SlideShare a Scribd company logo
1 of 3
Download to read offline
Digital Health Records
and Data Security
Breaches
With millions of new patients entering the U.S. healthcare system under the
Affordable Care Act, the security of digital patient data has become a major concern.
The U.S. Department of Health and Human Services (HHS) has set the year 2015 as
deadline for healthcare facilities to start using electronic health records (EHRs),
thereby ushering in the digitalization of all patient information. However, as
confidential patient data is now available on health networks, they have become a
bigger target for those who want to steal this data and make illegal use of it.
Healthcare data breaches have doubled in the past few years and it continues. More
than 130 health data breaches have taken place in 2013 and affected more than 5.7
million individuals. Medical identity theft involves the theft of patient data that
includes health records, and information regarding insurance, blood type and
medications. In certain cases a medical file might also include personal financial
information if, for instance, the patient used his/her credit card to cover co-pay.
HIPAA Compliance in Third Party Organizations
Hospitals not only need to worry about securing data on their own servers, but also
securing data that belongs to them but is stored on the servers of a third party, such
as a medical transcription service organization. When entrusting confidential patient
data with medical transcription companies to get the records transcribed,
physicians should also make sure that the service provider is HIPAA compliant and
that the patient data will be safe with them.
Benchmark Study on Patient Privacy and Data Security
According to the fourth annual Benchmark Study on Patient Privacy and Data
Security by the Ponemon Institute, one of the key threats is the unproven security in
the health insurance marketplaces, created as a result of the Affordable Care Act.
Other top threats include: criminal attacks, employee negligence, unsecured mobile
devices (smartphones, laptops, and tablets), and third parties—causing organizations
to scramble.
The survey found that the overall number of reported data breaches at healthcare
organizations declined slightly last year, but criminal attacks on healthcare providers
increased dramatically — up 100 percent since 2010.
Why Do Cyber Thieves Focus on Patient Records?
Patient records are exposed to both insider and outsider threats mainly because of
the value of the information to criminals. These records contain personally
identifiable information (PII) and protected health information (PHI). When
combined, this information represents highly sensitive “regulated data,” which is
tightly controlled by federal laws, including HIPAA and GLBA, as well as numerous
state breach notification laws.
Key findings of the research include:
 Data breaches now cost healthcare organizations $5.6 billion annually, slightly
lower than the past years.
 Nearly 70 percent of respondents believe the Affordable Care Act has
increased or significantly increased the risk to millions of patients, because of
inadequate security.
 Seventy-five percent of organizations cite employee negligence as their
biggest security worry, as they increase exposure to sensitive data by the
growing use of their personal unsecured devices (smartphones, laptops and
tablets).
 Seventy-three percent of organizations are not confident or only slightly
confident that their third parties are able to detect a security incident,
perform an incident risk assessment and notify them in the event of a data
breach.
What Can Be Done?
The most important thing patients can and should do is to check the Explanation of
Benefits (EOB) provided by doctors and other medical providers.
HITECH Act for Tighter Security in Digital Health
Records
The Health Information Technology for Economic and Clinical Health Act (HITECH
Act), enacted on February 17, 2009 focuses on ensuring privacy and security of
patient health information. This program provides incentive payments to eligible
hospitals and providers who make a Meaningful Use (MU) of certified EHRs by the
end of the year 2014. Eligible physicians can receive up to $44,000 over a 5-year
period from Medicare or, alternatively, $63,750 over a 6-year period from Medicaid,
while hospitals can receive a base annual amount of over $2 Million.
HHS Security Risk Assessment Tool
HHS has also released a new security risk assessment (SRA) tool to help providers
with HIPAA compliance. Conducting a security risk assessment is a key requirement
of the HIPAA Security Rule and a core requirement for providers seeking payment
through the Medicare and Medicaid EHR Incentive Program. The SRA tool is designed
to help practices conduct and document a risk assessment in a thorough, organized
fashion by allowing them to assess the information security risks in their
organizations under the Health Insurance Portability and Accountability Act
(HIPAA) Security Rule. HIPAA requires organizations that handle protected health
information to regularly review the administrative, physical and technical safeguards
they have in place to protect the security of the information.

