Company Details
sussex-police
2,004
13,223
92212
police.uk
0
SUS_9752131
In-progress


Sussex Police Company CyberSecurity Posture
police.ukWe do more than you might expect. We prevent crime, lead successful operations and complex investigations, make arrests, and go the extra mile to keep our local communities safe. From patrolling neighbourhoods and responding to emergencies to conducting criminal investigations and community policing, we have specialist teams, roles, and skillsets dedicated to ensuring the safety and security of the people we serve. We do what it takes to protect our major cities, seaports, coastlines, rural villages, and international airport. As you can see, we have a lot of ground to cover, but this means plenty of scope for satisfying careers, professional development, progression and endless opportunities to improve our county. We’re proud of our purpose and we’re deeply committed to protecting our communities, catching criminals and delivering an outstanding service. We are Sussex Police, are you?
Company Details
sussex-police
2,004
13,223
92212
police.uk
0
SUS_9752131
In-progress
Between 650 and 699

Sussex Police Global Score (TPRM)XXXX

Description: Sussex Police experienced a GDPR breach involving the misdelivery of annual pension benefit statements to outdated addresses of pension scheme members. The exposed data included sensitive personal information such as salaries, dates of birth, and accrued pension entitlements. While there was no evidence that the misdelivered statements were opened or that the data was misused, affected members filed a collective action lawsuit under UK GDPR, citing psychiatric injury and fear of third-party misuse. Each claimant sought £1,250 in compensation. The UK Court of Appeal ruled that emotional distress and fear of misuse even without concrete harm could constitute non-material damage under GDPR, lowering the threshold for future mass claims. The breach was self-reported by Sussex Police to the UK Information Commissioner, and notifications were sent to affected individuals, which triggered the class action. The case highlights the rising risk of private litigation for GDPR non-compliance, even in low-risk scenarios.
Description: Former Police Officers Admit to Unauthorized Data Access and Sharing in UK Court Case Two former police officers, Sean Picton and Anthony Bolaños, pleaded guilty to charges of unlawfully obtaining and sharing personal data without consent between October 2022 and January 2023. The case, heard at the UK Supreme Court, centered on Picton’s unauthorized access to sensitive information, which he then shared with Bolaños, who subsequently disclosed it to a third party. Originally, Picton had denied more severe charges, including misconduct in public office and unauthorized computer access, while Bolaños faced allegations of aiding and abetting misconduct. However, both admitted to the reduced charges of data protection violations. Judge Matthew Happold acknowledged that the original charges carried a potential life sentence, whereas the data offenses typically result in fines. He noted that while a conviction for the more serious offenses was plausible, the prosecution had opted for the lesser charges after careful consideration. The case underscores concerns over unauthorized data handling within law enforcement, highlighting the legal consequences of mishandling sensitive information.


No incidents recorded for Sussex Police in 2026.
No incidents recorded for Sussex Police in 2026.
No incidents recorded for Sussex Police in 2026.
Sussex Police cyber incidents detection timeline including parent company and subsidiaries

We do more than you might expect. We prevent crime, lead successful operations and complex investigations, make arrests, and go the extra mile to keep our local communities safe. From patrolling neighbourhoods and responding to emergencies to conducting criminal investigations and community policing, we have specialist teams, roles, and skillsets dedicated to ensuring the safety and security of the people we serve. We do what it takes to protect our major cities, seaports, coastlines, rural villages, and international airport. As you can see, we have a lot of ground to cover, but this means plenty of scope for satisfying careers, professional development, progression and endless opportunities to improve our county. We’re proud of our purpose and we’re deeply committed to protecting our communities, catching criminals and delivering an outstanding service. We are Sussex Police, are you?


