Feeds

BMA may seek NHS records system boycott

DoH 'unlawful'

High performance access to file storage

Doctors will be advised to refuse to use the NHS's computer system unless the Department of Health (DoH) changes its mind on behaviour which the British Medical Association says is unlawful.

The DoH has refused to allow a large number of patients to opt out of its controversial computerised patient records system, which is still in development. The BMA says that that refusal is unlawful and could result in a boycott of the system by GPs.

"We believe this particular suggestion by the DoH is unlawful and certainly it's outwith our understanding of the Data Protection Act," said Dr Richard Vautry, the BMA's negotiator on IT issues and a member of its GP committee.

"If they insist on that position, which we think is untenable, then it would mean that we would be obliged to advise practices not to get involved in putting any information into the summary care record," Vautry told OUT-LAW.

The system depends on GPs inputting the information and would be likely to collapse if GPs refused to carry out that task. "I'm sure practices would be very unwilling to do so because they would feel that it would put them in a very legally indefensible position," said Vautry.

The DoH did not respond to a request for comment before publication.

The controversy stems from a letter sent by the DoH to a large number of people who asked to opt out of the system. The Department told them that they could not opt out unless they could show 'substantial and unwarranted distress' would be caused by being in the system.

The BMA says that the Department had no right to make that judgment. Under the Data Protection Act the only person who can make that kind of ruling is the data controller, said Dr Chris Pounder, a data protection expert with Pinsent Masons, the law firm behind OUT-LAW.

That has traditionally been the GP and not the Department, and by making that judgment the Department was essentially declaring itself the data controller.

"By stating in its letter the fact that the DoH will offer the right to object to the processing of personal data, the DoH is claiming the status of data controller under the Data Protection Act," said Pounder. "As a data controller, the DoH can determine the purpose and manner of the processing of the nation's health records."

The BMA believes that the DoH may already be softening its position. "What we intend to do is seek clarity from the DoH on the issue because from the press statements Lord Warner was giving a few days ago he was indicating that there had been a change of policy within the department in response to reports," said Vautry. "As part of the press briefing he indicated that patients would be able to truly opt out, so we'll need to find out what that means."

The BMA backed an opt in rather than opt out system, but has lent its support to the summary care record plan unveiled this week.

Vautry said that although the DoH has always owned patient records it has always been the GP practice that has been the data controller in working practice. The DoH's letter marks an attempt to fundamentally change that.

"The reasons that you gave as the basis for claiming substantial and unwarranted distress are not based on an accurate understanding of the summary care record," said the letter, which was sent by the DoH to people who requested an opt out.

"This could play into the hands of the critics who argue that once the NHS system is up and running, then the DoH would be in a position to exploit the medical records for different purposes in future," said Pounder.

"The problem is that if a patient were to take action as a result of information being uploaded to the record against their wishes it is likely in our view that it would be the GP that would find themselves in the firing line, and we think that's unacceptable and it's our responsibility as the BMA to ensure that GPs are not put in such a vulnerable situation," said Vautry.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.