios — testing what an authorised user can access and export. SOC in a Box provides the continuous behavioural monitoring and data loss prevention that detects bulk data extraction before it becomes a Supreme Court case. And UK Cyber Defence provides the forensic investigation capability when insider activity is suspected.


The Supreme Court says you may be liable for your employees' data theft. Are your insider controls adequate?

Our <a href="/penetration-testing/infrastructure">penetration testing</a> tests insider threat scenarios. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for bulk data extraction. Because after Morrison's, insider threat controls are not optional — they are a legal risk management requirement.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles