DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Health care sector breaches in the news: just the tip of the iceberg?

Posted on August 10, 2010 by Dissent

Last week, a few mainstream news articles noted that the Identity Theft Resource Center’s database revealed that 113 of the 385 breaches they had recorded for this year involved the health care sector. As Brian Horowitz of eWeek noted, only breaches that include SSN, financial information, or driver’s license numbers are included in ITRC’s database. Breaches are excluded when it is not clear whether there was any information that could lead to identity theft (the organization’s focus) or when there is no media report or primary source that ITRC can rely on.

Because of their criteria and the new HHS web site that reveals breaches that we would not otherwise know about, ITRC’s figures for the health care sector are challenging to interpret. On the one hand, there will appear to be more health care sector breaches this year thanks to the HHS resource. On the other hand, their numbers for health care will continue to be a significant underestimate of the actual number of breaches involving covered entities or non-covered entities who are in possession of sensitive health information.

For purposes of contrast, and for the same time period in question (2010), I decided to run a quick check on PHIprivacy.net and DataBreaches.net to see how many U.S. health care sector breaches or incidents involving medical data have been reported on my sites this year.

There were over 200 U.S. breaches involving the health care sector or medical data reported on my sites this year.  In comparison:  ITRC currently shows 119 breaches out of 400 total, the Privacy Rights Clearinghouse shows 94 out of of 333 total, and the Open Security Foundation’s DataLossDB shows 60 out of 175.  While their ratios are fairly comparable to each, the total numbers seem to indicate some hefty differences if we want to get a ballpark estimate of how prevalent breaches in this sector really are.

As crude/quick fingers-and-toes type of estimates:

  • About 60 of 206 incidents reported on PHIprivacy.net and DataBreaches.net involved paper records, and half of those involved proper disposal
  • Over 60 incidents involved theft (including some cases involving theft of paper records)
  • Approximately 35 incidents involved inadvertent exposure (both paper and electronic)
  • Almost 20 incidents involved lost or missing records (paper and electronic)
  • Over 30 incidents involved employee misconduct such as ID theft or selling or providing patient records to outsiders
  • There were 10 reports of employees snooping in patient records
  • Only four incidents involving hacks or malware.

The last figure is particularly concerning to me, as my suspicion is that there have been many more hacks or compromises due to malware and they’re just not being detected.

In any event, we need to remain very cautious in reporting statistics and interpreting them. There’s still too much we are not finding out about.

Category: Health Data

Post navigation

← Malware gang steal over £700K from one British bank
Tuesday’s batch of newly uncovered breaches →

2 thoughts on “Health care sector breaches in the news: just the tip of the iceberg?”

  1. Anonymous says:
    August 10, 2010 at 11:44 am

    I have to congratulate you for the hard work keeping people inform of breaches.
    One of the places where we attack the most against breaches is medical equipment. Hospitals still don’t understand how much information comes out of used medical equipment, and ended been on the net. Our fight is against liquidators that without any knowledge posted any kind of medical equipment online. Here at Level6 we sanitized and destroy obsolete medical equipment.
    Please keep up with the good work!

    1. Anonymous says:
      August 10, 2010 at 12:20 pm

      I generally don’t permit comments that promote specific commercial products or services, but you raise a good point about obsolete equipment.

      I do not think we can really make the liquidators liable. The responsibility for protecting sensitive information rests with the entity that collected it and retained it. ABC’s media investigation on copier hard drives raised awareness, but it’s not enough. We need more coverage and exposure of this issue. If your firm has actually bought used equipment and then recovered sensitive PHI, please contact me by email to give me the details.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.