Risk
4/27/2010
05:28 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Medical Records Keep Getting Dumped

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?According to the story Patient files found dumped in Monticello officials in Monticello NY found a pile of files containing Social Security numbers and private patient information out in the open.

The story says that a clerk working in a nearby retail store noticed that a stack of 15 boxes remained outside the building for more than a week.

Apparently the offices of DRC Physical Therapy Plus were shut down, as an eviction notice was on the front door dated April 8.

I guess in all of the hullabaloo, no one thought to secure the patient data, or dispose of it properly.

Unfortunately, this sort of thing happens way too often. Here's a story from Chattanooga, TN on May 16 of last year detailing "Thousands" Of Medical Records Discovered In Recycling Bin:

Anyone who peered inside the mixed paper bin at the Dupont Recycling Center this afternoon got an eyeful. Files, in plain sight, which authorities say contained sensitive medical and identity information.

"Upon finding those, they discovered it wasn't a small amount. it was a large amount that we had to notify hutcheson medical center and one other medical facility," says Investigator William Puckett with the Chattanooga Police Department.

Investigators thought they could fit all of the files into a single car, but there was just too many files for that to be possible.

There is also this story from Florida earlier this year, Medical files in Port St. Lucie trash bin could have led to ID fraud, police say:

Police determined the files, which contained information including patient names, Social Security numbers, phone numbers and addresses, had been discarded from University Medical Clinics in the 1800 block of Southeast Port St. Lucie Boulevard, said Officer Tom Nichols, police spokesman.

A man identified by Nichols as a high ranking official with the company indicated an employee had thrown the files way.

"A garbage bag full of medical records is not an oversight," Nichols said.

With all of the attention toward securing patient data during the past couple of years, it's a shame to see health care providers aren't doing more to protect their patients' interests. But while it's a shame, it's certainly no surprise. Consider this from a story, Medical Data At Risk, penned by Nicole Lewis earlier this month:

A new study from the Healthcare Information and Management Systems Society reports that since January 2008, more than 110 healthcare organizations have reported the loss of sensitive patient data affecting over 5,306,000 individuals.

The findings, published in the 2010 HIMSS Analytics Report: Security of Patient Data, show that the vast majority of the 250 healthcare IT and security professionals surveyed have policies, procedures and technology in place at their organizations to prevent data theft. But changes made to protect medical records haven't curbed the number of reported breaches, which increased six percent since 2008.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

CVE-2015-2922
Published: 2015-05-27
The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.

Dark Reading Radio
Listen Now Incident Response War Gaming: Practicing the Post-Breach Panicking
After a serious cybersecurity incident, everyone will be looking to you for answers -- but youíll never have complete information and youíll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?