Risk
1/17/2012
11:50 AM
Connect Directly
RSS
E-Mail
50%
50%

Patient Data Theft Sends IT Specialist To Jail

Atlanta man gets 13 months for hacking into former employer's computer database and stealing patient data for a competing medical practice.

12 Mobile Health Apps Worth A Closer Look
9 Mobile Health Apps Worth A Closer Look
(click image for larger view and for slideshow)
Eric McNeal, a 38-year-old information technology specialist from Atlanta, Ga., has been sentenced for hacking into the patient database of a former employer, stealing patient information, and then deleting the information from the system.

For his crime, McNeal was sentenced on Jan. 10 to serve 13 months in prison with three years of supervision after his release. McNeal also was ordered to perform 120 hours of community service.

"The circumstances of this case and resulting patient data breach is very common," and can happen in any size of practice, Rick Kam, president and co-founder of ID Experts told InformationWeek Healthcare. According to court documents, McNeal, who pleaded guilty to the charge on Sept. 28, worked as an information technology specialist for APA, a perinatal medical practice in Atlanta. He left APA in November 2009, and subsequently joined a competing perinatal medical practice, which was located in the same building as APA.

[ Explore docs' fascination with iPads. See Apple Capitalizes On Doctors' iPad Romance. ]

In April 2010, McNeal used his home computer to hack into APA's patient database; download the names, telephone numbers, and addresses of APA's patients; and then delete all the patient information from APA's system. McNeal used the patient names and contact information he stole to launch a direct-mail marketing campaign for his new employer. There is no evidence that McNeal downloaded or misused specific patient medical information.

Christine Marciano, president of Cyber Data Risk Managers, said medical facilities looking at this case should ask themselves how they can realistically protect against similar hacking attempts. "Having an exit strategy in place when an employee leaves or is terminated should be strictly enforced," Marciano told InformationWeek Healthcare. "The exit strategy needs to include cutting off the employee's access to all of the facility's databases in order to prevent unauthorized access."

Richard Santalesa, senior counsel at InfoLawGroup, said because McNeal pleaded guilty his sentence was reduced, and noted that McNeal could have received a five-year federal prison sentence for his crimes.

"Anyone who gives their personal information to a doctor or medical facility does not expect that their information will be hacked and used to make money," U.S. Attorney Sally Quillian Yates, said in a statement. "The cost of medical care is already high enough without patients having to pay a heavier cost with the loss of their privacy."

When are emerging technologies ready for clinical use? In the new issue of InformationWeek Healthcare, find out how three promising innovations--personalized medicine, clinical analytics, and natural language processing--show the trade-offs. Download the issue now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/18/2012 | 1:20:16 AM
re: Patient Data Theft Sends IT Specialist To Jail
Symantec recently released some interesting research about insider threats and the profile of employees who tend to go rogue that is good reading for organizations worried about this kind of breach.
http://www.symantec.com/connec...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio