DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Chelsea and Westminster NHS trust fined £180,000 for HIV newsletter data breach

Posted on May 9, 2016 by Dissent

There’s a follow-up to the breach involving the 56 Dean Street clinic in London run by the the Chelsea and Westminster NHS Trust. The breach involved a staff member accidentally exposing all recipients of an HIV newsletter in the To: field.

Today, the Information Commissioner’s Office announced a monetary penalty stemming from the incident:

A London NHS trust has been fined after revealing the email addresses of more than 700 users of an HIV service.

56 Dean Street, a Soho-based sexual health clinic, offered a service to patients with HIV to receive test results and make appointments by email. Patients using the service also received an occasional newsletter. A small number of people who received the newsletter did not have HIV.

An error meant that anyone receiving the September newsletter could see the email addresses of all the other recipients. Addresses had been wrongly entered into the ‘to’ field instead of the ‘bcc’ field, and 730 of the 781 email addresses contained people’s full name.

Chelsea and Westminster Hospital NHS Foundation Trust, which runs the clinic, has been fined £180,000 after the ICO found there had been a serious breach of the Data Protection Act, which was likely to have caused substantial distress.

Information Commissioner Christopher Graham said:

“People’s use of a specialist service at a sexual health clinic is clearly sensitive personal data. The law demands this type of information is handled with particular care following clear rules, and put simply, this did not happen.

“It is clear that this breach caused a great deal of upset to the people affected. The clinic served a small area of London, and we know that people recognised other names on the list, and feared their own name would be recognised too. That our investigation found this wasn’t the first mistake of this type by the Trust only adds to what was a serious breach of the law.”

An ICO investigation found the trust had previously made a similar error in March 2010, when a member of staff in the pharmacy department sent a questionnaire to 17 patients in relation to their HIV treatment, entering emails in the ‘to’ field instead of the ‘bcc’ field. While some remedial measures were put in place following this mistake, there was no specific training implemented.

The fine will be paid into HM Treasury’s Consolidated Fund and is not kept by the Information Commissioner’s Office.

Christopher Graham said:

“The Trust was quick to apologise for their mistake, and has undertaken substantial remedial work since the breach. Nevertheless, it is crucial that the senior managers at NHS Trusts understand the requirements of data protection law, and the serious consequences that follow when that law is broken.”

Related posts:

  • Former California State Contractor Sued Over Breach Of HIV Patient Privacy
  • AlphaBay and Hansa taken down in coordinated operations by FBI and Dutch National Police
  • Aetna, still looking for scapegoat in HIV disclosure fiasco, sues plaintiffs firms
  • “A crucial learning experience.” – ICO calls for highest standards in HIV services after NHS Highland reprimand
Category: ExposureHealth DataNon-U.S.Of Note

Post navigation

← Passwords and Sexual Desires for Dating Site ‘Fling’ hacked and up for sale
Kiddicare customers at risk after data spills from test server →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.