DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Should HHS fine entities who experience repeated avoidable security failures?

Posted on October 26, 2010 by Dissent

I’m working on a breach post for later today but started mulling over the question of whether HHS needs to start fining covered entities who have repeat breaches  where the entity did not seem to adequately harden their security after the first breach or to really learn from experience.

This is 2010.  The excuse “we  were  in the process of encrypting” or “now we’re going to encrypt” seems inadequate.  HIPAA went into effect in 1996.  Why are some of these easily avoidable breaches still occurring?   HHS has adopted an educative and corrective approach, but how many times do some entities need to be educated before the government starts  hitting them with fines in addition to the other costs of a breach?

Do you think that it would help if HHS started handing out fines to repeat offenders?  If so, what scenarios would you think should lead to fines?  I’d nominate  inadequately secured PHI on a device stolen off-premises as my first nomination.  As a close second, repeated theft of devices from hospital premises where the data at rest were not adequately protected.

Your thoughts?


Related:

  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • UK: Woman charged after NHS patients' records accessed in data breach
  • Landmark civil penalty of AU$5.8 million issued under Australia’s Privacy Act
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
Category: Health Data

Post navigation

← TX: Sensitive documents found in a dumpster
Will The ICO Make An Example Of Google? (I hope not) →

1 thought on “Should HHS fine entities who experience repeated avoidable security failures?”

  1. Anonymous says:
    October 27, 2010 at 4:56 am

    I used to work for a Mental Health agency in Maine. The idiot IT Manager used to state that as long as he thought the data security was “good enough” then the agency was HIPAA-compliant.

    They subsequently bought a new software package that was file-server based which means that any user had full access to the data files in the directory. The files themselves could be accessed (without any auditing) by right-clicking on the file itself and using Notepad read all the client data, for example.
    When I brought this to their attention, they just blew it off. I believe that they changed their backend database to PervasiveSQL (an SQL wrapper for bTrieve files). You could no longer use Notepad to access the data you had to use Wordpad.

    This vendor is now trying to become the preferred vendor in California.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.