Feeds

NHS is top sector for data losses

300 breaches in 3 years

Eight steps to building an HP BladeSystem

The NHS has reported 305 data breaches to the Information Commissioner's Office (ICO) since November 2007.

The figure for the NHS compares to 288 for the private sector, 132 for local government and 18 for central government. "It could be because of reporting differences or the NHS could be more prone to data breaches because they are dealing with sensitive data," an ICO spokesperson said.

The greatest cause of NHS data breaches was theft of hardware, with 116 incidents where equipment containing personal data was stolen. A further 87 incidents involved health service organisations losing hardware containing personal information.

The figure also includes 43 incidents where information was wrongly disclosed, 17 where data was "lost in transit", 13 cases involving the non-secure disposal of IT and 17 because of technical or procedural failures.

In July 2009 five NHS trusts were reprimanded by the ICO for failing to encrypt data. They included London's Royal Free Hampstead trust, which lost an unencrypted CD containing data on 20,000 cardiology patients, and Hampshire Partnership trust, after an unencrypted laptop with data on 349 patients and 258 staff was stolen at a conference.

The ICO began publishing data breaches after the loss of 25 million child benefit records by HM Revenue and Customs.

David Smith, the deputy information commissioner, said: "Extra vigilance is required so that people's personal information does not end up in the wrong hands.

"Organisations should have clear security and disclosure procedures that staff can understand, properly implement these and ensure that they are being followed by staff. Staff must be adequately trained not just in the value of personal information, but in how to protect it."

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Maximizing your infrastructure through virtualization

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.