<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; healthcare</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/healthcare/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Healthcare breaches &amp; fraud are here to stay</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/#comments</comments>
		<pubDate>Tue, 15 May 2012 14:49:10 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1213</guid>
		<description><![CDATA[Don’t expect medical breaches and healthcare fraud to drop off the radar anytime soon. Here’s why. First, the number of breaches in the industry is still escalating. In 2011, healthcare breaches occurred 32% more frequently than in 2010.1 Second, the profitably of medical records on the black market is high – 192% more profitable than [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg"><img class="aligncenter size-full wp-image-1224" title="electronic-medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg" alt="" width="425" height="282" /></a></p>
<p>Don’t expect <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">medical breaches</a> and healthcare fraud to drop off the radar anytime soon. Here’s why.</p>
<p>First, the number of breaches in the industry is still escalating. In 2011, <a title="5 Differentiating factos of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/" target="_blank">healthcare breaches</a> occurred 32% more frequently than in 2010.<sup>1</sup></p>
<p>Second, the profitably of medical records on the black market is high – 192% more profitable than Social Security numbers. Estimates put the former at $50 and the latter at $1, according to a GovTech.com article.</p>
<p>It’s this frequency and profitability that, in part, help to ensure the continuation of data loss and fraud. The sooner the industry accepts and prepares for incidents, the better.</p>
<p>Healthcare organizations still have a lot to do in that regard. Forty-three percent rank their ability to counter internal and external data security threats as “needs improvement,” “poor” or “failing.”<sup>2</sup> And their actions – or lack thereof – can adversely affect patients. Medical identity theft can cost a consumer $20,663 to resolve.<sup>3</sup></p>
<p> So what exactly is compromising data security at healthcare organizations? In a recent study, most organizations (54%) agreed that a lack of budgetary resources dedicated to security and privacy is the greatest weakness in preventing a breach.<sup>4</sup> The study also named the top three causes of data breaches as:</p>
<ul>
<li>Lost or stolen computing devices</li>
<li>Third-party errors</li>
<li>Unintentional employee actions<sup>5</sup></li>
</ul>
<p>Looking at the list, it’s clear that budgeting for security and privacy needs to encompass protecting mobile and other computing devices, training employees and verifying that third party partners uphold a high level of security as well.</p>
<p>Without a well-rounded approach to data security, organizations make themselves even more vulnerable at a time when vulnerability is a given. Organizations big and small can’t do without computers, third parties and employees – or at least two of the three. So the risk of a breach and resulting fraud can never be completely eradicated. Human error alone is impossible to eliminate.</p>
<p>But risks can be managed with a comprehensive plan that addresses a full spectrum of weaknesses and threats. A plan that includes access controls and encryption for sensitive data as well as a response guide to handling a data breach if one occurs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_051512_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now! </a></div></div>
<p>[footnotes]</p>
<p>1. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
2. Healthcare Information Security Today (2011)<br />
3. Second Annual National Study on Medical Identity Theft, Ponemon Institute (2011)<br />
4. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
5. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/&via=Experian_DBR&text=Healthcare breaches & fraud are here to stay&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F&amp;title=Healthcare%20breaches%20%26%20fraud%20are%20here%20to%20stay" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Medical and mobile: Convenience trumps security</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/#comments</comments>
		<pubDate>Wed, 02 May 2012 16:30:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1177</guid>
		<description><![CDATA[Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too. A recent study suggests that adopting new [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg"><img class="aligncenter size-full wp-image-1183" title="medicalmobileapps" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg" alt="" width="540" height="270" /></a></p>
<p>Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too.</p>
<p>A recent study suggests that adopting new technology is a far greater priority than securing it. Eighty-one percent of healthcare organizations are using mobile devices to “collect, store and/or transmit” protected health information (PHI) but 49% “do nothing” to protect the devices.</p>
<p>The lack of security has been detrimental. The same study found that the breach of protected health information (PHI) records increased 97% from 2010 to 2011.</p>
<p>While data loss is certainly a burden to organizations, mobile security doesn’t have to be. Here are four key considerations for mobile-equipped medical offices:</p>
<ol>
<li>Encryption<br />
Consider the <a title="Encryption: Data's best friend" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> capabilities of a device before you purchase, not after. Carefully choose tablets and phones that offer a high level of encryption across the various functions and facets, including removable storage, of the device. If your office is already mobile-equipped, be sure encryption is standard procedure.</li>
<li>Storage<br />
