<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; HIPAA</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/hipaa/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Little progress made in the prevention of medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/#comments</comments>
		<pubDate>Tue, 01 Jan 2013 16:32:55 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1919</guid>
		<description><![CDATA[Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance (HITRUST)1.  The study reports that from 2009 to the first half of 2012, there have been 495 medical data breaches involving 21 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security,HIPAA,HITECH+Act,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> has made very little improvement according to the latest <a href="http://www.hitrustalliance.net/breachreport/HITRUST%20Report%20-%20U.S.%20Healthcare%20Data%20Breach%20Trends.pdf" class="broken_link" rel="nofollow">study</a> from Health Information Trust Alliance (HITRUST)<sup>1</sup>.  The study reports that from 2009 to the first half of 2012, there have been 495 <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">medical data breaches</a> involving 21 million records costing roughly $4 billion.  Government organizations including VA hospitals accounted for the highest number of lost records and the states with the most health care data breaches are California, Texas and New York.  Since 2009 the total number of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breaches</a> at hospitals and health systems decreased only slightly but increased at smaller private physician practices, which accounted for more than 60% of the 459 breaches reviewed in the study.</p>
<p> The report also found that the majority of breaches (70 percent) were electronic and the leading cause data breach incidents were due to stolen devices such as laptops and mobile media.  However, paper records still play a role in data breaches, totaling 24 percent of medical data breaches, second only to lost laptops.  Mailing errors and improper disposal of records were the main reasons for paper-based breaches. </p>
<p>The Health Information Technology for Economic and Clinical Health (HITECH) Act states that healthcare organizations have 60 days in which to notify victims about a data breach but over 50 percent of companies failed to meet this deadline after a breach.</p>
<p>And it may get worse before it gets better if the medial industry does not find a way to protect themselves from BYOD (bring your own device) policies.  BYOD has become commonplace at smaller physician offices where medical personnel commonly look up patient information on their own smartphones without sufficient encryption or passwords in place which could pose a problem in the event that the device is lost.  In addition, due to the smaller sizes of this group, they lack the resources and awareness to properly arm themselves with the proper data breach protection<strong> </strong>in all areas of their practice.<strong>  </strong>This could expose a larger problem for the entire healthcare industry since community health records and health information is often shared between medical institutions of all sizes. </p>
<p>&nbsp;</p>
<p><sup>1</sup> HITRUST is a non-profit coalition of healthcare, business, technology and information security leaders, established to insure information security is a core value in the broad adoption of health information systems and exchanges.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/&via=Experian_DBR&text=Little progress made in the prevention of medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F&amp;title=Little%20progress%20made%20in%20the%20prevention%20of%20medical%20data%20breaches" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting high-risk information in EHRs</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/#comments</comments>
		<pubDate>Tue, 03 Jul 2012 17:34:58 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1410</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). According to one recent study[i], more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F03%2Fprotecting-high-risk-information-in-ehrs%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,HIPAA,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div>
<div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/medical-records.jpg"><img class="aligncenter size-full wp-image-1415" title="medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/medical-records.jpg" alt="" width="440" height="298" /></a></em></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p>According to one recent study<a href="http://www.experian.com/blogs/data-breach/wp-admin/post-new.php#_edn1" class="broken_link" rel="nofollow">[i]</a>, more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These studies strive to establish a business case for health organizations to create strengthened compliance programs that will enhance PHI security and privacy.  The programs focus primarily on the financial risk that health organizations face – through examination of elements that pose a threat. For example, these risks can manifest themselves through the number of varied health care organization handling PHI, and human threats which may come from malicious insiders, outsiders, or even cyber-crime rings.  In addition, these may include the dissemination of data through<a title="Medical and mobile: Convenience trumps security" href="http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/"> wireless devices or mobile devices</a>. There are other methods which may include lost or stolen information. </p>
<p>PHI is valuable to identity thieves because it is considered to provide a lucrative outlet in the area of<a title="Annual Study on Medical ID Theft" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp"> Medical Identity Theft</a>.  The rewards to this crime have surged as it is commonly tied to Financial Identity Theft.  The released studies highlight the necessity for those organizations in the health care industry to assess the threat, consequences, and vulnerability to PHI.  The proposed areas to be considered include procedures, policy, and the technology threat to the security of PHI.  With that said, privacy and security should be viewed as a priority by health care organizations. In order to determine the impact, these organizations need to analyze the relevance of the problem, and analyze the impact of the consequences that arise.  In doing so, health care organization will need ample and strong support for security, safeguards and controls, accessibility to resources, accountability both from leadership executives and below, strong authentication practices, and knowledge of the PHI flow within the organization and related.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_070312_article  ">View Now! </a></div></div>
<p>In the health care community, privacy is a fundamental right protected not only by laws, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), but is also a right expected by the patient.  As the health industry adopts the use of electronic files, the number of organizations handling Protected Health Information (PHI) increases.  An understanding of the risks, and the impacts – financial or not, can help organizations that handle PHI strengthen their<a title="Webinar: The State of Healthcare Information Security Today" href="http://www.experian.com/innovation/business-resources/healthcare-info-sec-today-webinar.jsp"> prevention and detection efforts</a> in addition to reducing liability. The breach of PHI creates problems both for the organizations and the patients whose information is entrusted to be protected.</p>
<div>
<div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-admin/post-new.php#_ednref1" class="broken_link" rel="nofollow">[i]</a> Redspin study, Breach Report 2011/Protected Health Information</p>
</div>
</div>
<p>&nbsp;</p>
</div>
</div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/&via=Experian_DBR&text=Protecting high-risk information in EHRs&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F03%2Fprotecting-high-risk-information-in-ehrs%2F&amp;title=Protecting%20high-risk%20information%20in%20EHRs" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Vigilance is still the best medicine for avoiding medical identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/#comments</comments>
		<pubDate>Tue, 26 Jun 2012 18:09:33 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1378</guid>
		<description><![CDATA[  The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=HIPAA,Identity+Theft,Medical+Data+Breach,medical+fraud,Medical+identity+theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg"><img class="aligncenter size-full wp-image-1402" title="Doctor conducting research" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg" alt="" width="448" height="299" /></a></p>
<p>The latest <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">Ponemon Institute Medical Identity Theft </a>survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly 2 million annually), while breach frequency and financial damages continue<br />
to rise, unabated.   </p>
<p><strong>Losses up 44% from 2010</strong></p>
<p>Data extrapolated for 2012 reveals that losses from medical identity theft will top $40 billion, up 34% from last year and 44% from 2010. During any given hour thieves using pilfered credentials will steal nearly $5 million worth of medical services, equipment and prescriptions.</p>
<p>The survey also revealed:</p>
<ul>
<li><strong>Higher costs for recovery and resolution</strong>: victims pay on average $22,346<br />
(up 10% from 2011) to resolve medical identity theft, including the cost of identity theft protection and retaining legal counsel</li>
<li><strong>Difficulty knowing when the crime occurred</strong>: one quarter of those asked did not know when their medical identity was stolen, while 34% said it took more than a year to find out</li>
<li><strong>Collection letters still top the list</strong>: though more consumers learn of medical identity theft from suspicious statement or invoice entries, nearly 40% of victims first hear of their misfortune through collection letters</li>
</ul>
<p>In a subtle but potentially instructive revelation, just 4% of survey respondents said a healthcare provider or insurance company notified them of the theft.  </p>
<p><strong>Providers beware</strong></p>
<p>So how is all this flavoring consumers’ attitudes toward healthcare and insurance providers? The biggest non-financial consequence, according to Ponemon, is a loss of trust and confidence. If people perceive a lack of effective data safeguards, most (58%) feel no compunction about going elsewhere for services. If their medical records were ever lost or stolen 56% of respondents would also feel justified making a change.  </p>
<p><strong>Watch the vital signs</strong></p>
<p>The top three actions desired by victims following medical identity theft include: reimbursement for the costs of changing providers; <a title="Ponemon Notification Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">prompt notification of the loss or theft</a>; and free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft protection </a>for at least one year. (Hint: Providers can use these survey insights to develop post-breach strategies and programs aimed at reestablishing trust and confidence.)  </p>
<p>Employers can also play a role in medical identity theft awareness by encouraging (and if needed, teaching) employees how to:</p>
<ul>
<li>Keep medical information private</li>
<li>Regularly check medical records for accuracy (57% of those surveyed don’t)</li>
<li>Be more proactive about monitoring statements and charges</li>
<li>Review and interpret credit reports</li>
<li>Engage an identity theft protection service</li>
</ul>
<p>Bottom line? When it comes to <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">medical identity theft</a>, vigilance is good medicine&#8211;for consumers and healthcare providers alike.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_062612_article  ">View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/&via=Experian_DBR&text=Vigilance is still the best medicine for avoiding medical identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F&amp;title=Vigilance%20is%20still%20the%20best%20medicine%20for%20avoiding%20medical%20identity%20theft" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Healthcare breaches &amp; fraud are here to stay</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/#comments</comments>
		<pubDate>Tue, 15 May 2012 14:49:10 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1213</guid>
		<description><![CDATA[Don’t expect medical breaches and healthcare fraud to drop off the radar anytime soon. Here’s why. First, the number of breaches in the industry is still escalating. In 2011, healthcare breaches occurred 32% more frequently than in 2010.1 Second, the profitably of medical records on the black market is high – 192% more profitable than [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg"><img class="aligncenter size-full wp-image-1224" title="electronic-medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg" alt="" width="425" height="282" /></a></p>
<p>Don’t expect <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">medical breaches</a> and healthcare fraud to drop off the radar anytime soon. Here’s why.</p>
<p>First, the number of breaches in the industry is still escalating. In 2011, <a title="5 Differentiating factos of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/" target="_blank">healthcare breaches</a> occurred 32% more frequently than in 2010.<sup>1</sup></p>
<p>Second, the profitably of medical records on the black market is high – 192% more profitable than Social Security numbers. Estimates put the former at $50 and the latter at $1, according to a GovTech.com article.</p>
<p>It’s this frequency and profitability that, in part, help to ensure the continuation of data loss and fraud. The sooner the industry accepts and prepares for incidents, the better.</p>
<p>Healthcare organizations still have a lot to do in that regard. Forty-three percent rank their ability to counter internal and external data security threats as “needs improvement,” “poor” or “failing.”<sup>2</sup> And their actions – or lack thereof – can adversely affect patients. Medical identity theft can cost a consumer $20,663 to resolve.<sup>3</sup></p>
<p> So what exactly is compromising data security at healthcare organizations? In a recent study, most organizations (54%) agreed that a lack of budgetary resources dedicated to security and privacy is the greatest weakness in preventing a breach.<sup>4</sup> The study also named the top three causes of data breaches as:</p>
<ul>
<li>Lost or stolen computing devices</li>
<li>Third-party errors</li>
<li>Unintentional employee actions<sup>5</sup></li>
</ul>
<p>Looking at the list, it’s clear that budgeting for security and privacy needs to encompass protecting mobile and other computing devices, training employees and verifying that third party partners uphold a high level of security as well.</p>
<p>Without a well-rounded approach to data security, organizations make themselves even more vulnerable at a time when vulnerability is a given. Organizations big and small can’t do without computers, third parties and employees – or at least two of the three. So the risk of a breach and resulting fraud can never be completely eradicated. Human error alone is impossible to eliminate.</p>
<p>But risks can be managed with a comprehensive plan that addresses a full spectrum of weaknesses and threats. A plan that includes access controls and encryption for sensitive data as well as a response guide to handling a data breach if one occurs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_051512_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now! </a></div></div>
<p>[footnotes]</p>
<p>1. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
2. Healthcare Information Security Today (2011)<br />
3. Second Annual National Study on Medical Identity Theft, Ponemon Institute (2011)<br />
4. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
5. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/&via=Experian_DBR&text=Healthcare breaches & fraud are here to stay&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F&amp;title=Healthcare%20breaches%20%26%20fraud%20are%20here%20to%20stay" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Medical and mobile: Convenience trumps security</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/#comments</comments>
		<pubDate>Wed, 02 May 2012 16:30:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1177</guid>
		<description><![CDATA[Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too. A recent study suggests that adopting new [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg"><img class="aligncenter size-full wp-image-1183" title="medicalmobileapps" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg" alt="" width="540" height="270" /></a></p>
<p>Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too.</p>
<p>A recent study suggests that adopting new technology is a far greater priority than securing it. Eighty-one percent of healthcare organizations are using mobile devices to “collect, store and/or transmit” protected health information (PHI) but 49% “do nothing” to protect the devices.</p>
<p>The lack of security has been detrimental. The same study found that the breach of protected health information (PHI) records increased 97% from 2010 to 2011.</p>
<p>While data loss is certainly a burden to organizations, mobile security doesn’t have to be. Here are four key considerations for mobile-equipped medical offices:</p>
<ol>
<li>Encryption<br />
Consider the <a title="Encryption: Data's best friend" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> capabilities of a device before you purchase, not after. Carefully choose tablets and phones that offer a high level of encryption across the various functions and facets, including removable storage, of the device. If your office is already mobile-equipped, be sure encryption is standard procedure.</li>
<li>Storage<br />
Think of a mobile device as a way to access data, not store it. A secure server or cloud network is more appropriate for a centralized storage location, to which your mobile devices can connect and disconnect. The latter function is essential, as the portability of a mobile device makes it both easier to lose and more attractive to thieves. According to the Department of Health and Human Services, stolen physical devices account for 71% of breached healthcare records. A missing device that’s online with your data bank poses a serious threat to you and your patients.</li>
<li>Access<br />
Mobile devices should be password-protected, and so should access to your data bank through the devices. Job requirements should determine what devices and passwords each employee in your office can access. Also consider whether bring your own device (BYOD), when employees use their personal devices to access work data, fits with your security approach.</li>
<li>Employees<br />
Don’t overlook the element of human error in your mobile security plan. In 2011, the volume of breached medical records resulting from an employee losing an unencrypted device jumped 525%. Since you can’t ever completely eliminate human error, be sure to train your <a title="Your biggest data breach risk may be on your payroll " href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">employees </a>on properly using and handling mobile devices, as well as reporting any loss, theft or signs that a device has been tampered with.</li>
</ol>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_050212_article ">View Now! </a></div></div>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/&via=Experian_DBR&text=Medical and mobile: Convenience trumps security&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F&amp;title=Medical%20and%20mobile%3A%20Convenience%20trumps%20security" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Where will you be on April 29, 2012?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/#comments</comments>
		<pubDate>Fri, 27 Apr 2012 15:30:00 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1140</guid>
		<description><![CDATA[﻿ Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=data+breach+response,healthcare+data+breach,HIPAA,medical+fraud,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;">﻿</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg"><img class="size-full wp-image-1143" title="Caesars Palace in Las Vegas" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg" alt="" width="512" height="340" /></a></p>
<p style="text-align: left;">Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare reform, compliance effectiveness and HIPAA privacy/data breach.</p>
<p>Attendees at the Compliance Institute can choose from 128 sessions and 225 speakers. Special conference tracks address legal and regulatory issues and privacy and security concerns, as well as general compliance. Also offered are advanced discussion groups, industry immersions, speed networking and more. For more information, go to <a rel="nofollow" href="http://www.compliance-institute.org/" class="broken_link">http://www.compliance-institute.org/</a>.</p>
<p>Come and visit our booth. We’ll talk about ProtectMyID<sup>®</sup>, Surveillance Alerts<sup>TM</sup> and ProtectMyID<sup>®</sup> ExtendCARE<sup>TM</sup>, as well as other Experian products that can play a critical role in protecting your organization, informing patients of a data breach and helping your organization recover from an incident. You can also enter your name in a drawing for a chance to win a new iPad.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/&via=Experian_DBR&text=Where will you be on April 29, 2012?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F&amp;title=Where%20will%20you%20be%20on%20April%2029%2C%202012%3F" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Responding resourcefully to medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/#comments</comments>
		<pubDate>Thu, 26 Apr 2012 22:58:01 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1153</guid>
		<description><![CDATA[&#160; It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Data+Breach+Notification,healthcare,HIPAA,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg"><img class="aligncenter size-full wp-image-1166" title="patient-data-breaches" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg" alt="" width="400" height="300" /></a></p>
