DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HOW many patient privacy breaches per month?

Posted on September 16, 2010 by Dissent

As regular readers know, I tend to avoid blogging about commercial products and am leery about reporting results from studies that might be self-serving, but a new paper from FairWarning has some data that I think are worth mentioning here.    In their report, they provide some baseline data on how many patient privacy breaches their clients were experiencing each month.   Keeping in mind that many places already had some security and privacy protocols in place and that higher rates are more likely to create customers for them, here’s what they report for four clients that they say are representative cases from their client database of 300 clients:

Health System Description Number of confirmed monthly incidents at outset of FairWarning® deployment
200-bed hospital with a few small clinics – Rurally based 24 confirmed incidents per month
U.S. based physician practice with 20 clinics metro and rurally dispersed 29 confirmed incidents per month
UK based teaching hospital in major metropolitan area as well as rurally based facilities 130 confirmed incidents per month
Top 50 U.S. Health System with multiple affiliated hospitals and clinics – Based in a major metropolitan area
125 confirmed incidents per month

Those four cases are described in more detail in the paper.   If the figures seem high to you, you may want to compare them to breach reports received by California since their new breach reporting law involving medical records went into effect last year.  I asked FairWarning about the difference and their view is that many many breaches really are not detected.  Kurt Long replied, “health records are rarely detected and rarer still reported.” In other words, if we were shocked by how many reports California is receiving, we’d be stunned if we knew how many breaches there really are each year that go undetected or unreported.

Although no detailed statistics are provided, the report also provides a summary on the types of patient privacy breaches most likely to occur for different types of localities. For all types of localities, the following types of privacy breaches were reported:

  • Care provider employees visiting as a patient
  • Immediate Family member snooping
  • Child custody cases
  • Criminal suspects covered in media
  • Billing and fraud related

Not surprisingly, entities in rural localities also reported:

  • Local government official snooping
  • Neighbor snooping
  • Extended family member snooping

While entities in  metropolitan localities were more likely to report:

  • Sports star snooping
  • Federal or state government official snooping
  • High profile business personality snooping
  • High profile celebrity/media personality snooping
  • Traditional identity theft
  • Medical identity theft

Of note, they  report that in their benchmark study, they obtained “multiple reports” from metropolitan and rural based care providers detecting staff using EHR access to systematically steal the identities of deceased patients to commit financial identity theft.

The company uses case examples with timelines to make the following points:

1.  Simply informing your employees that you have implemented a monitoring program to detect privacy breaches can decrease patient privacy breaches significantly (on the order of 36% in one large metropolitan multi-hospital system and 60% in a rural hospital with remote clinics).

2.   Telling employees that they are being monitored is not sufficient.  Staff training (and re-training when new employees are hired) is also required to achieve desired results as is consistent and appropriate sanctions. The company notes that they observed spikes in privacy breaches whenever new staff was hired, suggesting to me that entities need to do (and probably could do) a do better job of initial training of new hires before they get access to patient information, including informing them that they will be monitored and informing them of possible dire  consequences to their employment should they violate privacy policies.

3.  A high-profile patient privacy breach that escalates into a Compliance Review and into a three year Resolution Agreement can cost between $8 to $17 million.   The breakdown of costs they provide and the rationale could be useful for IT personnel who are pulling their hair out trying to get their employer to invest more in security and monitoring. Although I’m not qualified to evaluate whether their estimates are likely to be overestimates or not, I noted that the least of the costs — by a long shot — is notifying patients and offering them credit protection.

Anyone want to take a stab at the math based on FairWarning’s monthly figures?  I don’t know how many urban large hospitals we have, how many rural, etc.    How many patient privacy breaches would we be talking about per year, total, nationwide based on their findings?

Category: Health Data

Post navigation

← Lost in transit, Thursday edition
Man Gets 6 Years in Prison for Laundering $2.5 Million for Carders →

3 thoughts on “HOW many patient privacy breaches per month?”

  1. Anonymous says:
    September 17, 2010 at 9:27 am

    Dissent requested input regarding the damages estimates in the Findings Report. In-line is a link to a webinar from September 8th, 2010 in which Randy Gainer of Davis Wright and Tremaine shares actual financial damages associated with privacy incidents- http://www.fairwarningaudit.com/documents/2010-FAIRWARNING-DAMAGES-WEBINAR.pdf

    1. Anonymous says:
      September 17, 2010 at 3:13 pm

      Thanks, Sadie!

  2. Anonymous says:
    September 20, 2010 at 12:08 pm

    We … talk to a large number of people who have never had to be HIPAA compliant in the past but now must do so. I can tell you that my guess is that reported breaches are the “tip of the iceberg”. These small entities are leaking PHI everyday, without even noticing that it is happening. Unsecured PHI is emailed, faxed, mailed, copied, and carried around on every conceivable portable storage device. We need the large covered entities to put pressure on their BAs and sub-contractors to get compliant and prove it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Trump Rewrites Cybersecurity Policy in Executive Order
  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report