Feeds

ICO chastises NHS over data losses

A very leaky vessel indeed

Internet Security Threat Report 2014

NHS organisations were responsible for 30 per cent of the security breaches reported to the Information Commissioner's Office over the last two years.

The ICO said that, of the 711 reports of security breaches it has received since HM Revenue and Customs reported its loss of 25m child benefit records in November 2007, 209 came from the NHS.

"We have investigated organisations, including several NHS bodies, that have failed to adequately secure their premises and hardware, which has left people's personal details at risk," said Mick Gorrill, the assistant commissioner with responsibility for investigations.

"I encourage organisations, especially NHS bodies, to ensure that the level of security at premises is commensurate with the type of data they are holding. Many breaches are avoidable and are often the result of poor management processes."

The figures came in the same week as three trusts were reprimanded by the ICO for poor information security. Two primary care trusts, Great Yarmouth and Waveney and Gloucestershire, signed formal undertakings to improve their data security after putting thousands of patients' sensitive personal information at risk.

Great Yarmouth and Waveney reported the theft of two PCs to the ICO, containing the personal details of more than 1,000 occupational therapy patients and staff. The personal information had been held on the computers, rather than on a network server, and was not password protected.

In addition, their offices did not have a burglar alarm, internal doors were unlocked and the computers were unencrypted.

Gloucestershire Primary Care Trust reported the theft of six laptops containing the personal data of 2,270 patients. The computers, used by medical secretaries for preparing letters and patient notes, were password protected and held in a locked office, but the ICO said the data should have been held on a server.

Maidstone and Tunbridge Wells NHS Trust, an acute trust, reported the theft of an unencrypted laptop computer from its audiology department. This held test results on 33 patients, as well as other personal details on an unknown number of patients. The trust reported a further three laptops as stolen during August 2009 from its Maidstone site, but these were encrypted.

As with the primary care trusts, Maidstone and Tunbridge Wells has signed an undertaking to improve information security, in its case by encrypting all personal data on laptops and removable media within six months.

The ICO said its research showed that burglaries and theft are the single biggest security risks for organisations processing people's personal details.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?