Welcome to the Official NYPD LinkedIn Page. For emergencies, dial 911. To submit crime tips & information, visit www.NYPDcrimestoppers.com or call 800-577-TIPS. The mission of the New York City Police Department is to enhance the quality of life in New York City by working in partnership with the c

Politiemensen staan midden in de maatschappij, dicht op het nieuws. De politie is daar waar het gebeurt. Het optreden van agenten ligt altijd onder een vergrootglas. Bij de politie ben je 24 uur per dag en voor iedereen in onze diverse samenleving. Integer, moedig, betrouwbaar en verbindend zijn daa

Vi gör hela Sverige tryggt och säkert! Att arbeta inom polisen är ett av de finaste uppdrag man kan ha. Du bidrar till samhället genom att göra hela Sverige tryggt och säkert. Oavsett om du jobbar i en civil roll eller som polis, är möjligheterna att växa med en större uppgift många. Vi är Sverig

he Government of India, officially known as the Union Government, and also known as the Central Government, was established by the Constitution of India, and is the governing authority of a union of 28 states and seven union territories, collectively called the Republic of India. It is seated in New

This is the official Federal Bureau of Investigation (FBI) LinkedIn account and is used to build awareness of workplace culture, engagement opportunities, and the FBI mission. The FBI does not collect comments or messages through this account. The FBI is the premier law enforcement agency in the

Policing in South Africa. I am attached to the newly formed Directorate for Priority Crime Investigations. Formally I was attached to the Detecitve Service and have been conduction investigations for over 25 years. I have also been attached to the National Inspectorate Division of the SAPS for soem

The Metropolitan Police Service is famed around the world and has a unique place in the history of policing. Our headquarters at New Scotland Yard - and its iconic revolving sign - has provided the backdrop to some of the most high profile and complex law enforcement investigations the world has e

