Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


More Patient Data Risks, Lawsuits Predicted In 2012

The new year promises to bring greater patient data risks as healthcare organizations increase their use of mobile technology and social media sites.

Top 9 Health IT Stories Of 2011
Top 9 Health IT Stories Of 2011
(click image for larger view and for slideshow)
According to experts in healthcare law and information privacy and security, healthcare IT managers can expect to see more patient data breaches in 2012, along with more lawsuits filed by patients as the availability of patient information exchanged over social media sites and mobile devices grows.

These conclusions, published by ID Experts, offer a glimpse into what health CIOs can expect as they seek to protect patient data during a year that promises more of the same challenges they faced last year. In 2011, the healthcare industry had its fair share of patient data breaches, and the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) stepped up its oversight activities, handing down fines to healthcare organizations that were lax in meeting their patient privacy obligations.

Rick Kam, president and co-founder of ID Experts and chair of the American National Standard Institute’s (ANSI’s) PHI Project, gave InformationWeek Healthcare his assessment of the forecasts, noting that "the thread that links all of the predictions together is safeguarding. Protected health information (PHI) is truly a patient safety issue, and healthcare data breaches will reach epidemic proportions this year if precautions are not taken."

[Is it time to re-engineer your Clinical Decision Support system? See 10 Innovative Clinical Decision Support Programs.]

On the legal front, Kirk Nahra, partner at the law firm Wiley Rein LLP, predicts that the number of class-action lawsuits will increase in 2012 as patients sue healthcare organizations for failing to protect their health information.

Adam Greene, partner at Davis Wright Tremaine, said the next 12 months will bring greater attention to the 150 HITECH Act audits and publication of the final rules implementing modifications to the Health Insurance Portability and Accountability Act (HIPAA) regulations. Greene also said 2012 will see the OCR more aggressively pursuing enforcement against noncompliance due to "willful neglect." That will result in more financial settlements and fines.

Christine Marciano, president of Cyber Data Risk Managers LLC, said she foresees healthcare organizations increasingly signing up for cyber security and data breach insurance policies to protect themselves and their patients.

However, while insurance can provide some financial protection, other dangers are on the horizon. Larry Walker, president of The Walker Company, a healthcare consulting firm, said this year health providers will continue to outsource many functions, such as billing, to third parties or business associates (BA). But BAs are often considered the weak link in the data privacy and security chain.

Other privacy dangers will come from social media, according to Chris Apgar, CEO and president of Apgar & Associates, LLC. This year will see more physicians and healthcare organizations communicating with patients over social media sites. The misuse of social media will increase, as will the risk of exposure of PHI, Apgar predicts.

Christina Thielst, health administration consultant and blogger, believes the increasing use of tablets, smartphones, and tablet applications in healthcare will force providers to enter agreements that outline written terms of use with employees and contractors using personal devices in a healthcare setting.

With regard to cloud computing, James C. Pyles, principal, Powers Pyles Sutter & Verville PC, said because of security and privacy regulations there will be a demand for more health plans, health care providers, and health care clearinghouses to enter into a carefully worded business associate agreement with a cloud computing vendor before disclosing protected health information. These organizations should ensure that they have adequate cyber security insurance to cover the direct and indirect costs of a breach.

Given these predictions, Kam recommends that health CIOs:

-- Conduct an inventory to find out where protected health information and personally identifiable information exists within their organization and where this information exists at their business associates.

-- Perform a risk assessment to understand where there may be vulnerabilities and risks of unauthorized disclosure, and mitigate the risks you identify.

-- Evaluate relationships with current business associates and contracts to ensure that their organization’s privacy and security requirements are covered. Start with those business associates that present the highest risk.

-- Develop a clear communication plan for reporting unauthorized disclosures caused by the business associates.

When are emerging technologies ready for clinical use? In the new issue of InformationWeek Healthcare, find out how three promising innovations--personalized medicine, clinical analytics, and natural language processing--show the trade-offs. Download the issue now. (Free registration required.)


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
1/12/2012 | 8:39:23 PM
re: More Patient Data Risks, Lawsuits Predicted In 2012
To expand on my comment above, its important that when a healthcare organization outsources its critical health information that they insist that their third party vendor has a data breach/cyber insurance policy in the event of a data breach. I am seeing more and more contracts that are requiring that a third party vendor has a data breach/cyber insurance policy. A Commercial General Liability (CGL) insurance policy is no longer enough today, as it does not cover cyber risks or digital information. This is a very important consideration for healthcare organizations.
User Rank: Apprentice
1/12/2012 | 1:46:06 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
Lisa: We can expect to see social media technologies being used to gather information from patients and healthcare consumers and this data being uploaded into the patient's PHR or their EHR. Take microblogging or texting technologies for example. They can be used to communicate reminders to patients (time to take medication) or for mood monitoring or other reporting back to their clinician. The key is that this must be done on technologies that are secure and have the necessary safeguards to avoid breaches.
Christine Arevalo
Christine Arevalo,
User Rank: Apprentice
1/11/2012 | 1:39:38 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
In reference to social media and risks to patient data, patients can put themselves at risk by revealing too much information through social media outlets. Using this vehicle for communication between Dr. and Patient can also create legal risks for the medical facility or the physician. As this becomes more and more a GǣstandardGǥ communication channel for us, the risks of misuse, abuse, and unauthorized disclosures increases.

One reason for the concern is that the misuse of personal health information can have much greater impact on a patient than other types of data misuse. Also the effects of problems like medial identity theft, for example, can truly be devastating, if not deadly.
User Rank: Apprentice
1/11/2012 | 1:12:18 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
To expand on the import of this article, 2012 promises to be a year where outsourcing of health information is likely to be a new and critical factor that contributes to data breach incidents. Healthcare providers are aggressively putting patient records into electronic health record (EHR) systems, and moving towards exchanging this type of information with health exchanges.

They are also increasingly using cloud-based services for hosting information in order to remove the physical threat and hassles that go along with sited computer systems. But as more information moves into the cloud, and out to other outside data processors, the threat of data breach grows dramatically.

Lawsuits and regulatory actions are likely to strike fear into the healthcare providers, but it is unlikely that this fear will translate into enhanced privacy and security until top management of health systems allocate budget and resources, and make this a top priority for their organizations. That surely isn't happening today.
Lisa Henderson
Lisa Henderson,
User Rank: Apprentice
1/10/2012 | 1:10:56 AM
re: More Patient Data Risks, Lawsuits Predicted In 2012
The consultants pretty much pointed out the loose links in the heatlhcare data chain, although I'm not clear on how social media affects personal health information, unless people are sharing their own information on social media? I'd like to see more specifics around that topic, such as which social media and how it can be risk-managed as far as a healthcare data breach.

I do hope that 2012 is not as dire as the prediction that "healthcare data breaches will reach epidemic proportions this year if precautions are not taken."

Lisa Henderson, InformationWeek Healthcare, contributing editor
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...