A Bristol lawyer has apologised after rubbish he was seen throwing into a city centre litter bin turned out to be a colleague’s confidential case notes. A cafe worker saw Stephen Davies QC put the papers into a bin on 21 January close to the city’s legal centre. Mr Davies said he had been helping…
Burglar steals computers from city cemetery building
It’s not clear what kind of information was stolen in this incident that was reported in Croatian Times: Police are investigating the case of an unknown burglar who stole five computers and four monitors at a Sisak cemetery building last night (Weds/Thurs). City cemetery head Mijo Domitrovic said the thief had stolen a CD with…
Privacy questioned after Weyburn woman receives inmate’s psych file by mistake
Pamela Cowan reports: It isn’t the first time confidential patient information has ended up in the wrong hands via e-mail — but Saskatchewan’s privacy commissioner says safeguards can be low-tech and simple. He was commenting after the office of his federal counterpart launched an investigation into how a Weyburn woman received a detailed and confidential…
Data Privacy Day 2010
Today is Data Privacy Day. I’ve covered a number of events going on over on PogoWasRight.org, but I thought I would use today to mention an aspect of PHI privacy that I haven’t really blogged about here before: emailing your doctor. As a healthcare provider, I understand that my patients like the convenience of being…
Apple Daily: Breach of professional ethics
Y. L. Kao reports: A medical doctor in Taichung recently pubished an article that detailed information about a male-to-female sex reassignment surgical operation performed on Taiwan entertainer Li Ching. The doctor, who mentioned Li’s name in the article in a medical association journal, has been strongly criticized for an infringement of patient privacy. Divulging personal…
IE Windows vuln coughs up local files
Dan Goodin reports: If you use any version of Internet Explorer to surf Twitter or other Web 2.0 sites, Jorge Luis Alvarez Medina can probably read the entire contents of your primary hard drive. The security consultant at Core Security said his attack works by clicking on a single link that exploits a chain of…