Risk
4/27/2010
05:28 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Medical Records Keep Getting Dumped

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?According to the story Patient files found dumped in Monticello officials in Monticello NY found a pile of files containing Social Security numbers and private patient information out in the open.

The story says that a clerk working in a nearby retail store noticed that a stack of 15 boxes remained outside the building for more than a week.

Apparently the offices of DRC Physical Therapy Plus were shut down, as an eviction notice was on the front door dated April 8.

I guess in all of the hullabaloo, no one thought to secure the patient data, or dispose of it properly.

Unfortunately, this sort of thing happens way too often. Here's a story from Chattanooga, TN on May 16 of last year detailing "Thousands" Of Medical Records Discovered In Recycling Bin:

Anyone who peered inside the mixed paper bin at the Dupont Recycling Center this afternoon got an eyeful. Files, in plain sight, which authorities say contained sensitive medical and identity information.

"Upon finding those, they discovered it wasn't a small amount. it was a large amount that we had to notify hutcheson medical center and one other medical facility," says Investigator William Puckett with the Chattanooga Police Department.

Investigators thought they could fit all of the files into a single car, but there was just too many files for that to be possible.

There is also this story from Florida earlier this year, Medical files in Port St. Lucie trash bin could have led to ID fraud, police say:

Police determined the files, which contained information including patient names, Social Security numbers, phone numbers and addresses, had been discarded from University Medical Clinics in the 1800 block of Southeast Port St. Lucie Boulevard, said Officer Tom Nichols, police spokesman.

A man identified by Nichols as a high ranking official with the company indicated an employee had thrown the files way.

"A garbage bag full of medical records is not an oversight," Nichols said.

With all of the attention toward securing patient data during the past couple of years, it's a shame to see health care providers aren't doing more to protect their patients' interests. But while it's a shame, it's certainly no surprise. Consider this from a story, Medical Data At Risk, penned by Nicole Lewis earlier this month:

A new study from the Healthcare Information and Management Systems Society reports that since January 2008, more than 110 healthcare organizations have reported the loss of sensitive patient data affecting over 5,306,000 individuals.

The findings, published in the 2010 HIMSS Analytics Report: Security of Patient Data, show that the vast majority of the 250 healthcare IT and security professionals surveyed have policies, procedures and technology in place at their organizations to prevent data theft. But changes made to protect medical records haven't curbed the number of reported breaches, which increased six percent since 2008.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio