Risk
1/9/2012
12:14 PM
Connect Directly
RSS
E-Mail
50%
50%

More Patient Data Risks, Lawsuits Predicted In 2012

The new year promises to bring greater patient data risks as healthcare organizations increase their use of mobile technology and social media sites.

Top 9 Health IT Stories Of 2011
Top 9 Health IT Stories Of 2011
(click image for larger view and for slideshow)
According to experts in healthcare law and information privacy and security, healthcare IT managers can expect to see more patient data breaches in 2012, along with more lawsuits filed by patients as the availability of patient information exchanged over social media sites and mobile devices grows.

These conclusions, published by ID Experts, offer a glimpse into what health CIOs can expect as they seek to protect patient data during a year that promises more of the same challenges they faced last year. In 2011, the healthcare industry had its fair share of patient data breaches, and the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) stepped up its oversight activities, handing down fines to healthcare organizations that were lax in meeting their patient privacy obligations.

Rick Kam, president and co-founder of ID Experts and chair of the American National Standard Institute’s (ANSI’s) PHI Project, gave InformationWeek Healthcare his assessment of the forecasts, noting that "the thread that links all of the predictions together is safeguarding. Protected health information (PHI) is truly a patient safety issue, and healthcare data breaches will reach epidemic proportions this year if precautions are not taken."

[Is it time to re-engineer your Clinical Decision Support system? See 10 Innovative Clinical Decision Support Programs.]

On the legal front, Kirk Nahra, partner at the law firm Wiley Rein LLP, predicts that the number of class-action lawsuits will increase in 2012 as patients sue healthcare organizations for failing to protect their health information.

Adam Greene, partner at Davis Wright Tremaine, said the next 12 months will bring greater attention to the 150 HITECH Act audits and publication of the final rules implementing modifications to the Health Insurance Portability and Accountability Act (HIPAA) regulations. Greene also said 2012 will see the OCR more aggressively pursuing enforcement against noncompliance due to "willful neglect." That will result in more financial settlements and fines.

Christine Marciano, president of Cyber Data Risk Managers LLC, said she foresees healthcare organizations increasingly signing up for cyber security and data breach insurance policies to protect themselves and their patients.

However, while insurance can provide some financial protection, other dangers are on the horizon. Larry Walker, president of The Walker Company, a healthcare consulting firm, said this year health providers will continue to outsource many functions, such as billing, to third parties or business associates (BA). But BAs are often considered the weak link in the data privacy and security chain.

Other privacy dangers will come from social media, according to Chris Apgar, CEO and president of Apgar & Associates, LLC. This year will see more physicians and healthcare organizations communicating with patients over social media sites. The misuse of social media will increase, as will the risk of exposure of PHI, Apgar predicts.

Christina Thielst, health administration consultant and blogger, believes the increasing use of tablets, smartphones, and tablet applications in healthcare will force providers to enter agreements that outline written terms of use with employees and contractors using personal devices in a healthcare setting.

With regard to cloud computing, James C. Pyles, principal, Powers Pyles Sutter & Verville PC, said because of security and privacy regulations there will be a demand for more health plans, health care providers, and health care clearinghouses to enter into a carefully worded business associate agreement with a cloud computing vendor before disclosing protected health information. These organizations should ensure that they have adequate cyber security insurance to cover the direct and indirect costs of a breach.

Given these predictions, Kam recommends that health CIOs:

-- Conduct an inventory to find out where protected health information and personally identifiable information exists within their organization and where this information exists at their business associates.

-- Perform a risk assessment to understand where there may be vulnerabilities and risks of unauthorized disclosure, and mitigate the risks you identify.

-- Evaluate relationships with current business associates and contracts to ensure that their organization’s privacy and security requirements are covered. Start with those business associates that present the highest risk.

-- Develop a clear communication plan for reporting unauthorized disclosures caused by the business associates.

When are emerging technologies ready for clinical use? In the new issue of InformationWeek Healthcare, find out how three promising innovations--personalized medicine, clinical analytics, and natural language processing--show the trade-offs. Download the issue now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CMARCIANO000
50%
50%
CMARCIANO000,
User Rank: Apprentice
1/12/2012 | 8:39:23 PM
re: More Patient Data Risks, Lawsuits Predicted In 2012
To expand on my comment above, its important that when a healthcare organization outsources its critical health information that they insist that their third party vendor has a data breach/cyber insurance policy in the event of a data breach. I am seeing more and more contracts that are requiring that a third party vendor has a data breach/cyber insurance policy. A Commercial General Liability (CGL) insurance policy is no longer enough today, as it does not cover cyber risks or digital information. This is a very important consideration for healthcare organizations.
CThielst
50%
50%
CThielst,
User Rank: Apprentice
1/12/2012 | 1:46:06 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
Lisa: We can expect to see social media technologies being used to gather information from patients and healthcare consumers and this data being uploaded into the patient's PHR or their EHR. Take microblogging or texting technologies for example. They can be used to communicate reminders to patients (time to take medication) or for mood monitoring or other reporting back to their clinician. The key is that this must be done on technologies that are secure and have the necessary safeguards to avoid breaches.
Christine Arevalo
50%
50%
Christine Arevalo,
User Rank: Apprentice
1/11/2012 | 1:39:38 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
In reference to social media and risks to patient data, patients can put themselves at risk by revealing too much information through social media outlets. Using this vehicle for communication between Dr. and Patient can also create legal risks for the medical facility or the physician. As this becomes more and more a G«£standardG«• communication channel for us, the risks of misuse, abuse, and unauthorized disclosures increases.

One reason for the concern is that the misuse of personal health information can have much greater impact on a patient than other types of data misuse. Also the effects of problems like medial identity theft, for example, can truly be devastating, if not deadly.
DPOLLACK000
50%
50%
DPOLLACK000,
User Rank: Apprentice
1/11/2012 | 1:12:18 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
To expand on the import of this article, 2012 promises to be a year where outsourcing of health information is likely to be a new and critical factor that contributes to data breach incidents. Healthcare providers are aggressively putting patient records into electronic health record (EHR) systems, and moving towards exchanging this type of information with health exchanges.

They are also increasingly using cloud-based services for hosting information in order to remove the physical threat and hassles that go along with sited computer systems. But as more information moves into the cloud, and out to other outside data processors, the threat of data breach grows dramatically.

Lawsuits and regulatory actions are likely to strike fear into the healthcare providers, but it is unlikely that this fear will translate into enhanced privacy and security until top management of health systems allocate budget and resources, and make this a top priority for their organizations. That surely isn't happening today.
Lisa Henderson
50%
50%
Lisa Henderson,
User Rank: Apprentice
1/10/2012 | 1:10:56 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
The consultants pretty much pointed out the loose links in the heatlhcare data chain, although I'm not clear on how social media affects personal health information, unless people are sharing their own information on social media? I'd like to see more specifics around that topic, such as which social media and how it can be risk-managed as far as a healthcare data breach.

I do hope that 2012 is not as dire as the prediction that "healthcare data breaches will reach epidemic proportions this year if precautions are not taken."

Lisa Henderson, InformationWeek Healthcare, contributing editor
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

CVE-2014-3315
Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

CVE-2014-3316
Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.