More Related Content

Recently uploaded

Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Pusat Herbal Resmi BPOM
 
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Aurelien Domont, MBA
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
zukhrafshabbir
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODFRATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
CaitlinCummins3
 

Recently uploaded (20)

Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORI
 
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In HarareTop^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
 
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statements
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
(推特)Twitter账号批发(自助购买网址🎉top233.com🎉)
(推特)Twitter账号批发(自助购买网址🎉top233.com🎉)(推特)Twitter账号批发(自助购买网址🎉top233.com🎉)
(推特)Twitter账号批发(自助购买网址🎉top233.com🎉)
 
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODFRATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
 
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfProgress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Digital Health Records and Data Security Breaches

  • 1. Digital Health Records and Data Security Breaches
  • 2. With millions of new patients entering the U.S. healthcare system under the Affordable Care Act, the security of digital patient data has become a major concern. The U.S. Department of Health and Human Services (HHS) has set the year 2015 as deadline for healthcare facilities to start using electronic health records (EHRs), thereby ushering in the digitalization of all patient information. However, as confidential patient data is now available on health networks, they have become a bigger target for those who want to steal this data and make illegal use of it. Healthcare data breaches have doubled in the past few years and it continues. More than 130 health data breaches have taken place in 2013 and affected more than 5.7 million individuals. Medical identity theft involves the theft of patient data that includes health records, and information regarding insurance, blood type and medications. In certain cases a medical file might also include personal financial information if, for instance, the patient used his/her credit card to cover co-pay. HIPAA Compliance in Third Party Organizations Hospitals not only need to worry about securing data on their own servers, but also securing data that belongs to them but is stored on the servers of a third party, such as a medical transcription service organization. When entrusting confidential patient data with medical transcription companies to get the records transcribed, physicians should also make sure that the service provider is HIPAA compliant and that the patient data will be safe with them. Benchmark Study on Patient Privacy and Data Security According to the fourth annual Benchmark Study on Patient Privacy and Data Security by the Ponemon Institute, one of the key threats is the unproven security in the health insurance marketplaces, created as a result of the Affordable Care Act. Other top threats include: criminal attacks, employee negligence, unsecured mobile devices (smartphones, laptops, and tablets), and third parties—causing organizations to scramble. The survey found that the overall number of reported data breaches at healthcare organizations declined slightly last year, but criminal attacks on healthcare providers increased dramatically — up 100 percent since 2010. Why Do Cyber Thieves Focus on Patient Records? Patient records are exposed to both insider and outsider threats mainly because of the value of the information to criminals. These records contain personally identifiable information (PII) and protected health information (PHI). When combined, this information represents highly sensitive “regulated data,” which is tightly controlled by federal laws, including HIPAA and GLBA, as well as numerous state breach notification laws.
  • 3. Key findings of the research include:  Data breaches now cost healthcare organizations $5.6 billion annually, slightly lower than the past years.  Nearly 70 percent of respondents believe the Affordable Care Act has increased or significantly increased the risk to millions of patients, because of inadequate security.  Seventy-five percent of organizations cite employee negligence as their biggest security worry, as they increase exposure to sensitive data by the growing use of their personal unsecured devices (smartphones, laptops and tablets).  Seventy-three percent of organizations are not confident or only slightly confident that their third parties are able to detect a security incident, perform an incident risk assessment and notify them in the event of a data breach. What Can Be Done? The most important thing patients can and should do is to check the Explanation of Benefits (EOB) provided by doctors and other medical providers. HITECH Act for Tighter Security in Digital Health Records The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted on February 17, 2009 focuses on ensuring privacy and security of patient health information. This program provides incentive payments to eligible hospitals and providers who make a Meaningful Use (MU) of certified EHRs by the end of the year 2014. Eligible physicians can receive up to $44,000 over a 5-year period from Medicare or, alternatively, $63,750 over a 6-year period from Medicaid, while hospitals can receive a base annual amount of over $2 Million. HHS Security Risk Assessment Tool HHS has also released a new security risk assessment (SRA) tool to help providers with HIPAA compliance. Conducting a security risk assessment is a key requirement of the HIPAA Security Rule and a core requirement for providers seeking payment through the Medicare and Medicaid EHR Incentive Program. The SRA tool is designed to help practices conduct and document a risk assessment in a thorough, organized fashion by allowing them to assess the information security risks in their organizations under the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. HIPAA requires organizations that handle protected health information to regularly review the administrative, physical and technical safeguards they have in place to protect the security of the information.