Gendarmería Nacional Argentina (GNA) es una Fuerza de Seguridad de naturaleza militar, que cumple funciones en la seguridad interior, defensa nacional, auxilio a la Justicia Federal y apoyo a la Política Exterior de la RA. Es una de las cuatro Fuerzas que integran el Ministerio de Seguridad de l
.png)
Footage of Oonagh was posted on social media where it attracted hundreds of sexual and derogatory comments.
Charges have been authorised after a man was reportedly displaying intimidating and aggressive behaviour towards members of the public in...
Sussex County has learned of a scam in which people who have applied for variances or other approvals are getting fraudulent bills,...
Emergency services are responding after shipping containers from the cargo vessel Baltic Klipper were lost overboard in the Solent, UK.
Delaware State Police have identified Bret Jewell of Seaford as the man who was hit and killed in a pedestrian crash in Seaford on Dec. 2.
The CSO 30 Awards returned this year with an inspiring celebration of the leaders, innovators, and rising stars shaping the future of...
By Kian Leong Tan. INTRODUCTION. Do advocates retain an absolute immunity for things and said and done in court, or must the invocation of...
Companies should take into account recent EU and UK court rulings in private GDPR lawsuits when reviewing their procedures for responding to...
A UK mosque was set ablaze with two people still inside in a suspected arson attack that police are treating as a hate crime.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Sussex Police is https://www.sussex.police.uk.
According to Rankiteo, Sussex Police’s AI-generated cybersecurity score is 665, reflecting their Weak security posture.
According to Rankiteo, Sussex Police currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Sussex Police has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Sussex Police is not certified under SOC 2 Type 1.
According to Rankiteo, Sussex Police does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Sussex Police is not listed as GDPR compliant.
According to Rankiteo, Sussex Police does not currently maintain PCI DSS compliance.
According to Rankiteo, Sussex Police is not compliant with HIPAA regulations.
According to Rankiteo,Sussex Police is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Sussex Police operates primarily in the Law Enforcement industry.
Sussex Police employs approximately 2,004 people worldwide.
Sussex Police presently has no subsidiaries across any sectors.
Sussex Police’s official LinkedIn profile has approximately 13,223 followers.
Sussex Police is classified under the NAICS code 92212, which corresponds to Police Protection.
No, Sussex Police does not have a profile on Crunchbase.
Yes, Sussex Police maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sussex-police.
As of January 24, 2026, Rankiteo reports that Sussex Police has experienced 2 cybersecurity incidents.
Sussex Police has an estimated 1,534 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with data breach notification to affected individuals (sussex police), incident response plan activated with notification to uk information commissioner, and communication strategy with transparency (sussex police), communication strategy with legal defense preparation..
Title: GDPR Data Breach Claims: Farley v Paymaster (UK) and Quirinbank (EU)
Description: Two recent legal cases—Farley v Paymaster (UK) and Quirinbank (EU)—highlight the increasing risk of private GDPR lawsuits for data breaches. The UK Court of Appeal ruled that emotional distress (e.g., fear of misuse) from a GDPR breach can constitute non-material damage, even without evidence of actual harm. The EU Court of Justice (ECJ) similarly affirmed that 'mere negative feelings' like humiliation or annoyance may qualify for compensation. These rulings, combined with the EU’s Representative Actions Directive, signal a rise in class-action-style litigation for GDPR violations. Companies are advised to revisit breach response plans to mitigate litigation risks, particularly when issuing notifications to affected individuals. **Farley v Paymaster (UK):** Sussex Police sent pension benefit statements (containing salaries, DOBs, and pension entitlements) to outdated addresses. Despite no evidence of misuse, claimants sought £1,250 each for 'psychiatric injury' and 'fear of third-party misuse.' The court ruled that non-material damage claims do not require a minimum severity threshold but must demonstrate a causal link to the breach. **Quirinbank (EU):** A job applicant’s salary rejection letter was mistakenly sent to a third party. The ECJ ruled that 'humiliation' and 'disadvantage in recruitment' could warrant compensation, and injunctions (to prevent future breaches) are separate from damages. The GDPR does not preclude member states from allowing injunctions under national law.
Date Publicly Disclosed: 2025-08-22
Type: Data Breach
Vulnerability Exploited: Human Error (Incorrect Address Usage)Improper Data Handling
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Salaries, Dates of birth, Pension entitlements, Job applicant salary expectations
Customer Complaints: ['Class Action Lawsuits (UK)', 'Individual Claims (EU)']
Brand Reputation Impact: Potential erosion of trust due to litigation publicityIncreased scrutiny of GDPR compliance practices
Legal Liabilities: Private GDPR Lawsuits (UK/EU)Potential Class Actions under EU Representative Actions DirectiveInjunctions for Future Data Processing
Identity Theft Risk: ['Low (no evidence of misuse in Farley case)', 'Potential (Quirinbank case)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiable Information (Pii), Financial Information (Salaries/Pensions), Employment Data, and Personal and sensitive information.

Entity Name: Sussex Police (Pension Scheme)
Entity Type: Government Agency
Industry: Public Sector
Location: United Kingdom
Customers Affected: Pension scheme members (number unspecified)

Entity Name: Unnamed Company (Quirinbank Case)
Entity Type: Private Company
Location: Germany
Customers Affected: 1 (job applicant)

Incident Response Plan Activated: ['Data Breach Notification to Affected Individuals (Sussex Police)', 'Notification to UK Information Commissioner']
Communication Strategy: Transparency (Sussex Police)Legal Defense Preparation
Incident Response Plan: The company's incident response plan is described as Data Breach Notification to Affected Individuals (Sussex Police), Notification to UK Information Commissioner, .

