iTnews
  • Home
  • News
  • Technology
  • Security

Medical records discovered in garden shed after robbery

By Paris Cowan on Jul 15, 2014 11:51AM
Medical records discovered in garden shed after robbery

Privacy Commissioner not impressed.

A Melbourne medical centre is to blame for a serious privacy breach last year when the highly sensitive health records of up 960 former patients were compromised after the abandoned garden shed they were stored inside was broken into.

Australian Privacy Commissioner Timothy Pilgrim today ruled that the Pound Road Medical Centre in Narre Warren South failed in its duty to secure the personal information of its customers and to identify and destroy data it no longer needed.

However the business will narrowly avoid fines that could reach up to $1.7 million because the breach took place before refreshed privacy legislation came into effect in March this year.

The paper documents were in the process of being scanned and uploaded to an electronic filing system called ‘Medical Director’ prior to the medical centre moving premises in April 2011 – at which point they were moved to the back shed to make way for renovations.

The business operators claim that they were not aware that the unsecured boxes of documents moved to the shed contained health records, but Privacy Commissioner Tim Pilgrim said he was not convinced by this excuse.

“Physical security of hard copy documents is just as important as digital security. There is no point in converting paper records to a secure digital system, and then leaving the paper files unsecured,” he said in a statement.

“I can’t think of any circumstances in which it would be reasonable to store health records, or any sensitive information, in an unsecure temporary structure such as a garden shed."

The records included names, addresses, birth dates plus medicare details, treatments information and payment records for affected patients.

Pilgrim’s official report said it was an “exacerbating factor” that the shed was not located at the current business premises, which would have at least allowed for monitoring of the structure.

It also pointed out that most of the records were at least 11 years old and related to individuals that were no longer patients of the practice, meaning that they should have been identified as unrequired records and destroyed under the privacy principles.

The Pound Road Medical Centre made no attempt to notify individuals affected or the Office of the Australian Information Commission about the break in when it took place. The OAIC said it found out about the incident through the press – as it did with the last adverse finding it handed down in late June.

In the absence of mandatory data breach notification laws, Pilgrim encouraged organisations to be more upfront about security incidents.

Upon the OAIC’s advice, the medical centre is implementing a number of changes to the ways it stores and manages records, including annual reviews of which records it still needs and which should be destroyed.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
data breachhealthinfosecoaicprivacyprivacy commissionersecurity

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Paris Cowan
Jul 15 2014
11:51AM
0 Comments

Related Articles

  • Australian gov data breach numbers slip out of public view
  • Qld gov proposes mandatory data breach reporting for agencies
  • icare still waiting on leaked workers' comp data to be deleted
  • Law firm mulls class action over NDIS software provider data breach
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.