The reason why so many cases come to light in the NHS, he suggested, is because for most organisations, reporting a breach of the Data Protection Act is not a legal requirement. However, in the NHS it is a "management instruction" to report all data breaches - both of computerised data and physical data, such as paper records - to the ICO.
That then sets in train what is, by now, a well-practised investigatory process. First, the ICO conducts a preliminary assessment as to whether the reported breach can be categorised as a "serious breach" that carries substantial risk of damage and distress, said Smith.
If so, a full investigation is instigated. This involves site visits and interviews with staff. "What we are looking for is not just an unencrypted memory stick that was lost, it's what sits behind that in terms of a failure by the organisation to have proper arrangements in place to protect the data," said Smith.
He added: "If the organisation can show us that they have got a very clear policy that states that all portable media must be encrypted and that they brought that to the attention of their staff; that there's been training and they can point you to an individual who has knowingly broken the rules against whom they have taken disciplinary action. Then, we probably wouldn't proceed to a monetary penalty if they can show that they have taken reasonable steps," said Smith.
In the case of South London Healthcare NHS Trust - an organisation formed from the merger of two near-bankrupt neighbouring NHS Trusts - the ICO was satisfied that the losses were fairly isolated incidents and contrary to the Trust's established processes. Instead of serving an enforcement notice under section 40 of the Act, which would have enabled the ICO to levy a fine, the chief executive of the Trust signed an undertaking to:
What is perhaps intriguing, is the neutrality of the ICO on the subject of downloading personal data from organisational systems in the first place. Instead of eschewing this practice, the recommendation is that it ought to be encrypted on the device.
But most security experts would state that a member of staff should not be allowed to download sensitive, personal data just because they want to work on it at home.
Smith apparently disagrees, instead feeling the data is free to be taken anywhere, as long as it is encrypted.
"Sensibly run organisations will have a rule that no personal data should be put onto portable media, like memory sticks, unless there's a proper system of encryption in place."
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)