Type of Data Compromised: Personal identifiable information (pii), Financial information (salaries/pensions), Employment data
Sensitivity of Data: High
Data Exfiltration: No (Farley case: misdelivered physical mail; Quirinbank case: email to unintended recipient)
File Types Exposed: Physical Mail (Farley)Email (Quirinbank)
Personally Identifiable Information: NamesDates of BirthSalariesPension DetailsJob Application Data

Regulations Violated: UK GDPR (Article 82: Right to Compensation), EU GDPR (Article 82: Right to Compensation), EU Representative Actions Directive (Class Action Risk),
Legal Actions: Farley v Paymaster [2025] EWCA Civ 1117 (UK Court of Appeal), Quirinbank (Case C-665/23, EU:C:2025:655, ECJ),
Regulatory Notifications: UK Information Commissioner (Sussex Police)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Farley v Paymaster [2025] EWCA Civ 1117 (UK Court of Appeal), Quirinbank (Case C-665/23, EU:C:2025:655, ECJ), , Guilty plea to data protection violations.

Lessons Learned: GDPR breach notifications can trigger private lawsuits even in low-risk cases; weigh transparency against litigation risks., Non-material damages (e.g., emotional distress) are increasingly actionable under GDPR, lowering the bar for claims., Class-action-style litigation is emerging in the EU via the Representative Actions Directive., Companies must align breach response strategies with potential litigation defenses, including documentation and communications., Monitor EU case law for GDPR interpretations, as UK courts may follow ECJ rulings despite post-Brexit divergence.

Recommendations: Revisit data breach response plans to assess litigation risks before notifying affected individuals., Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Prepare for class-action risks under the EU Representative Actions Directive, especially for large-scale breaches., Evaluate insurance coverage for GDPR-related litigation and non-material damages.Revisit data breach response plans to assess litigation risks before notifying affected individuals., Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Prepare for class-action risks under the EU Representative Actions Directive, especially for large-scale breaches., Evaluate insurance coverage for GDPR-related litigation and non-material damages.Revisit data breach response plans to assess litigation risks before notifying affected individuals., Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Prepare for class-action risks under the EU Representative Actions Directive, especially for large-scale breaches., Evaluate insurance coverage for GDPR-related litigation and non-material damages.Revisit data breach response plans to assess litigation risks before notifying affected individuals., Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Prepare for class-action risks under the EU Representative Actions Directive, especially for large-scale breaches., Evaluate insurance coverage for GDPR-related litigation and non-material damages.Revisit data breach response plans to assess litigation risks before notifying affected individuals., Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Prepare for class-action risks under the EU Representative Actions Directive, especially for large-scale breaches., Evaluate insurance coverage for GDPR-related litigation and non-material damages.Revisit data breach response plans to assess litigation risks before notifying affected individuals., Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Prepare for class-action risks under the EU Representative Actions Directive, especially for large-scale breaches., Evaluate insurance coverage for GDPR-related litigation and non-material damages.
Key Lessons Learned: The key lessons learned from past incidents are GDPR breach notifications can trigger private lawsuits even in low-risk cases; weigh transparency against litigation risks.,Non-material damages (e.g., emotional distress) are increasingly actionable under GDPR, lowering the bar for claims.,Class-action-style litigation is emerging in the EU via the Representative Actions Directive.,Companies must align breach response strategies with potential litigation defenses, including documentation and communications.,Monitor EU case law for GDPR interpretations, as UK courts may follow ECJ rulings despite post-Brexit divergence.Importance of access controls and monitoring in law enforcement to prevent unauthorized data access and sharing.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement stricter access controls, regular audits and and enhanced monitoring of sensitive data access within law enforcement agencies..

Source: UK Court of Appeal Judgment: Farley v Paymaster
Date Accessed: 2025-08-22

Source: European Court of Justice Judgment: Quirinbank (Case C-665/23)
Date Accessed: 2025-06-05

Source: EU Representative Actions Directive
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: UK Court of Appeal Judgment: Farley v PaymasterDate Accessed: 2025-08-22, and Source: European Court of Justice Judgment: Quirinbank (Case C-665/23)Date Accessed: 2025-06-05, and Source: EU Representative Actions Directive, and Source: UK Supreme Court Case.

Investigation Status: Closed (Legal Rulings Issued)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Transparency (Sussex Police) and Legal Defense Preparation.

