DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Is computing healthcare data breach statistics a waste of time?

Posted on October 13, 2010 by Dissent

Over on Technology Liberation Front, Jim Harper responded to my post that asked  what can we learn from the first year of HHS breach reports.  He starts by taking me to task for seemingly glossing over what he sees as important considerations:

…. The post gives extremely light treatment to the possibility—indeed, the likelihood—of noncompliance with the regulations due to unawareness of breaches or judgments that reporting is more dangerous than not reporting.

I can forgive Jim for  not being a regular reader of my blogs if he can forgive me for not repeating those possibilities in detail in every blog entry I write analyzing breach data.  Unless someone has data suggesting that the healthcare sector is qualitatively different from other sectors when it comes to non-detection or willful non-reporting,  simply acknowledging the issues should suffice when the purpose is a comparative analysis.

Jim also questions the value of conducting such analyses at all, suggesting that gross statistics do not help us understand the relationship between breaches and harm.   He writes:

But one also must wonder . . . Why does this matter?

Data breach notification is the grown-up version of the schoolyard taunt: “Your epidermis is showing!”

This is the first year we’ve been able to start to gauge how much epidermis might be showing in the healthcare sector – even though we know it’s only the tip of the iceberg.   Doesn’t it make sense to look at subtype patterns and consider whether they are comparable to what we’ve been seeing in other sectors for the past five years? And to the extent that we have learned anything from breach reports in other sectors, how does that compare to what we are learning in the healthcare sector?

I agree with Jim that “harm” is where the rubber meets the road.  I think that breaches involving sensitive patient data are more likely to cause  psychological harm and to potentially damage doctor-patient trust and relationships even when there may be no social or economic harm.  We need to assess whether certain types of PHI-involved breaches are more damaging to trust than other types of breaches,  and we need more data, not less, if we are to begin to understand the kinds of harm and risks of harm from healthcare sector breaches.   Does more psychological harm accrue if dataset A is lost by the patient’s doctor than if it is lost by a pharmacy benefits management firm?  I would guess that it does.   Does more psychological harm accrue if the data are lost by a doctor because he left his laptop in the car than if the laptop was stolen from his locked office?  I would guess that it does.  Those are empirical questions that could start to be assessed via survey methodologies, but they do not diminish the need for breach notification analyses to assess the broader frequency and pattern of breaches in the healthcare sector.

Not analyzing data that you do have because you don’t yet have harm data to correlate with it  is like  saying that you won’t study the elephant in the room if you don’t already know which parts of the elephant are messing up your floor.

Category: Health Data

Post navigation

← 'Scrapers' Dig Deep for Data on Web
Data breach in 2005 fueled a long-running massive Medicare fraud scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.