DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

What percent of patients notified of a privacy breach actually change providers?

Posted on January 7, 2013 by Dissent

Infographics are getting as overused as PowerPoint, but occasionally I see one that catches my eye with an interesting finding. Case in point: this infographic with the results of a U.S. patient survey conducted in 2011 by FairWarning (open in new window and click to enlarge). My comments are after the infographic.
US-SURVEY

Some of the data were pretty much what I expected to see based on experience in covering breaches, but how far patients might drive because of privacy concerns surprised me. And what surprised me more was that how patients learn about a breach might make even more of a difference in whether they leave the provider or stay following a breach than I would have thought. If patients find out from the provider, 19.1% said they would leave, but if they find out through the media, 64% said they’d leave.  FairWarning’s finding is consistent with what I’ve always advised entities: get out ahead of the story. Of course, what patients say they would do and what they actually do once in they are in a situation is not necessarily the same, but a subset of their sample had experienced breaches, and their most dramatic finding not included in the infographic was the following (emphasis added by me):

6 percent of patient respondents indicated they had been alerted their medical records had been compromised. As a result of the breach, 60 percent indicated they no longer seek care from that provider.

Of course, FairWarning’s sample is not a truly random sample and is based on 1,265 online responses to 10,000 requests that were sent out, so we’re talking about 6% of 1265 respondents having been notified of a breach, and 60% of those patients changing providers. Even so, that’s a surprisingly high statistic, isn’t it?

While FairWarning’s findings may serve as incentive to invest in privacy and security controls, it may also serve as an incentive to cover up a breach and hope that the truth never comes out.  And although the consequences of a coverup can be huge, I can understand how an entity might not want to risk losing 19% of their patients even if they notify immediately and fully.

I think we really, really need more external audits.

You can read the full U.S. survey report on FairWarning.com, where you’ll also find survey reports from other countries. Some of the reports are remarkably consistent across countries.

 


Related:

  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • North Country Healthcare responds to Stormous's claims of a breach
  • Texas Enacts Electronic Health Record Data Localization Law
Category: Health Data

Post navigation

← 20,000 Credentials Leaked from Association of Irish Festival Events
It's 10 pm. Do you know where your patients' data are? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.