Risk

4/27/2010
05:28 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Medical Records Keep Getting Dumped

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?According to the story Patient files found dumped in Monticello officials in Monticello NY found a pile of files containing Social Security numbers and private patient information out in the open.

The story says that a clerk working in a nearby retail store noticed that a stack of 15 boxes remained outside the building for more than a week.

Apparently the offices of DRC Physical Therapy Plus were shut down, as an eviction notice was on the front door dated April 8.

I guess in all of the hullabaloo, no one thought to secure the patient data, or dispose of it properly.

Unfortunately, this sort of thing happens way too often. Here's a story from Chattanooga, TN on May 16 of last year detailing "Thousands" Of Medical Records Discovered In Recycling Bin:

Anyone who peered inside the mixed paper bin at the Dupont Recycling Center this afternoon got an eyeful. Files, in plain sight, which authorities say contained sensitive medical and identity information.

"Upon finding those, they discovered it wasn't a small amount. it was a large amount that we had to notify hutcheson medical center and one other medical facility," says Investigator William Puckett with the Chattanooga Police Department.

Investigators thought they could fit all of the files into a single car, but there was just too many files for that to be possible.

There is also this story from Florida earlier this year, Medical files in Port St. Lucie trash bin could have led to ID fraud, police say:

Police determined the files, which contained information including patient names, Social Security numbers, phone numbers and addresses, had been discarded from University Medical Clinics in the 1800 block of Southeast Port St. Lucie Boulevard, said Officer Tom Nichols, police spokesman.

A man identified by Nichols as a high ranking official with the company indicated an employee had thrown the files way.

"A garbage bag full of medical records is not an oversight," Nichols said.

With all of the attention toward securing patient data during the past couple of years, it's a shame to see health care providers aren't doing more to protect their patients' interests. But while it's a shame, it's certainly no surprise. Consider this from a story, Medical Data At Risk, penned by Nicole Lewis earlier this month:

A new study from the Healthcare Information and Management Systems Society reports that since January 2008, more than 110 healthcare organizations have reported the loss of sensitive patient data affecting over 5,306,000 individuals.

The findings, published in the 2010 HIMSS Analytics Report: Security of Patient Data, show that the vast majority of the 250 healthcare IT and security professionals surveyed have policies, procedures and technology in place at their organizations to prevent data theft. But changes made to protect medical records haven't curbed the number of reported breaches, which increased six percent since 2008.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11506
PUBLISHED: 2018-05-28
The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer.
CVE-2018-11507
PUBLISHED: 2018-05-28
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. An attacker can trigger a long loop in image_load_pnm in image/image-pnm.cpp.
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.