Feeds

NHS is top sector for data losses

300 breaches in 3 years

Intelligent flash storage arrays

The NHS has reported 305 data breaches to the Information Commissioner's Office (ICO) since November 2007.

The figure for the NHS compares to 288 for the private sector, 132 for local government and 18 for central government. "It could be because of reporting differences or the NHS could be more prone to data breaches because they are dealing with sensitive data," an ICO spokesperson said.

The greatest cause of NHS data breaches was theft of hardware, with 116 incidents where equipment containing personal data was stolen. A further 87 incidents involved health service organisations losing hardware containing personal information.

The figure also includes 43 incidents where information was wrongly disclosed, 17 where data was "lost in transit", 13 cases involving the non-secure disposal of IT and 17 because of technical or procedural failures.

In July 2009 five NHS trusts were reprimanded by the ICO for failing to encrypt data. They included London's Royal Free Hampstead trust, which lost an unencrypted CD containing data on 20,000 cardiology patients, and Hampshire Partnership trust, after an unencrypted laptop with data on 349 patients and 258 staff was stolen at a conference.

The ICO began publishing data breaches after the loss of 25 million child benefit records by HM Revenue and Customs.

David Smith, the deputy information commissioner, said: "Extra vigilance is required so that people's personal information does not end up in the wrong hands.

"Organisations should have clear security and disclosure procedures that staff can understand, properly implement these and ensure that they are being followed by staff. Staff must be adequately trained not just in the value of personal information, but in how to protect it."

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.