Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Fife hospitals worst for IT guidelines breaches

Fife hospitals worst for IT guidelines breaches

NHS staff in Fife have been reported for breaching IT guidelines in hospitals more than any other health board area in Scotland over the past three years, according to figures published by the Scottish Conservatives.

The figures highlighted 187 Fife incidents where staff were found sharing passwords, swearing in emails, making inappropriate Facebook comments and installing banned software on health board computers since 2010.

The figures showed that in Tayside three incidents were recorded.

But NHS Fife said the number of incidents recorded were down to their zero-tolerance approach to IT breaches, with Fife the first area in Scotland to achieve the recognised standards of combatting the problem.

A total of 487 incidents were recorded in Scotland as a whole. The figures were obtained by the Scottish Conservatives through a Freedom of Information request.

The true numbers are expected to be much higher, with Scotland’s largest health board, Greater Glasgow and Clyde, failing to provide its figures and many others saying significant numbers would have been dealt with at line-manager level, meaning they were not formally recorded.

Responses received from Scotland’s health boards have revealed other offences, including forwarding emails to the wrong recipient and “inappropriate use” of work computers.

Of the 481 breaches noted, 195 took place in 2012, with 170 in 2011 and 109 the year before that.

At least 15 Scottish workers have been sacked or forced to resign, while a handful of others were even given counselling as a result of the offence, though some health boards refused to detail what disciplinary action had been taken.

Scottish Conservative health spokesman and deputy leader Jackson Carlaw MSP said: “More and more sensitive information in hospitals is being held electronically, including patient records and highly confidential data.

“As a result, we need to ensure those who have access act completely responsibly to ensure it doesn’t end up in the wrong hands.

“The fact this trend appears to be increasing is very concerning, particularly when you consider high profile incidents of data loss over recent years.

“I’m sure the vast majority of these breaches have been committed accidentally, but that makes it even more critical that the NHS IT system is secure and resilient to such gaffes.

“The NHS in Scotland is having to tighten its belt. And increasing use of IT can actually help this process. But, as that happens, it’s equally essential the electronic systems in place are not vulnerable to attack or mistaken meltdown.”

Mrs Chris Bowring, director of finance with NHS Fife, said: “NHS Fife is the first board in Scotland to have ISO 27001 accreditation and we take a zero-tolerance approach to IT breaches.

“Our security system monitors all activity, picking up and recording any breaches. Breaches are then followed up and, when necessary, our staff are appropriately disciplined.”

ISO 27001 certification is an internationally-recognised standard that is awarded to those organisations who can demonstrate that their information security management system (ISMS) can identify, manage and minimise the range of risks to which information is regularly subjected in accordance with the International Organisation for Standardisation (ISO).

Mrs Bowring added: “The ISO 27001 audit and certification process focuses on every aspect of our team, including physical infrastructure, site security, personnel capabilities, communications and operations, legal compliance, back-up and disaster recovery systems.”