Risk
4/27/2010
05:28 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Medical Records Keep Getting Dumped

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?

Why were possibly thousands of private patient records found dumped outside the closed offices of a physical therapy center?According to the story Patient files found dumped in Monticello officials in Monticello NY found a pile of files containing Social Security numbers and private patient information out in the open.

The story says that a clerk working in a nearby retail store noticed that a stack of 15 boxes remained outside the building for more than a week.

Apparently the offices of DRC Physical Therapy Plus were shut down, as an eviction notice was on the front door dated April 8.

I guess in all of the hullabaloo, no one thought to secure the patient data, or dispose of it properly.

Unfortunately, this sort of thing happens way too often. Here's a story from Chattanooga, TN on May 16 of last year detailing "Thousands" Of Medical Records Discovered In Recycling Bin:

Anyone who peered inside the mixed paper bin at the Dupont Recycling Center this afternoon got an eyeful. Files, in plain sight, which authorities say contained sensitive medical and identity information.

"Upon finding those, they discovered it wasn't a small amount. it was a large amount that we had to notify hutcheson medical center and one other medical facility," says Investigator William Puckett with the Chattanooga Police Department.

Investigators thought they could fit all of the files into a single car, but there was just too many files for that to be possible.

There is also this story from Florida earlier this year, Medical files in Port St. Lucie trash bin could have led to ID fraud, police say:

Police determined the files, which contained information including patient names, Social Security numbers, phone numbers and addresses, had been discarded from University Medical Clinics in the 1800 block of Southeast Port St. Lucie Boulevard, said Officer Tom Nichols, police spokesman.

A man identified by Nichols as a high ranking official with the company indicated an employee had thrown the files way.

"A garbage bag full of medical records is not an oversight," Nichols said.

With all of the attention toward securing patient data during the past couple of years, it's a shame to see health care providers aren't doing more to protect their patients' interests. But while it's a shame, it's certainly no surprise. Consider this from a story, Medical Data At Risk, penned by Nicole Lewis earlier this month:

A new study from the Healthcare Information and Management Systems Society reports that since January 2008, more than 110 healthcare organizations have reported the loss of sensitive patient data affecting over 5,306,000 individuals.

The findings, published in the 2010 HIMSS Analytics Report: Security of Patient Data, show that the vast majority of the 250 healthcare IT and security professionals surveyed have policies, procedures and technology in place at their organizations to prevent data theft. But changes made to protect medical records haven't curbed the number of reported breaches, which increased six percent since 2008.

For my security and technology observations throughout the day, consider following me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.