Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Child rapist could have profiled victims through unaudited access to NHS databases | Computer Weekly

By Computer Weekly by By Computer Weekly
March 11, 2026
Home Uncategorized
Share on FacebookShare on Twitter


A former NHS analyst and convicted child rapist could have profiled his victims through NHS database queries that were unaudited.

Paul Lipscombe, from Rothley, Leicestershire, who was 51 at the time he was jailed for 28 years in November 2025, worked at University Hospitals Coventry and Warwickshire NHS Trust as an analyst when he committed multiple sexual offences against girls.

Leicestershire Police, which investigated Lipscombe, said he targeted victims between 12 and 15, via the Snapchat social media app.

An NHS whistleblower with knowledge of systems told Computer Weekly that in his analyst role, Lipscombe would have also been able to collect the personal details of victims through unaudited SQL database searches.

While the NHS Trust said it “undertook a records check in relation to Paul Lipscombe’s patient access”, which identified no concerns, the whistleblower revealed concerns amongs staff that access to patient information for analysts at many NHS trusts is untraceable.

Typical hospitals will have up to 20 analysts who run legitimate queries against databases, mainly SQL, as part of their jobs. They have access to data that sits behind the digital systems in hospitals to produce reports for internal use and for government. Most patient contact that is recorded on a digital system will be accessible by analysts through databases. This includes personal data.

In contrast, access to the Patient Administration System (PAS), which is used by many staff, is audited, and its use is traceable. “In many NHS hospitals, every time a staff member opens a patient’s record on the PAS, their access to the record is logged and auditable,” said the whistleblower. “But analysts who work directly with the underlying databases, often in SQL Server, can retrieve the same personal patient details without creating an auditable record of who accessed what.”

Accountability gap

This creates a gap in accountability. “If an analyst wanted to misuse demographic information such as addresses or phone numbers, in many NHS trusts there would be little or no audit trail to detect it,” added the source. “The NHS should require all trusts to log database queries by analysts and retain those records for several years so that access to sensitive data can always be traced.” 

Analysts have to sign data protection guarantees to ensure data is not shared or leaked, but the lack of traceability of what database searches were carried out and by whom is a serious loophole in NHS security which could leave patients vulnerable.

Computer Weekly asked NHS England and Lipscombe’s former employer, University Hospitals Coventry and Warwickshire NHS Trust, why analyst searches are not audited at many trusts and what plans are in place to change this. Neither organisation responded to the question.

NHS England had not responded to Computer Weekly’s questions when this artoicle was published.

Following Lipscombe’s arrest in April 2024, University Hospitals Coventry and Warwickshire NHS Trust immediately suspended him, before dismissing him from his role in June 2024.

The trust said it supported Leicestershire Police with its investigations and carried out its own internal review. In a statement in November 2025, it said: “Nothing has been identified at this stage to indicate this individual’s criminal activity was committed as part of their role.”



Source link

By Computer Weekly

By Computer Weekly

Next Post
Strong security balances consolidation and best-of-breed capabilities | Computer Weekly

Strong security balances consolidation and best-of-breed capabilities | Computer Weekly

Recommended.

IDEMIA Public Security Enables Ability to Add Iowa Driver’s Licenses and State IDs to Google Wallet

IDEMIA Public Security Enables Ability to Add Iowa Driver’s Licenses and State IDs to Google Wallet

June 25, 2025
IDEMIA Public Security to Launch New State Driver’s Licenses and IDs with Innovative Design for California in Partnership with the California Department of Motor Vehicles

IDEMIA Public Security to Launch New State Driver’s Licenses and IDs with Innovative Design for California in Partnership with the California Department of Motor Vehicles

October 10, 2025

Trending.

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

April 3, 2026
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

April 3, 2026
Viettel Marks 20 Years of Global Expansion, Overseas Revenue Up 25%

Viettel Marks 20 Years of Global Expansion, Overseas Revenue Up 25%

April 3, 2026
守正笃行:IBM 张榕解码 AI 时代的组织变革与人才之道

守正笃行:IBM 张榕解码 AI 时代的组织变革与人才之道

April 3, 2026
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

April 3, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio