Risk
10/25/2010
02:54 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

More Patient Data Dumps

Yet another case where patient medical records are left in a dumpster and out in plain sight.

Yet another case where patient medical records are left in a dumpster and out in plain sight.What is it going to take to ensure hospitals and medical facilities properly dispose of patient records? NewsChannel4, KFOR.com in Oklahoma City reports that a resident found dumped patient records from at least two different offices.

Within each folder they found oncology patient record details on children and their parents. The news station says it retrieved all of the medical files and then contacted both medical offices.

It's quite possible that the firm the offices use to dispose of their records failed to properly shred them. The video of the news report is below:

 

Unfortunately, these types of incidents are not uncommon. We recently covered an Urgent Care that was fined $50,000 for a similar dump. And we've noted others occurring in Monicello, NY, Chattanooga, TN, and Port Lucie, FL.

Security firm McAfee recently had breaches that involved Social Security numbers between January 2009 and this October analyzed to rank the most dangerous locations for one to leave their Social Security number. The breach data was sourced from the Identity Theft Resource Center, Privacy Rights Clearinghouse and the Open Security Foundation that involved Social Security number breaches from January 2009 - October 2010.

Turned out health care related offices took 3 of the top 10 slots. Third place was hospitals, seventh was medical related businesses (distributors, billing services, etc.), and tenth place tied with medical insurance firms and medical offices and clinics.

So hospitals and medical offices may not only be ideal places to pick up a new disease, they're also ideal for having your identity information stolen.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.