Stakeholder Advisories: Companies Should Anticipate Higher Gdpr Litigation Risks And Adjust Compliance Strategies Accordingly., Legal Teams Should Collaborate With Data Protection Officers To Align Breach Responses With Litigation Defenses..
Customer Advisories: Affected individuals in the UK/EU may now have broader grounds to claim compensation for GDPR breaches, even without proven harm.Monitor communications from organizations involved in data breaches for potential legal recourse.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Companies Should Anticipate Higher Gdpr Litigation Risks And Adjust Compliance Strategies Accordingly., Legal Teams Should Collaborate With Data Protection Officers To Align Breach Responses With Litigation Defenses., Affected Individuals In The Uk/Eu May Now Have Broader Grounds To Claim Compensation For Gdpr Breaches, Even Without Proven Harm., Monitor Communications From Organizations Involved In Data Breaches For Potential Legal Recourse. and .

Root Causes: Human Error (Incorrect Mailing Addresses In Farley Case), Improper Recipient Selection (Quirinbank Case), Lack Of Verification Processes For Sensitive Data Dissemination,
Corrective Actions: Implement Address Verification Protocols For Physical Mail Containing Pii., Enhance Email Recipient Validation For Sensitive Communications., Conduct Gdpr Litigation Risk Assessments As Part Of Breach Response Planning.,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implement Address Verification Protocols For Physical Mail Containing Pii., Enhance Email Recipient Validation For Sensitive Communications., Conduct Gdpr Litigation Risk Assessments As Part Of Breach Response Planning., .
Last Attacking Group: The attacking group in the last incident was an Sean PictonAnthony Bolaños.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-08-22.
Most Significant Data Compromised: The most significant data compromised in an incident were Salaries, Dates of Birth, Pension Entitlements, Job Applicant Salary Expectations, and Personal and sensitive information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal and sensitive information, Job Applicant Salary Expectations, Pension Entitlements, Salaries and Dates of Birth.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Farley v Paymaster [2025] EWCA Civ 1117 (UK Court of Appeal), Quirinbank (Case C-665/23, EU:C:2025:655, ECJ), , Guilty plea to data protection violations.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Monitor EU case law for GDPR interpretations, as UK courts may follow ECJ rulings despite post-Brexit divergence., Importance of access controls and monitoring in law enforcement to prevent unauthorized data access and sharing.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Train staff on proper data handling (e.g., address verification) to prevent human-error breaches., Document breach responses meticulously to support legal defenses in potential lawsuits., Implement stricter access controls, regular audits, and enhanced monitoring of sensitive data access within law enforcement agencies., Evaluate insurance coverage for GDPR-related litigation and non-material damages., Consider the threshold for issuing GDPR notifications, balancing transparency with litigation exposure., Revisit data breach response plans to assess litigation risks before notifying affected individuals., Prepare for class-action risks under the EU Representative Actions Directive and especially for large-scale breaches..
Most Recent Source: The most recent source of information about an incident are UK Court of Appeal Judgment: Farley v Paymaster, European Court of Justice Judgment: Quirinbank (Case C-665/23), UK Supreme Court Case and EU Representative Actions Directive.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Closed (Legal Rulings Issued).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Companies should anticipate higher GDPR litigation risks and adjust compliance strategies accordingly., Legal teams should collaborate with data protection officers to align breach responses with litigation defenses., .
Most Recent Customer Advisory: The most recent customer advisory issued were an Affected individuals in the UK/EU may now have broader grounds to claim compensation for GDPR breaches and even without proven harm.Monitor communications from organizations involved in data breaches for potential legal recourse.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human error (incorrect mailing addresses in Farley case)Improper recipient selection (Quirinbank case)Lack of verification processes for sensitive data dissemination, Lack of access controls and monitoring, insider threat.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Implement address verification protocols for physical mail containing PII.Enhance email recipient validation for sensitive communications.Conduct GDPR litigation risk assessments as part of breach response planning..
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.