DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HOW many patient privacy breaches per month?

Posted on September 16, 2010 by Dissent

As regular readers know, I tend to avoid blogging about commercial products and am leery about reporting results from studies that might be self-serving, but a new paper from FairWarning has some data that I think are worth mentioning here.    In their report, they provide some baseline data on how many patient privacy breaches their clients were experiencing each month.   Keeping in mind that many places already had some security and privacy protocols in place and that higher rates are more likely to create customers for them, here’s what they report for four clients that they say are representative cases from their client database of 300 clients:

Health System Description Number of confirmed monthly incidents at outset of FairWarning® deployment
200-bed hospital with a few small clinics – Rurally based 24 confirmed incidents per month
U.S. based physician practice with 20 clinics metro and rurally dispersed 29 confirmed incidents per month
UK based teaching hospital in major metropolitan area as well as rurally based facilities 130 confirmed incidents per month
Top 50 U.S. Health System with multiple affiliated hospitals and clinics – Based in a major metropolitan area
125 confirmed incidents per month

Those four cases are described in more detail in the paper.   If the figures seem high to you, you may want to compare them to breach reports received by California since their new breach reporting law involving medical records went into effect last year.  I asked FairWarning about the difference and their view is that many many breaches really are not detected.  Kurt Long replied, “health records are rarely detected and rarer still reported.” In other words, if we were shocked by how many reports California is receiving, we’d be stunned if we knew how many breaches there really are each year that go undetected or unreported.

Although no detailed statistics are provided, the report also provides a summary on the types of patient privacy breaches most likely to occur for different types of localities. For all types of localities, the following types of privacy breaches were reported:

  • Care provider employees visiting as a patient
  • Immediate Family member snooping
  • Child custody cases
  • Criminal suspects covered in media
  • Billing and fraud related

Not surprisingly, entities in rural localities also reported:

  • Local government official snooping
  • Neighbor snooping
  • Extended family member snooping

While entities in  metropolitan localities were more likely to report:

  • Sports star snooping
  • Federal or state government official snooping
  • High profile business personality snooping
  • High profile celebrity/media personality snooping
  • Traditional identity theft
  • Medical identity theft

Of note, they  report that in their benchmark study, they obtained “multiple reports” from metropolitan and rural based care providers detecting staff using EHR access to systematically steal the identities of deceased patients to commit financial identity theft.

The company uses case examples with timelines to make the following points:

1.  Simply informing your employees that you have implemented a monitoring program to detect privacy breaches can decrease patient privacy breaches significantly (on the order of 36% in one large metropolitan multi-hospital system and 60% in a rural hospital with remote clinics).

2.   Telling employees that they are being monitored is not sufficient.  Staff training (and re-training when new employees are hired) is also required to achieve desired results as is consistent and appropriate sanctions. The company notes that they observed spikes in privacy breaches whenever new staff was hired, suggesting to me that entities need to do (and probably could do) a do better job of initial training of new hires before they get access to patient information, including informing them that they will be monitored and informing them of possible dire  consequences to their employment should they violate privacy policies.

3.  A high-profile patient privacy breach that escalates into a Compliance Review and into a three year Resolution Agreement can cost between $8 to $17 million.   The breakdown of costs they provide and the rationale could be useful for IT personnel who are pulling their hair out trying to get their employer to invest more in security and monitoring. Although I’m not qualified to evaluate whether their estimates are likely to be overestimates or not, I noted that the least of the costs — by a long shot — is notifying patients and offering them credit protection.

Anyone want to take a stab at the math based on FairWarning’s monthly figures?  I don’t know how many urban large hospitals we have, how many rural, etc.    How many patient privacy breaches would we be talking about per year, total, nationwide based on their findings?

No related posts.

Category: Health Data

Post navigation

← Lost in transit, Thursday edition
Man Gets 6 Years in Prison for Laundering $2.5 Million for Carders →

3 thoughts on “HOW many patient privacy breaches per month?”

  1. Anonymous says:
    September 17, 2010 at 9:27 am

    Dissent requested input regarding the damages estimates in the Findings Report. In-line is a link to a webinar from September 8th, 2010 in which Randy Gainer of Davis Wright and Tremaine shares actual financial damages associated with privacy incidents- http://www.fairwarningaudit.com/documents/2010-FAIRWARNING-DAMAGES-WEBINAR.pdf

    1. Anonymous says:
      September 17, 2010 at 3:13 pm

      Thanks, Sadie!

  2. Anonymous says:
    September 20, 2010 at 12:08 pm

    We … talk to a large number of people who have never had to be HIPAA compliant in the past but now must do so. I can tell you that my guess is that reported breaches are the “tip of the iceberg”. These small entities are leaking PHI everyday, without even noticing that it is happening. Unsecured PHI is emailed, faxed, mailed, copied, and carried around on every conceivable portable storage device. We need the large covered entities to put pressure on their BAs and sub-contractors to get compliant and prove it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.