WFTV reports: Orlando Health employees said at least one of its employees broke the rules and went through the personal information of Pulse survivors. Ilka Reyes, 29, was shot nine times at the nightclub on June 12. Reyes said she still doesn’t understand how the breach happened and was shocked to get the letter from…
Category: Health Data
Many hospitals transmit your health records unencrypted
Lucas Mearian reports: About 32% of hospitals and 52% of non-acute providers — such as outpatient clinics, rehabilitation facilities and physicians’ offices — are not encrypting data in transit, according to a new survey. Additionally, only 61% of acute providers and 48% of non-acute providers are encrypting data at rest. Read more about the results…
PK: Patient data stolen from Quaid-i-Azam Hospital
Dawn reports: A case has been registered against an employee of the Quaid-i-Azam Hospital for allegedly stealing data from the CT scan machine and according to a supreme court lawyer, the case might be the first of its kind in the country. Iftikhar Ali, the chief security officer at the hospital, who is the complainant…
Pasadena Doctor Sentenced to 4 Years in Prison for Falsely Certifying Patients Were Terminally Ill as Part of Healthcare Fraud Scheme
One of the fears with medical identity theft is that a patient’s records could be corrupted in ways that could affect their care. In the case described below, the patients’ identity and insurance info wasn’t stolen, but it was misused to support a fraud scheme, and as part of the scheme, patients records were altered…
News anchor’s mother still fights to sue over prying
If you’re relatively new to medical privacy breach cases, you may not know about a 2008 case involving insider snooping concerning the care and death of news anchor, Anne Pressly. You can find previous coverage of the breach and case linked from here, but the short version is that the three being sued have previously pleaded guilty to misdemeanor…
Cost of a Breach: Forensics and Notification
Protenus, who provide software to monitor, detect, and reduce insider mis-steps such as snooping and other egregious wrongdoing, has been writing a series of posts on the cost of a breach. In this week’s installment, they looked at the costs of forensics and notification. Considering I’ve recently been blogging about entities that don’t have insurance for breaches, some…