Think of a mobile device as a way to access data, not store it. A secure server or cloud network is more appropriate for a centralized storage location, to which your mobile devices can connect and disconnect. The latter function is essential, as the portability of a mobile device makes it both easier to lose and more attractive to thieves. According to the Department of Health and Human Services, stolen physical devices account for 71% of breached healthcare records. A missing device that’s online with your data bank poses a serious threat to you and your patients.</li>
<li>Access<br />
Mobile devices should be password-protected, and so should access to your data bank through the devices. Job requirements should determine what devices and passwords each employee in your office can access. Also consider whether bring your own device (BYOD), when employees use their personal devices to access work data, fits with your security approach.</li>
<li>Employees<br />
Don’t overlook the element of human error in your mobile security plan. In 2011, the volume of breached medical records resulting from an employee losing an unencrypted device jumped 525%. Since you can’t ever completely eliminate human error, be sure to train your <a title="Your biggest data breach risk may be on your payroll " href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">employees </a>on properly using and handling mobile devices, as well as reporting any loss, theft or signs that a device has been tampered with.</li>
</ol>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_050212_article ">View Now! </a></div></div>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/&via=Experian_DBR&text=Medical and mobile: Convenience trumps security&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F&amp;title=Medical%20and%20mobile%3A%20Convenience%20trumps%20security" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Responding resourcefully to medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/#comments</comments>
		<pubDate>Thu, 26 Apr 2012 22:58:01 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1153</guid>
		<description><![CDATA[&#160; It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Data+Breach+Notification,healthcare,HIPAA,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg"><img class="aligncenter size-full wp-image-1166" title="patient-data-breaches" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg" alt="" width="400" height="300" /></a></p>
<p>It’s safe to say that healthcare data is/are under attack. Breaches of <a title="Differentiating factors of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/">medical records increased 97% </a>from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute.</p>
<p><strong>Be prepared:</strong> Does your organization observe security protocols and have controls in place to protect patient health information (PHI)?</p>
<p><strong>Have a response plan ready to deploy:</strong> In the event of a data breach, the first thing to do is activate your <a title="Data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/">response plan</a>. In general, this plan spells out in great detail everything from who will lead the response team to step-by-step processes for sending out notifications, customer care and more.</p>
<p><strong>Evaluate your situation post-breach:</strong> Once you’ve weathered the storm of a data breach and its consequences, take time to review the ways your organization responded and grade your response plan. This is also the time to make changes, small and substantial, to the response plan and implement any other protections or processes that you feel would improve your readiness and ability to respond in the event of another incident.</p>
<p>Look for Experian at the 2012 Compliance Institute in Las Vegas from April 29 to May 1. It’s a great opportunity to immerse yourself in solutions for preventing and managing data breaches, as well as meet experts who can help your organization be better prepared in the event of an incident.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_042612_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/&via=Experian_DBR&text=Responding resourcefully to medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F&amp;title=Responding%20resourcefully%20to%20medical%20data%20breaches" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ensuring compliance with new healthcare legislation</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/#comments</comments>
		<pubDate>Tue, 23 Nov 2010 16:45:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=216</guid>
		<description><![CDATA[Legislation has been introduced in Congress to crack down on Medicare and Medicaid fraud. This legislation comes at a time when incidents of medical fraud are on the rise and the Obama Administration is poised to role out sweeping healthcare reform.  Medical fraud is estimated to cost the U.S. health care system $100 billion a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F23%2Fensuring-compliance-with-new-healthcare-legislation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH,Identity+Theft+Resource+Center,Medical+Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Legislation has been introduced in Congress to crack down on Medicare and Medicaid fraud. This <span style="text-decoration: underline;"><a href="http://www.ofr.gov/inspection.aspx" target="_blank" class="broken_link" rel="nofollow">legislation</a></span> comes at a time when incidents of medical fraud are on the rise and the Obama Administration is poised to role out sweeping healthcare reform.  <span style="text-decoration: underline;"><a href="http://money.cnn.com/2010/01/13/news/economy/health_care_fraud/" target="_blank" class="broken_link" rel="nofollow">Medical fraud</a></span> is estimated to cost the U.S. health care system $100 billion a year.</p>
