DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Chelsea and Westminster NHS trust fined £180,000 for HIV newsletter data breach

Posted on May 9, 2016 by Dissent

There’s a follow-up to the breach involving the 56 Dean Street clinic in London run by the the Chelsea and Westminster NHS Trust. The breach involved a staff member accidentally exposing all recipients of an HIV newsletter in the To: field.

Today, the Information Commissioner’s Office announced a monetary penalty stemming from the incident:

A London NHS trust has been fined after revealing the email addresses of more than 700 users of an HIV service.

56 Dean Street, a Soho-based sexual health clinic, offered a service to patients with HIV to receive test results and make appointments by email. Patients using the service also received an occasional newsletter. A small number of people who received the newsletter did not have HIV.

An error meant that anyone receiving the September newsletter could see the email addresses of all the other recipients. Addresses had been wrongly entered into the ‘to’ field instead of the ‘bcc’ field, and 730 of the 781 email addresses contained people’s full name.

Chelsea and Westminster Hospital NHS Foundation Trust, which runs the clinic, has been fined £180,000 after the ICO found there had been a serious breach of the Data Protection Act, which was likely to have caused substantial distress.

Information Commissioner Christopher Graham said:

“People’s use of a specialist service at a sexual health clinic is clearly sensitive personal data. The law demands this type of information is handled with particular care following clear rules, and put simply, this did not happen.

“It is clear that this breach caused a great deal of upset to the people affected. The clinic served a small area of London, and we know that people recognised other names on the list, and feared their own name would be recognised too. That our investigation found this wasn’t the first mistake of this type by the Trust only adds to what was a serious breach of the law.”

An ICO investigation found the trust had previously made a similar error in March 2010, when a member of staff in the pharmacy department sent a questionnaire to 17 patients in relation to their HIV treatment, entering emails in the ‘to’ field instead of the ‘bcc’ field. While some remedial measures were put in place following this mistake, there was no specific training implemented.

The fine will be paid into HM Treasury’s Consolidated Fund and is not kept by the Information Commissioner’s Office.

Christopher Graham said:

“The Trust was quick to apologise for their mistake, and has undertaken substantial remedial work since the breach. Nevertheless, it is crucial that the senior managers at NHS Trusts understand the requirements of data protection law, and the serious consequences that follow when that law is broken.”

Related posts:

  • HIPAA Security Rule Facility Access Controls – What are they and how do you implement them?
Category: ExposureHealth DataNon-U.S.Of Note

Post navigation

← Passwords and Sexual Desires for Dating Site ‘Fling’ hacked and up for sale
Kiddicare customers at risk after data spills from test server →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.