Feeds

UK doctor loses unencrypted laptop containing patient data

Sticks and stones may break my bones but data loss really riles me

Intelligent flash storage arrays

A UK doctor faces a disciplinary inquiry after an unencrypted laptop containing confidential patient data was stolen from his home.

The unnamed junior medic acted against regulations set by the Hull and East Yorkshire Hospitals NHS Trust, his employers. The doctor took unencrypted patient information – including names, dates of birth, the treatments – on 1,147 patients and loaded it onto his laptop, which was stolen in November. The medic waited for two weeks before informing his superiors about the theft.

Hospital bosses have written to orthopaedic patients (who had been treated for broken bones, hip replacements etc) in order to apologise. The medic was temporally suspended as a result of the incident but has now returned to work pending the results of a disciplinary hearing, This is Hull reports.

The local news outlet has a picture of irate mum Cathie Holmes, 37, of Beverley, whose daughter Mary, 12, was among those whose details were exposed. Hospital bosses wrote a letter to Mary about the breach, a move that incensed her mum. "You can't send a letter of that magnitude to a child and expect them to understand it," she said.

The breach is the third incident of personal data exposure to affect Hull residents in less than a year, following an earlier snafu involving the theft of sensitive data from A4e and the unauthorised access of sensitive data by an NHS staffer.

Chris McIntosh, chief exec of encryption tools firm Stonewood, said hospital bosses were partly to blame for the latest incident.

"It is all very well organisations having regulations on data protection, yet if they can be easily broken by employees, whether knowingly or not, they become meaningless," McIntosh said.

"This doctor should never have had the opportunity to take unencrypted data home with him. Hull and East Yorkshire Trust needs to have more than regulations in place that simply shift the blame to employees," he added. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.