<p>The <span style="text-decoration: underline;"><a href="http://www.usatoday.com/news/washington/2010-09-20-medicare-new-rules_N.htm?loc=interstitialskip" target="_blank" class="broken_link" rel="nofollow">new rules</a></span> will give federal health officials key powers to detect fraud early and prevent improper payments from being made.  For example, medical provider employees will be subject to fingerprinting, payments will be suspended to health organizations that are under investigation and medical programs will be required to stop using providers kicked out of Medicare or Medicaid programs.</p>
<p>These rules have serious implications for the health care industry that must also comply with stringent new HITECH rules. As I mentioned in a <span style="text-decoration: underline;"><a href="../2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/" target="_blank">previous blog</a></span> entry, some professionals feel the best way to comply with the new requirements is to be proactive.  For example, providers should consider actively working with their vendors to ensure all parties comply with the new standards.</p>
<p>Another recommendation is to conduct an internal risk assessment. A thorough assessment can identify where a business is not complying with the HITECH Act or HIPAA standards and provide an opportunity to make the right adjustments. Non-compliance can result in up to $1.5 million in fines or even civil action from a State Attorney General.</p>
<p>Learn more about <a href="http://www.experian.com/data-breach/data-breach-information.html" target="_blank"><span style="text-decoration: underline;">risk assessments</span> </a>and act now before it’s too late.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/&via=Experian_DBR&text=Ensuring compliance with new healthcare legislation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F23%2Fensuring-compliance-with-new-healthcare-legislation%2F&amp;title=Ensuring%20compliance%20with%20new%20healthcare%20legislation" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Help your customers protect their PHI</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/#comments</comments>
		<pubDate>Tue, 21 Sep 2010 23:15:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=138</guid>
		<description><![CDATA[Recently I addressed the importance of having plans in place to protect personal health information in light of the sharp increase in healthcare data breaches.  Unfortunately, research studies are finding that incidents of fraud resulting from exposed healthcare data are on the rise.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F21%2Fhelp-your-customers-protect-their-phi%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cybercrime,Fraud,healthcare,Medical+Data+Breach,National+Cyber+Security+Awareness+Month,PHI,security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Recently <span style="text-decoration: underline;"><a href="http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/" target="_blank">I addressed</a></span> the importance of having plans in place to protect personal health information in light of the sharp increase in <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare data breaches</a>.  Unfortunately, research studies are finding that incidents of fraud resulting from exposed healthcare data are on the rise. A recent Javelin Strategy and Research study noted that fraud resulting from exposed health data has more than doubled over the past year.</p>
<p>This sharp spike is due to the extensive personal information available on an individual’s health record.  According to a recent <span style="text-decoration: underline;"><a href="http://www.rsa.com/solutions/consumer_authentication/intelreport/10947_Online_Fraud_report_0510.pdf" target="_blank" class="broken_link" rel="nofollow">RSA Online Fraud Report</a></span>, the types of fraud that can be committed using full information profiles are limitless. Not only is the individual a potential victim, the healthcare providers, insurers and the pharmaceutical companies are as well.</p>
<p>The RSA Report sites examples where a cybercriminal steals personal health information (PHI) to file false patient claims to an insurer.  A second example includes making false prescription orders to fuel the underground prescription drug trade.  Unfortunately, the consumer whose PHI is being abused may incur damages beyond being a victim of someone stealing their medical information.  Consumers may come under criminal investigation for defrauding the insurer or buying prescriptions illegally.  That doesn’t sound fair, does it?</p>
<p>It is of paramount importance to develop policies to deter and detect <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach </a>threats.  However, it is of equal importance to keep customers informed of how to <span style="text-decoration: underline;"><a href="http://www.worldprivacyforum.org/hipaa/index.html" target="_blank" class="broken_link" rel="nofollow">protect</a></span> their health privacy themselves. <span style="text-decoration: underline;"><a href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">National Cyber Security Awareness Month</a></span> begins October 1 this year. Please consider informing your clients and customers of how they can <span style="text-decoration: underline;"><a href="http://www.staysafeonline.org" target="_blank" class="broken_link" rel="nofollow">remain safe</a></span> online.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/&via=Experian_DBR&text=Help your customers protect their PHI&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do your business associates know how they will be affected by HITECH?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:30:30 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=37</guid>
