DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New data spill shows risk of online health records – as if we needed yet another reminder?

Posted on August 21, 2011 by Dissent

Jordan Robertson of Associated Press reports:

Until recently, medical files belonging to nearly 300,000 Californians sat unsecured on the Internet for the entire world to see.

There were insurance forms, Social Security numbers and doctors’ notes. Among the files were summaries that spelled out, in painstaking detail, a trucker’s crushed fingers, a maintenance worker’s broken ribs and one man’s bout with sexual dysfunction.

At a time of mounting computer hacking threats, the incident offers an alarming glimpse at privacy risks as the nation moves steadily into an era in which every American’s sensitive medical information will be digitized.

Read more of his news story on KTAR.

Parenthetically, I note that firm’s press release at the time (posted on DataBreaches.net) had said:

The company was notified of the possible breach by a data security firm that discovered some of the files using a sophisticated, automated search of Google indexes.

AP’s reporting, however, suggests that no sophistication was required:

The personal data was discovered by Aaron Titus, a researcher with Identity Finder who then alerted Hecht’s firm and The Associated Press. He found it through Internet searches, a common tactic for finding private information posted on unsecured sites.

The data were “available to anyone in the world with half a brain and access to Google,” Titus says.

Titus says Hecht’s company failed to use two basic techniques that could have protected the data- requiring a password and instructing search engines not to index the pages. He called the breach “likely a case of felony stupidity.”

For years I have been pointing out the risks with huge databases that may be accessible on the Internet without their custodians’ intention or knowledge. I have also pointed out that access controls to data have generally been abysmal. How often have we seen breaches in which credentials were too easily obtained, shared, or compromised?

Some readers have pointed out the potential benefits of networking and access, and I agree that in some cases, the potential benefits may outweigh the risks, but that should be the patient’s decision, not the government’s.

As Robertson’s coverage highlights, there is way too much data too readily accessible to too many people to really be able to ensure security and protect privacy of our sensitive health information. The Southern California Medical-Legal Consultants breach was bad, undoubtedly, and affected many people. But can we really say it is worse than  discovering that a transcription service allowed its client files to be indexed by Google and 200 patients’ cancer consultation reports were available on the web for anyone to read?

The media looks to the big-number breaches and suggests we should learn a lesson. Anyone who hasn’t already learned the lesson that our privacy is at risk has been living under a rock.  The lesson we need to learn is how to do this right.  Instead of just focusing on the failures, how about some coverage of entities that totally got rid of all SSN, routinely encrypt their data, purge unneeded data, do not let sensitive data leave the premises on PDAs or laptops that are lost or left in cars, and have adequately controlled access to prevent employee snooping or other issues?  Where are the positive examples in the media?  How about we share some successes along with the failures?

Category: Health Data

Post navigation

← 350+ sites hacked by mr moro, Moroccan hacker
FTC Approves Final Orders Settling Charges that Credit Report Resellers Allowed Hackers to Access Consumers’ Personal Information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Credit Control Corporation data allegedly from 9.1 million consumers listed for sale on forum
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts
  • FTC Provides Guidance on Updated Safeguards Rule
  • Sentara Health terminates remote employees after realizing they couldn’t be sure who was doing the work.
  • Hackers Break Into Car Sharing App, 8.4 Million Users Affected
  • Cyberattack pushes German napkin company into insolvency
  • WMATA Train Operators Arrested in Health Care Fraud Scheme
  • Washington Post investigating cyberattack on journalists, WSJ reports
  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.