Feeds

F1 racing ace Michael Schumacher's medical records were pinched

We'll go after whoever's offering to sell them – Schumi's team

Beginner's guide to SSL certificates

Michael Schumacher's stolen "medical records" are being offered for sale.‬

The management team of the retired motor racing legend has confirmed the theft of files and warned that either the purchase or publication of the documents would provoke both a criminal complaint and a lawsuit.

‪Schumacher‬ left Grenoble Hospital last week five months after a life-threatening skiing accident in the French Alpine resort of Meribel. He left for further rehabilitation at the University Hospital in Lausanne, Switzerland, closer to his home of the shores of Lake Geneva.

Sabine Kehm, managing director of Schumacher's offices in Geneva, told The Guardian: "For several days stolen documents and data are being offered for sale. The offerer claims them to be the medical file of Michael Schumacher.

"We cannot judge if these documents are authentic. However, the documents are clearly stolen. The theft has been reported. The authorities are involved.

"We expressly advise that both the purchase and the publication of such documents and data are forbidden. The contents of any medical files are totally private and confidential and must not made available to the public. We will therefore, in every single case, press for criminal charges and damages against any publication of the content or reference to the medical file," she added.

The seven-times F1 world champion underwent two operations to remove blood clots following his accident last December. The 45-year-old was subsequently placed into a medically induced coma designed to limit swelling and minimise the possibility of further complications. Schumacher's management firm disclosed that he had experienced short moments of consciousness during his recovery but few other details have emerged.

In a story about the attempted sale of ‪Schumacher's stolen "medical records", ‬Sky News reports that Formula One's former chief doctor expressed pessimism that ‪Schumacher‬ would ever fully recover from his accident in an entry on a personal blog back in March.

In other ‪Schumacher-related developments, ghoulish scammers are putting up posts on Facebook falsely claiming Schumacher has died from his injuries. This "news" is entirely bogus and designed simply to push ‬traffic to the scammers' website. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.