Feeds

CfH report confirms confidentiality risk

Keeping mum on care records

HP ProLiant Gen8: Integrated lifecycle automation

Plans to upload medical records onto a central database - the so-called spine - will put patient confidentiality at risk, Connecting for Health (CfH) has been told by its own consultants.

In its own risk analysis of the project, the agency responsible for centralising the country's medical records has acknowledged that GPs' concerns about patient confidentiality have merit, and that it would be safer to store records locally.

According to Helen Wilkinson-Maker of The Big Opt Out, a campaign group opposed to the spine, the risk analysis was intended to consider two scenarios: a spine with and without "sealed envelopes", sections of the medical record marked by the patient as not to be shared.

However, during the consultation with health professionals, civil servants, and patient representatives, a third scenario was put forward for analysis: that of locally held, digital medical records. This was found to present much lower risk of confidentiality breaches, according to the report.

Wilkinson-Maker said: "One major result of the interviews was to start NHS CfH thinking of alternative solutions that would provide the desired confidentiality in a practical and effective manner without adversely impacting on patient safety."

The Risk Analysis was presented to conference for General Practitioners in Stratford upon Avon on Friday by Dr Paul Thornton, a GP critic of the Connecting for Health proposals.

Dr Thornton said: "These confidentiality risks to health have been found to outweigh the benefits from automatic sharing of health information on a national database. The more that information is accessible by all health workers, the less likely it becomes that crucial information will be divulged to any one of us."

The consultants identified a conflict between patient safety and confidentiality: records with some details kept hidden were found to put patient safety at a greater risk than those with all the medical information in the clear. This is because the potential for error in diagnosis or treatment is much higher if all the facts are not known, the report says.

Meanwhile, patient confidentiality is at its most secure when some information is not just sealed in a single envelope, but in a variety of envelopes, with data being stored locally, and therefore only being accessible locally.

The consultants concluded that the alternative sealed envelope solution (i.e. local storage of data) presented the lowest summed risk to patient safety and confidentiality.

The report was commissioned by CfH and produced by consultants DET NORSKE VERITAS. You should soon be able to read it here. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.