Feeds

5,000 NHS records vanish with latest lost laptop

Wonder why they ever called them NHS Trusts...

Choosing a cloud hosting partner with confidence

A laptop containing medical records for more than 5,000 people has been lost by a hospital near Dudley.

The latest data giveway occurred on 8 January. The laptop was taken from an outpatients department at Russells Hall Hospital.

West Midlands Police is investigating the theft and several thousand people have received warning letters telling them their data could be at risk.

The Dudley Group of Hospitals Trust told us patient data would be difficult to access because: "The database is password/login protected and a separate trust login and password is required to operate the laptop." Which sounds like better practice than that managed by most of the government.

The trust is in the process of putting data encryption software on all its laptops after a review last year. It will also encrypt data on all other mobile devices including PDAs and memory sticks. It has further hired an independent penetration tester to audit its network.

The trust apologised to patients affected.

Mike Small, director of security at CA said: "It almost seems like data loss is becoming the norm rather than a significant event at the moment, and that is worrying. In this case, it seems to point to a lack of value that organisations are putting on this sort of personal data. I'm not so sure it would have been so easily stolen if it was a briefcase full of cash."

The theft is the latest in a series of government department screw-ups which have seen as many as 37 million UK citizens have their personal data lost or stolen.

HMRC twice lost 25 million records relating to child benefits, the DVLA lost 6,000 records for vehicle owners, and the MoD misplaced a laptop containing details of 600,000 applicants to the armed services.

The government has hired Information Commissioner Richard Thomas and Dr Mark Walport to run the "Data Sharing Review" - a consultation on how and why data is shared and used by different departments. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.