DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Chelsea and Westminster NHS trust fined £180,000 for HIV newsletter data breach

Posted on May 9, 2016 by Dissent

There’s a follow-up to the breach involving the 56 Dean Street clinic in London run by the the Chelsea and Westminster NHS Trust. The breach involved a staff member accidentally exposing all recipients of an HIV newsletter in the To: field.

Today, the Information Commissioner’s Office announced a monetary penalty stemming from the incident:

A London NHS trust has been fined after revealing the email addresses of more than 700 users of an HIV service.

56 Dean Street, a Soho-based sexual health clinic, offered a service to patients with HIV to receive test results and make appointments by email. Patients using the service also received an occasional newsletter. A small number of people who received the newsletter did not have HIV.

An error meant that anyone receiving the September newsletter could see the email addresses of all the other recipients. Addresses had been wrongly entered into the ‘to’ field instead of the ‘bcc’ field, and 730 of the 781 email addresses contained people’s full name.

Chelsea and Westminster Hospital NHS Foundation Trust, which runs the clinic, has been fined £180,000 after the ICO found there had been a serious breach of the Data Protection Act, which was likely to have caused substantial distress.

Information Commissioner Christopher Graham said:

“People’s use of a specialist service at a sexual health clinic is clearly sensitive personal data. The law demands this type of information is handled with particular care following clear rules, and put simply, this did not happen.

“It is clear that this breach caused a great deal of upset to the people affected. The clinic served a small area of London, and we know that people recognised other names on the list, and feared their own name would be recognised too. That our investigation found this wasn’t the first mistake of this type by the Trust only adds to what was a serious breach of the law.”

An ICO investigation found the trust had previously made a similar error in March 2010, when a member of staff in the pharmacy department sent a questionnaire to 17 patients in relation to their HIV treatment, entering emails in the ‘to’ field instead of the ‘bcc’ field. While some remedial measures were put in place following this mistake, there was no specific training implemented.

The fine will be paid into HM Treasury’s Consolidated Fund and is not kept by the Information Commissioner’s Office.

Christopher Graham said:

“The Trust was quick to apologise for their mistake, and has undertaken substantial remedial work since the breach. Nevertheless, it is crucial that the senior managers at NHS Trusts understand the requirements of data protection law, and the serious consequences that follow when that law is broken.”

Category: ExposureHealth DataNon-U.S.Of Note

Post navigation

← Passwords and Sexual Desires for Dating Site ‘Fling’ hacked and up for sale
Kiddicare customers at risk after data spills from test server →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.