DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Colorado medical marijuana patients protest privacy breaches

Posted on August 22, 2013 by Dissent

Kristen Wyatt of Associated Press reports:

Medical marijuana patients asked Colorado health authorities on Wednesday to destroy and rebuild the state’s 107,000-person marijuana patient registry because of security breaches.

The Board of Health unanimously rejected the emergency petition. But officials expressed alarm about a recent state audit showing the Colorado Department of Health and Environment isn’t keeping the registry confidential, as required by law.

Read more about their concerns on Kansas City Star.  On the registry’s home page, there’s the following statement about computer security:

The Colorado Department of Public Health and Environment takes the role of data security seriously and incorporates all statutory requirements in its computer systems. The computer system used by the Medical Marijuana Registry (MMR) uses the same computer security methods that are used by the computer system housing birth records. Only MMR employees have access to the MMR computer system, and that access is controlled by defined roles. For example, an employee can only access the portion of the MMR computer system necessary to perform the functions of his/her job.

Statute requires that the department respond to law enforcement inquiries to verify that an MMR certificate is valid. MMR employees manually look up records for law enforcement using procedures that comply with Colorado law. The department is working with law enforcement to automate those queries. Any future automated queries will be subject to the same submission requirements as the current manual inquiries, and the information released in response to such inquiries would be identical to what is currently being supplied manually. All queries will be recorded and logged for audit purposes.

An audit published in June, however, found significant problems with protection of the confidential information of patients, physicians, and caregivers:

Overall, we identified three main problems related to Public Health’s management of confidential Registry data: (1) lack of controls over contractors and staff of other state departments whom Public Health has authorized to access confidential Registry data; (2) access by law enforcement officials/agencies of confidential Registry data under circumstances that the Colorado Constitution does not appear to allow; and (3) confidential data breaches.

The audit also identified a number of database control issues, including lack of ability to log who was accessing and/or making changes to records in the registry. The state agreed with many of the findings and recommendations in the audit, but noted that it was not feasible, given the current system, to make the recommended database control changes and that they would investigate procuring another system that would enable such controls. The auditor responded:

The Medical Marijuana Registry is a confidential registry intended to maintain an accurate record of individuals authorized to use marijuana for medical purposes. If modifying the system that currently houses the Registry is not possible, Public Health should take immediate steps to implement other controls to address risks identified in the audit. Public Health should not wait until it has explored options to procure a new system to strengthen controls over the sensitive data in the Registry.

Indeed.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← San Francisco State College of Extended Learning reports breach; one of 500 entities breached
CMS: One Hour to Report HIX Security Incidents →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.