		<description><![CDATA[Just as the healthcare industry came up to speed on the regulations defined  in The Health Information Technology for Economic and Clinical Health ("HITECH") Act, additional modifications are being proposed. These proposed rules focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs). So why is this significant? ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdo-your-business-associates-know-how-they-will-be-affected-by-hitech%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH+Act,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><img class="size-full wp-image-129 alignnone" title="medical doctor" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/medical-doctor.jpg" alt="" width="521" height="260" /></p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p>Just as the <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare industry</a> came up to speed on the <a href="http://www.hipaasurvivalguide.com" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">regulations defined</span></a> in The Health Information Technology for Economic and Clinical Health (&#8220;HITECH&#8221;) Act, additional modifications are being proposed. These <span style="text-decoration: underline;"><a href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotificationifr.html" target="_blank" class="broken_link" rel="nofollow">proposed rules</a></span> focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs).</p>
<p>So why is this significant? For two reasons. First, combined with the HITECH Act, the new rules will expand both the application of certain HIPAA Security and Privacy requirements and penalties to business associates.  Secondly, the proposal expands the definition of BA to include subcontractors who handle health information. Subcontractors would be considered BAs and are subject to direct liability under the HIPAA rules.</p>
<p>Many provider networks, physician practices and insurance plans work with outside vendors to manage their businesses and patient health information.  Many of these providers are BAs who use sub-contractors.  Under the proposed new regulations, these subcontractors must also be HIPAA compliant and follow the HITECH regulations or face penalties. This also means that CEs could be held liable when a BA does not comply.</p>
<p>How well does your company know its business associates…<em>and the businesses that they do business with</em>? As health care organizations expand their operations, it is imperative that due diligence is performed to avoid potential liability stemming from non-compliant vendors.  <a href="http://www.abanet.org/health/esource/Volume5/10/Nosowsky.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Some privacy professionals</span> </a>feel the best way to prevent liability under the new requirements is to be proactive about adhering to compliance standards.</p>
<p>Companies should consider actively working with their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">vendors </a>to address the stringent HITECH requirements and ensure that anyone that falls under the BA category is aware of the full implications as it relates to HITECH and HIPAA.  The more proactive you are the better chance you have of avoiding potentially heavy fines due to the ignorance of a BA that was not aware of the law.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/&via=Experian_DBR&text=Do your business associates know how they will be affected by HITECH?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Warning: Medical data breaches are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:22:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=36</guid>
		<description><![CDATA[According to a recent study by the Identity Theft Resource Center, data breaches in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.

What is the cause of this large discrepancy between industries?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fwarning-medical-data-breaches-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Policy,Fraud,healthcare,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png"><img class="size-full wp-image-58 alignnone" title="Medical Files 2010-09-07 at 10.40.38 PM" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png" alt="" width="487" height="325" /></a></p>
<p>According to a recent study by the <a href="http://www.idtheftcenter.org/index.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Identity Theft Resource Center</span></a>, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.</p>
<p>What is the cause of this large discrepancy between industries?  According to commentary provided by<a href="http://www.esecurityplanet.com/trends/article.php/3896676/Data-Breaches-Continue-to-Plague-Health-Care-Orgs.htm" target="_blank" class="broken_link" rel="nofollow"> <span style="text-decoration: underline;">eSecurity Planet</span></a>, the increase may be due to the many different types of workers that have access to areas in healthcare organizations buildings where sensitive data is stored. This unrestricted access provides an opportunity for unauthorized employees to access laptops, USB drives or desktops with sensitive information from areas that are far less secure than at a bank or other financial institutions.</p>
<p>This sharp increase has caught the attention of the US Congress that is set to approve $1.7 billion to <span style="text-decoration: underline;"><a href="http://www.bloomberg.com/news/2010-08-06/government-fraud-strike-forces-to-expand-under-obama-spending-plans.html" target="_blank" class="broken_link" rel="nofollow">fight healthcare fraud</a></span>. A large portion of that spend will go towards creating fraud “task forces” in up to 20 cities across the U.S. Watchdog groups and patient privacy advocates are also putting pressure on healthcare organizations to protect patient’s medical records and personal information especially as patient records become digital and are stored by third parties.</p>
<p>Deterring and detecting data breach threats does not happen by chance.  Now more than ever, it is important for healthcare companies to take advantage of proven data security solutions and to develop policies, like those used in other industries, to help protect patient data.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/&via=Experian_DBR&text=Warning: Medical data breaches are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>