The Associated Press reports: A Colorado man is accused of stealing an Army veteran’s identity and using it for 24 years to get married, obtain free medical treatment and even serve as president of a VFW post. Mark Mulcahy, 46, faces felony charges of identity theft, forgery and criminal impersonation. He was being held in…
Category: Health Data
Five Dollars Buys Man Hundreds of Private Medical Records
Medical records are supposed to be between a person and their doctor, but a Maryland man suddenly found himself the owner of hundreds of patients’ most private information. Inside a unit at the Fort Knox storage facility, there’s a potential gold mine of information, including boxes of people’s medical records. On man unwittingly bought all…
Medical notes sent to Buckingham Palace
Seen at EveningStar 24: AN NHS worker in Norfolk has become embroiled in a serious security breach after sending a patient’s medical records to Buckingham Palace by mistake. Highly confidential information was sent to the royal residence after the female member of staff typed in the wrong email address instead of sending it to a…
Former patient charged in computer theft from Indianapolis VA center
In an update to the arrest involving a computer stolen from the Roudebush VA Center, Jaikumar Vijayan of Computerworld reports that the man arrested is a former patient of that VA center.
PA: ID thief sentenced to county prison
Michael P. Rellahan writes on DailyLocal.com: A Chester County judge on Tuesday “reluctantly†agreed to sentence a former Chester County Hospital employee to a term in county prison for stealing the identities of dozens of former patients and using them to order items over the Internet. Judge James P. MacElree II peppered the prosecutor and…
Vendor identifies top five healthcare data security risks
Molly Merrill writes in Healthcare IT News that Absolute Software Corporation, a security software solutions vendor, has identified the top five data security risks most often faced by healthcare facilities. The five risks are: 1. Failure to protect sensitive data beyond encryption. 2. Inability to accurately manage mobile computer assets. 3. Sensitive information on public…