Feeds

NHS is top sector for data losses

300 breaches in 3 years

3 Big data security analytics techniques

The NHS has reported 305 data breaches to the Information Commissioner's Office (ICO) since November 2007.

The figure for the NHS compares to 288 for the private sector, 132 for local government and 18 for central government. "It could be because of reporting differences or the NHS could be more prone to data breaches because they are dealing with sensitive data," an ICO spokesperson said.

The greatest cause of NHS data breaches was theft of hardware, with 116 incidents where equipment containing personal data was stolen. A further 87 incidents involved health service organisations losing hardware containing personal information.

The figure also includes 43 incidents where information was wrongly disclosed, 17 where data was "lost in transit", 13 cases involving the non-secure disposal of IT and 17 because of technical or procedural failures.

In July 2009 five NHS trusts were reprimanded by the ICO for failing to encrypt data. They included London's Royal Free Hampstead trust, which lost an unencrypted CD containing data on 20,000 cardiology patients, and Hampshire Partnership trust, after an unencrypted laptop with data on 349 patients and 258 staff was stolen at a conference.

The ICO began publishing data breaches after the loss of 25 million child benefit records by HM Revenue and Customs.

David Smith, the deputy information commissioner, said: "Extra vigilance is required so that people's personal information does not end up in the wrong hands.

"Organisations should have clear security and disclosure procedures that staff can understand, properly implement these and ensure that they are being followed by staff. Staff must be adequately trained not just in the value of personal information, but in how to protect it."

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Intel sees 'signs of improvement in the PC business' but earnings remain 'Meh...'
Prospects for the future, however, please Wall Street money men
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.