SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

BSIA research highlights the need for the secure destruction of information data

Contact company
Contact British Security Industry Association (BSIA)
icon Add as a preferred source Download PDF version
The survey results underlined the growing demand for information destruction services in the healthcare sector
BSIA research underlines the need for the healthcare sector to implement robust procedures to prevent robust information

One in four healthcare professionals have reported that their organisation has been the subject of some sort of data breach, new research carried out on behalf of the Information Destruction (ID) Section of the British Security Industry Association (BSIA) has revealed.

This surprising statistic comes from a BSIA survey which questioned key workers in the healthcare sector – including consultants, doctors, senior managers, facilities managers and IT managers – of which over half were from hospitals.

This research underlines the need for the healthcare sector to continue to implement robust procedures to prevent sensitive information from falling into the wrong hands. A parallel survey was also conducted, considering the experiences of the service providers themselves, specifically, member companies of the BSIA ID Section.

The survey of healthcare professionals identified a number of issues and trends associated with the secure destruction of information, whether held on paper or data processing related media.  Interestingly, 27% of those completing the survey were aware of a significant data loss incident in their organisation. Of these, two-thirds said that the data breach was a direct result of incorrect disposal whilst, worryingly, another third attributed the loss to the action of criminals, such as theft.

Turning to the type of information that respondents are most concerned about protecting, from unauthorised access, patient records were way out in front, being singled out by half of those surveyed. The second highest, on just over 14%, was financial data.

On a more positive note, when asked if they felt that the threat posed by lost or inadequately disposed data had increased, stayed the same, or decreased over the past 12 months, a significant proportion - 38% - said that, in their opinion, the threat level has actually reduced. Of course, this must still be viewed in the context that the majority believed that the danger was, at the very least, the same as before.

''Moving ahead, as the
BSIA ID Section we
recommend that only
professional and trusted
providers are used.''

In terms of the action being taken to oversee the destruction of confidential data, 62% of those surveyed confirmed that in their part of the healthcare sector a professional company was being employed – an encouraging figure.  However, the fact that 59% of respondents did not know if their approach to such a sensitive task - whether through an outside provider or in-house - actually complied with the critical European standard, EN15713, demonstrates a critical knowledge gap.

Considering what material is most challenging for the healthcare sector to dispose of, the survey results were split evenly between paper and data processing related media such as CDs, memory sticks and computer hard-drives. This shows that, even now, traditional materials like paper still account for a significant proportion of the sector's data disposal requirements.

Turning to the findings of the parallel survey of BSIA ID Section members, results underlined the growing demand for information destruction services in the healthcare sector, with an impressive 81% of those who replied witnessing a year-on-year increase.

When questioned on why they believed there had been a surge in their healthcare sector business, the leading reason given by ID Section member companies (38%) was a recognition by customers - like hospitals - of the reputational damage that can result from an unexpected loss of data. Other factors cited included: the potential penalties for breaching the Data Protection Act - 20.5% - and an awareness of the fraudulent use of data thanks to high profile cases.

Beyond this, hospitals were highlighted as the healthcare establishment dealt with most by ID Section respondents - in around half of all cases. In addition, facilities managers were singled out by 83% of members as the individuals most likely to be driving data disposal on the ground.

Anthony Pearlgood, Chairman of the BSIA’s Information Destruction Section, commented on the revealing research findings: "Effective information destruction needs to remain high on the agenda for the healthcare sector, even when there may be a feeling, as evidenced by some of the responses we saw, that the threat may be reducing or remaining the same.

“Given its security-critical nature there can be no room for complacency and, in the current climate of budgetary pressures, the temptation for management to take shortcuts with information destruction procedures like shredding needs to be resisted.”

One in four healthcare
professionals have
reported that their
organisation has been
the subject of some
sort of data breach

Anthony went on to add: “In this regard it is good to see that our members are reporting a greater take-up of their services. The reality is that once a data breach occurs - like those reported by a quarter of the healthcare workers we surveyed - experience shows that organisations simply can't control when, how, or where that information is going to be used, not an ideal state of affairs if we are talking about patient records.”

"Moving ahead, as the BSIA ID Section we recommend that only professional and trusted providers are used. Crucially, these should comply with the key security requirements set out in the EN15713 standard - including site security and material specific shred sizes - and vet their staff to BS87858 so any information held can be destroyed in line with an organisation's Data Protection Act obligations."

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Healthcare security
  • Security management
  • Security monitoring system
  • Security service
  • Related categories
  • Access control systems & kits
  • Mechanical digital locks
  • Access control system accessories
  • Access control software
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec