Risk
4/27/2010
05:28 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Medical Records Keep Getting Dumped

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?According to the story Patient files found dumped in Monticello officials in Monticello NY found a pile of files containing Social Security numbers and private patient information out in the open.

The story says that a clerk working in a nearby retail store noticed that a stack of 15 boxes remained outside the building for more than a week.

Apparently the offices of DRC Physical Therapy Plus were shut down, as an eviction notice was on the front door dated April 8.

I guess in all of the hullabaloo, no one thought to secure the patient data, or dispose of it properly.

Unfortunately, this sort of thing happens way too often. Here's a story from Chattanooga, TN on May 16 of last year detailing "Thousands" Of Medical Records Discovered In Recycling Bin:

Anyone who peered inside the mixed paper bin at the Dupont Recycling Center this afternoon got an eyeful. Files, in plain sight, which authorities say contained sensitive medical and identity information.

"Upon finding those, they discovered it wasn't a small amount. it was a large amount that we had to notify hutcheson medical center and one other medical facility," says Investigator William Puckett with the Chattanooga Police Department.

Investigators thought they could fit all of the files into a single car, but there was just too many files for that to be possible.

There is also this story from Florida earlier this year, Medical files in Port St. Lucie trash bin could have led to ID fraud, police say:

Police determined the files, which contained information including patient names, Social Security numbers, phone numbers and addresses, had been discarded from University Medical Clinics in the 1800 block of Southeast Port St. Lucie Boulevard, said Officer Tom Nichols, police spokesman.

A man identified by Nichols as a high ranking official with the company indicated an employee had thrown the files way.

"A garbage bag full of medical records is not an oversight," Nichols said.

With all of the attention toward securing patient data during the past couple of years, it's a shame to see health care providers aren't doing more to protect their patients' interests. But while it's a shame, it's certainly no surprise. Consider this from a story, Medical Data At Risk, penned by Nicole Lewis earlier this month:

A new study from the Healthcare Information and Management Systems Society reports that since January 2008, more than 110 healthcare organizations have reported the loss of sensitive patient data affecting over 5,306,000 individuals.

The findings, published in the 2010 HIMSS Analytics Report: Security of Patient Data, show that the vast majority of the 250 healthcare IT and security professionals surveyed have policies, procedures and technology in place at their organizations to prevent data theft. But changes made to protect medical records haven't curbed the number of reported breaches, which increased six percent since 2008.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0543
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-0544
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.

CVE-2015-2721
Published: 2015-07-05
Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attacke...

CVE-2015-2722
Published: 2015-07-05
Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.

CVE-2015-2724
Published: 2015-07-05
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code v...

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report