DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Is computing healthcare data breach statistics a waste of time?

Posted on October 13, 2010 by Dissent

Over on Technology Liberation Front, Jim Harper responded to my post that asked  what can we learn from the first year of HHS breach reports.  He starts by taking me to task for seemingly glossing over what he sees as important considerations:

…. The post gives extremely light treatment to the possibility—indeed, the likelihood—of noncompliance with the regulations due to unawareness of breaches or judgments that reporting is more dangerous than not reporting.

I can forgive Jim for  not being a regular reader of my blogs if he can forgive me for not repeating those possibilities in detail in every blog entry I write analyzing breach data.  Unless someone has data suggesting that the healthcare sector is qualitatively different from other sectors when it comes to non-detection or willful non-reporting,  simply acknowledging the issues should suffice when the purpose is a comparative analysis.

Jim also questions the value of conducting such analyses at all, suggesting that gross statistics do not help us understand the relationship between breaches and harm.   He writes:

But one also must wonder . . . Why does this matter?

Data breach notification is the grown-up version of the schoolyard taunt: “Your epidermis is showing!”

This is the first year we’ve been able to start to gauge how much epidermis might be showing in the healthcare sector – even though we know it’s only the tip of the iceberg.   Doesn’t it make sense to look at subtype patterns and consider whether they are comparable to what we’ve been seeing in other sectors for the past five years? And to the extent that we have learned anything from breach reports in other sectors, how does that compare to what we are learning in the healthcare sector?

I agree with Jim that “harm” is where the rubber meets the road.  I think that breaches involving sensitive patient data are more likely to cause  psychological harm and to potentially damage doctor-patient trust and relationships even when there may be no social or economic harm.  We need to assess whether certain types of PHI-involved breaches are more damaging to trust than other types of breaches,  and we need more data, not less, if we are to begin to understand the kinds of harm and risks of harm from healthcare sector breaches.   Does more psychological harm accrue if dataset A is lost by the patient’s doctor than if it is lost by a pharmacy benefits management firm?  I would guess that it does.   Does more psychological harm accrue if the data are lost by a doctor because he left his laptop in the car than if the laptop was stolen from his locked office?  I would guess that it does.  Those are empirical questions that could start to be assessed via survey methodologies, but they do not diminish the need for breach notification analyses to assess the broader frequency and pattern of breaches in the healthcare sector.

Not analyzing data that you do have because you don’t yet have harm data to correlate with it  is like  saying that you won’t study the elephant in the room if you don’t already know which parts of the elephant are messing up your floor.

Category: Health Data

Post navigation

← 'Scrapers' Dig Deep for Data on Web
Data breach in 2005 fueled a long-running massive Medicare fraud scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.