DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The Rite Aid Scandal: Health Records Still Treated as Commodities

Posted on August 27, 2010 by Dissent

Billy Wharton writes in CounterPunch:

The mega drug store chain Rite Aid recently agreed to pay a $1 million fine to stave off a full investigation by the Federal Trade Commission (FTC) into practices that may have compromised customer records. The agreement was prompted by news reports that Rite Aid stores in several locations had disposed of confidential customer medical information in easily accessible open trash dumpsters. The story was a minor news blip in the business and health industry pages. However, it raises much larger questions about how the for-profit private healthcare system has transformed the nature of medical records.

The article also cites this site:

The market for such healthcare related information seems to be expanding rapidly. A report issued in 2008 by the whistleblower Private Health Information Privacy website indicated that from 2003-2007 there were 291 incidents of stolen healthcare records that may have compromised the records of more than 16 million people. 75% of these incidents involved employees of health related companies selling the information to third parties.

The for-profit healthcare giant Kaiser Permanente has been cited on several occasions for allowing patient records to be exposed. In one instance, a laptop containing some 160,000 patient records was stolen and the information compromised. Often patient information is then used in elaborate schemes to bilk public and private healthcare programs. Healthcare information now has a murky underworld that is expanding as the economic bubble around the healthcare industry continues to be inflated.

You can read more of the article in CounterPunch.

The article does not specifically mention extortion demands based on allegedly hacked or compromised databases containing protected health information, but that’s also a useful example of how much of a commodity our health information may be. We still have no idea what really happened with Express Scripts, and I presume that is because the Secret Service or other federal agencies are still investigating the matter. We still have no idea what really happened with Virginia’s prescription database, and I presume that that, too, is still being investigated. Have the reportedly acquired data shown up in online forums where people buy and sell personal information?

Of course, the extortionists are not the most common risk. The most common risk I see is that marketers get hold of our information without our knowledge or express consent. I recently handed my husband a piece of mail that came in. It had been addressed to him and had his current prescription information on it with a suggestion that he could save money by switching to [their suggestion]. How did they get his prescription information? The pharmacy chain provided it to them, of course. Had my husband ever known or consented to the pharmacy providing this information to their associate or others? No. Was it legal for them to do so? Yes. Was it right — from a patient privacy perspective — for them to do so? Not in my opinion.

With every transfer of data between entities, the risk of a security breach or privacy breach increases. With every transfer of data between entities, the likelihood that our data can be combined with information about us in other databases increases. At this rate, in a few years we will not need to fear any “Show me your papers” state. Even worse, we will be living in a “We have all your papers” state.

Category: Uncategorized

Post navigation

← De: Drugstore Schlecker customer information exposed on web
Connecticut Insurance Commissioner Announces Data Breach Notification Mandate →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.