DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Is computing healthcare data breach statistics a waste of time?

Posted on October 13, 2010 by Dissent

Over on Technology Liberation Front, Jim Harper responded to my post that asked  what can we learn from the first year of HHS breach reports.  He starts by taking me to task for seemingly glossing over what he sees as important considerations:

…. The post gives extremely light treatment to the possibility—indeed, the likelihood—of noncompliance with the regulations due to unawareness of breaches or judgments that reporting is more dangerous than not reporting.

I can forgive Jim for  not being a regular reader of my blogs if he can forgive me for not repeating those possibilities in detail in every blog entry I write analyzing breach data.  Unless someone has data suggesting that the healthcare sector is qualitatively different from other sectors when it comes to non-detection or willful non-reporting,  simply acknowledging the issues should suffice when the purpose is a comparative analysis.

Jim also questions the value of conducting such analyses at all, suggesting that gross statistics do not help us understand the relationship between breaches and harm.   He writes:

But one also must wonder . . . Why does this matter?

Data breach notification is the grown-up version of the schoolyard taunt: “Your epidermis is showing!”

This is the first year we’ve been able to start to gauge how much epidermis might be showing in the healthcare sector – even though we know it’s only the tip of the iceberg.   Doesn’t it make sense to look at subtype patterns and consider whether they are comparable to what we’ve been seeing in other sectors for the past five years? And to the extent that we have learned anything from breach reports in other sectors, how does that compare to what we are learning in the healthcare sector?

I agree with Jim that “harm” is where the rubber meets the road.  I think that breaches involving sensitive patient data are more likely to cause  psychological harm and to potentially damage doctor-patient trust and relationships even when there may be no social or economic harm.  We need to assess whether certain types of PHI-involved breaches are more damaging to trust than other types of breaches,  and we need more data, not less, if we are to begin to understand the kinds of harm and risks of harm from healthcare sector breaches.   Does more psychological harm accrue if dataset A is lost by the patient’s doctor than if it is lost by a pharmacy benefits management firm?  I would guess that it does.   Does more psychological harm accrue if the data are lost by a doctor because he left his laptop in the car than if the laptop was stolen from his locked office?  I would guess that it does.  Those are empirical questions that could start to be assessed via survey methodologies, but they do not diminish the need for breach notification analyses to assess the broader frequency and pattern of breaches in the healthcare sector.

Not analyzing data that you do have because you don’t yet have harm data to correlate with it  is like  saying that you won’t study the elephant in the room if you don’t already know which parts of the elephant are messing up your floor.

Related posts:

  • Healthcare most breached industry in 2011? Not by my analyses.
  • Healthcare most breached industry in 2011? Not by my analyses.
Category: Health Data

Post navigation

← 'Scrapers' Dig Deep for Data on Web
Data breach in 2005 fueled a long-running massive Medicare fraud scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.