DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New data spill shows risk of online health records – as if we needed yet another reminder?

Posted on August 21, 2011 by Dissent

Jordan Robertson of Associated Press reports:

Until recently, medical files belonging to nearly 300,000 Californians sat unsecured on the Internet for the entire world to see.

There were insurance forms, Social Security numbers and doctors’ notes. Among the files were summaries that spelled out, in painstaking detail, a trucker’s crushed fingers, a maintenance worker’s broken ribs and one man’s bout with sexual dysfunction.

At a time of mounting computer hacking threats, the incident offers an alarming glimpse at privacy risks as the nation moves steadily into an era in which every American’s sensitive medical information will be digitized.

Read more of his news story on KTAR.

Parenthetically, I note that firm’s press release at the time (posted on DataBreaches.net) had said:

The company was notified of the possible breach by a data security firm that discovered some of the files using a sophisticated, automated search of Google indexes.

AP’s reporting, however, suggests that no sophistication was required:

The personal data was discovered by Aaron Titus, a researcher with Identity Finder who then alerted Hecht’s firm and The Associated Press. He found it through Internet searches, a common tactic for finding private information posted on unsecured sites.

The data were “available to anyone in the world with half a brain and access to Google,” Titus says.

Titus says Hecht’s company failed to use two basic techniques that could have protected the data- requiring a password and instructing search engines not to index the pages. He called the breach “likely a case of felony stupidity.”

For years I have been pointing out the risks with huge databases that may be accessible on the Internet without their custodians’ intention or knowledge. I have also pointed out that access controls to data have generally been abysmal. How often have we seen breaches in which credentials were too easily obtained, shared, or compromised?

Some readers have pointed out the potential benefits of networking and access, and I agree that in some cases, the potential benefits may outweigh the risks, but that should be the patient’s decision, not the government’s.

As Robertson’s coverage highlights, there is way too much data too readily accessible to too many people to really be able to ensure security and protect privacy of our sensitive health information. The Southern California Medical-Legal Consultants breach was bad, undoubtedly, and affected many people. But can we really say it is worse than  discovering that a transcription service allowed its client files to be indexed by Google and 200 patients’ cancer consultation reports were available on the web for anyone to read?

The media looks to the big-number breaches and suggests we should learn a lesson. Anyone who hasn’t already learned the lesson that our privacy is at risk has been living under a rock.  The lesson we need to learn is how to do this right.  Instead of just focusing on the failures, how about some coverage of entities that totally got rid of all SSN, routinely encrypt their data, purge unneeded data, do not let sensitive data leave the premises on PDAs or laptops that are lost or left in cars, and have adequately controlled access to prevent employee snooping or other issues?  Where are the positive examples in the media?  How about we share some successes along with the failures?

Category: Health Data

Post navigation

← 350+ sites hacked by mr moro, Moroccan hacker
FTC Approves Final Orders Settling Charges that Credit Report Resellers Allowed Hackers to Access Consumers’ Personal Information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.