NHS axes care.data scheme
The controversial data-sharing scheme has been scrapped following a review
The closure was prompted by the findings of a review by national data guardian, Dame Fiona Caldicott, into the use and security of patient data within the NHS.
"In light of Dame Fiona's recommendations, NHS England has taken the decision to close the care.data programme", said minister for life sciences, George Freeman.
The government's care.data programme was an initiative intended to improve the NHS and social services, by pooling and analysing the vast stores of patient data generated by the two bodies.
While the national data guardian's review wasn't specifically focused on the care.data programme, its recommendations were judged to be effectively incompatible with its current format.
The review found there was support for care.data's core principle - using patient data to improve the NHS - but that it was marred by a lack of public understanding and poor explanation of the scheme's functions.
Caldicott recommended that a new consent model be implemented to let patients opt-out of having their data used for anything beyond their direct care.
"The review goes further than the approach that was planned for care.data and its pathfinder areas," Freeman said.
Despite the failure of the care.data scheme, Freeman reinforced that the government and NHS England are still "absolutely committed" to making use of patient data.
"This work will now be taken forward by the National Information Board, in close collaboration with the primary care community in order to retain public confidence and to drive better care for patients," he said.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now