{"id":713,"date":"2013-06-03T23:15:04","date_gmt":"2013-06-03T23:15:04","guid":{"rendered":"http:\/\/www.keystoneis.com\/?p=713"},"modified":"2013-06-03T23:15:04","modified_gmt":"2013-06-03T23:15:04","slug":"healthcare-providers-putting-patient-data-at-risk-by-using-email","status":"publish","type":"post","link":"https:\/\/www.keystoneis.com\/healthcare-providers-putting-patient-data-at-risk-by-using-email\/","title":{"rendered":"Healthcare providers putting patient data at risk by using email"},"content":{"rendered":"

In a recent article published by sfaxme.com, author\u00a0Ashleigh Brown\u00a0discusses important discoveries in data breaches caused by the use of emailed personal data.\u00a0 The article noted that\u00a0since the August 2009 Breach Notification Rule came into existence it has been clear to everyone just how frequently healthcare and patient data is compromised across the nation. That rule requires that HIPAA-covered organizations must notify patients or their next of kin of any security breaches involving\u00a0500 patients or more, within 5-60 days after the discovery of the breach \u2013 varies based on the state the breach occurred.<\/p>\n

\n

One such breach which recently occurred at the Regional Medical Center in Memphis, Tennessee was discussed in the article.\u00a0 In that instance, three unsecured emails containing names, account numbers, phone numbers, physical therapy data, dates of birth and even social security numbers for almost 1200 patients were sent in Autumn 2012.<\/p>\n

However, the breach was not discovered until March 2013, and whilst there is no reason to suspect that the data was accessed by anyone outside of the Medical Center, the fact remains that there was a severe breach of security that could have resulted in a huge amount of damage.\u00a0 Any innocent mistake\u00a0such as\u00a0this can easily lead to serious consequences.\u00a0 Safeguards need to be in place to prevent this kind of\u00a0data breach\u00a0from happening.<\/p>\n

Another example of where patient confidentiality had been compromised was in December 2012 and February 2013, at Hope Hospice in Texas. A member of staff emailed a report of patient referrals and admissions to themselves on two separate occasions without any form of security. 818 patients were affected by this breach, and their names, insurance information, referral information, clinical chart data, county and date of discharge were all compromised. Regardless of the intention of the staff member or the result of the breach, using email for sensitive, personal, private data is simply not acceptable.<\/p>\n

Since August 2009, HHS data shows that 214,000 individuals have had their data reported compromised in Texas, and 1.2 million in Tennessee, that is almost\u00a01\/5 of the entire population of the state of Tennessee! Nationwide there have been 21 million individual patients who have had their data reported as compromised by their healthcare providers. Because the Breach Notification Rule does not require that breaches involving\u00a0less than 500 patients\u00a0be reported, some estimate that the actual number of patients affected\u00a0across the US\u00a0may actually be\u00a0closer to 40-45 million.<\/p>\n

Clearly the current systems are failing, and something needs to be done to change the status quo.<\/p>\n

Ms. Brown goes on to discuss the following:\u00a0 “We believe this is where we come in. SecureCare is dedicated to protecting sensitive information.\u00a0 We blend innovative ideas and cloud technology to exceed HIPAA regulations.\u00a0 All our team members are HIPAA trained.\u00a0 By leveraging the highest levels of security and establishing new ways to securely exchange documents, users have easy to use, high performance solutions that remove the temptation to send data by unsecured channels.\u00a0 Plus, they get a full document audit trail. By working together, we can ensure that organizations avoid the severe penalties resulting from these breaches and associated damaging affects.”<\/p>\n

~\u00a0\u00a0\u00a0\u00a0\u00a0 ~\u00a0\u00a0\u00a0\u00a0 ~<\/p>\n

It is important to understand how easily data can be breached and to safeguard transactions which occur electronically (such as email) which contain sensitive information.\u00a0 It is the responsibility of the company or individual transmitting the email to take due care in protecting the information contained therein.\u00a0 -KIS<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

In a recent article published by sfaxme.com, author\u00a0Ashleigh Brown\u00a0discusses important discoveries in data breaches caused by the use of emailed personal data.\u00a0 The article noted that\u00a0since the August 2009 Breach Notification Rule came into existence it has been clear to everyone just how frequently healthcare and patient data is compromised across the nation. That rule…<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[559,551,533,541],"tags":[],"_links":{"self":[{"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/posts\/713"}],"collection":[{"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/comments?post=713"}],"version-history":[{"count":0,"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/posts\/713\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/media?parent=713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/categories?post=713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keystoneis.com\/wp-json\/wp\/v2\/tags?post=713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}