DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Should HHS fine entities who experience repeated avoidable security failures?

Posted on October 26, 2010 by Dissent

I’m working on a breach post for later today but started mulling over the question of whether HHS needs to start fining covered entities who have repeat breaches  where the entity did not seem to adequately harden their security after the first breach or to really learn from experience.

This is 2010.  The excuse “we  were  in the process of encrypting” or “now we’re going to encrypt” seems inadequate.  HIPAA went into effect in 1996.  Why are some of these easily avoidable breaches still occurring?   HHS has adopted an educative and corrective approach, but how many times do some entities need to be educated before the government starts  hitting them with fines in addition to the other costs of a breach?

Do you think that it would help if HHS started handing out fines to repeat offenders?  If so, what scenarios would you think should lead to fines?  I’d nominate  inadequately secured PHI on a device stolen off-premises as my first nomination.  As a close second, repeated theft of devices from hospital premises where the data at rest were not adequately protected.

Your thoughts?

Category: Health Data

Post navigation

← TX: Sensitive documents found in a dumpster
Will The ICO Make An Example Of Google? (I hope not) →

1 thought on “Should HHS fine entities who experience repeated avoidable security failures?”

  1. Anonymous says:
    October 27, 2010 at 4:56 am

    I used to work for a Mental Health agency in Maine. The idiot IT Manager used to state that as long as he thought the data security was “good enough” then the agency was HIPAA-compliant.

    They subsequently bought a new software package that was file-server based which means that any user had full access to the data files in the directory. The files themselves could be accessed (without any auditing) by right-clicking on the file itself and using Notepad read all the client data, for example.
    When I brought this to their attention, they just blew it off. I believe that they changed their backend database to PervasiveSQL (an SQL wrapper for bTrieve files). You could no longer use Notepad to access the data you had to use Wordpad.

    This vendor is now trying to become the preferred vendor in California.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.