Feeds

NHS trust loses personal data of 600 maternity patients, kids

Hands up whether patients' info should be encrypted. Anyone?

Website security in corporate America

South London healthcare trust has admitted to losing two unencrypted memory sticks containing sensitive personal data about patients.

The data breaches occurred in separate incidents. In the first breach, the device contained data relating to around 600 maternity patients, according to an undertaking signed by the trust with the Information Commissioner's Office (ICO). A data controller employee downloaded the data on to a personal memory stick in order to do some work at home.

"Due to not having received up to date information governance training, the employee was unaware that an encrypted device issued by the data controller should have been used," says the undertaking.

In the second incident, the lost memory stick contained the names and dates of birth of 30 children, and full audiology reports for a further three children.

The ICO said that in both cases the data was put at "unnecessary risk" by not being encrypted. However, it added that both devices were later found, and said it was unlikely that they were readily accessible during the time they could not be located.

According to the undertaking, there were also a further two incidents at the trust, but these related to data breaches involving paper files.

The trust has now agreed to encrypt portable and mobile devices including laptops and other portable media used to store and transmit personal data. It has also pledged to make sure that staff are appropriately trained and made aware of the data controller's policy for the retention, storage and use of personal data.

"The data controller shall implement such other security measures as it deems appropriate to ensure that personal data is protected against unauthorised and unlawful processing, accidental loss, destruction, and/or damage," adds the undertaking.

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.