<p>It’s safe to say that healthcare data is/are under attack. Breaches of <a title="Differentiating factors of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/">medical records increased 97% </a>from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute.</p>
<p><strong>Be prepared:</strong> Does your organization observe security protocols and have controls in place to protect patient health information (PHI)?</p>
<p><strong>Have a response plan ready to deploy:</strong> In the event of a data breach, the first thing to do is activate your <a title="Data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/">response plan</a>. In general, this plan spells out in great detail everything from who will lead the response team to step-by-step processes for sending out notifications, customer care and more.</p>
<p><strong>Evaluate your situation post-breach:</strong> Once you’ve weathered the storm of a data breach and its consequences, take time to review the ways your organization responded and grade your response plan. This is also the time to make changes, small and substantial, to the response plan and implement any other protections or processes that you feel would improve your readiness and ability to respond in the event of another incident.</p>
<p>Look for Experian at the 2012 Compliance Institute in Las Vegas from April 29 to May 1. It’s a great opportunity to immerse yourself in solutions for preventing and managing data breaches, as well as meet experts who can help your organization be better prepared in the event of an incident.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_042612_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/&via=Experian_DBR&text=Responding resourcefully to medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F&amp;title=Responding%20resourcefully%20to%20medical%20data%20breaches" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>5 Differentiating factors of a healthcare breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/#comments</comments>
		<pubDate>Tue, 10 Apr 2012 08:30:58 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1125</guid>
		<description><![CDATA[Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting. With breaches of medical records increasing 97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,healthcare+data+breach,HIPAA,HITECH+Act,Identity+Theft,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg"><img class="aligncenter size-full wp-image-1131" title="hand-stealing-data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg" alt="" width="426" height="282" /></a></p>
<p>Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting.<br />
With <a title="Trends in healthcare data breaches" href="http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/" target="_blank">breaches of medical records increasing </a>97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors that make breaches in this one industry so cumbersome, dangerous and difficult to deter.<br />
 <br />
1. Heavy regulations<br />
While various state laws govern many breaches, a healthcare breach falls under federal law—both for providers and their business associates. The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 to govern PHI management. The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 further enforced it. HITECH’s tiered system of fines can cost a company as much as $1.5 million for mishandling a breach.</p>
<p>2. Black market premium<br />
By many estimates, a medical record sells for $50 on the black market, compared to just $1 for a Social Security number (SSN), according to a GovTech.com article. A single breach can be highly lucrative with an average of 49,000 records impacted per incident. This profitability makes it all the more difficult to deter medical breaches and protected health information (PHI) fraud stemming from both internal and external threats.</p>
<p>3. Substantial harm to patients<br />
Ninety percent of healthcare organizations in a recent study agreed that breaches cause patients harm. One example of this is medical identity theft. Another study found that resolving medical identity theft costs victims $20,663, an extrapolated average. Patients with breached PHI may face even worse. They could lose their medical insurance altogether, due to abuse of their benefits by an imposter. And that imposter’s health conditions, blood type, allergies and prescriptions could end up being part of the victim’s medical file. That misinformation could lead to improper medical care, potentially resulting in a life-threatening situation for the victim.</p>
<p>4. High volume of breaches<br />
According to data from the<a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" rel="nofollow" target="_blank" class="broken_link"> Identity Theft Resource Center</a>, the overall volume of breached records increased 35% from 2010 to 2011. Yet, according to HHS data, the volume of breached PHI records increased 97% in the same timeframe. In fact, three of the top six breaches of 2011 were in healthcare, according to the Privacy Rights Clearinghouse. The numbers point to an industry in crisis. Ninety-six percent of providers in a recent study have experienced at least one breach in the past two years.</p>
<p>5. Unprepared entities<br />
The increase in medical breaches comes at a time when entities are updating their offices with both electronic health records (EHR) and mobile devices. Many are doing so without putting the proper security measures and access controls in place first. In a recent study, 81% of healthcare entities reported using mobile devices to “collect, store and/or transmit” PHI but 49% haven’t implemented any protection measures for the devices.</p>
<p>With so many different factors at play in <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">healthcare breaches</a>, the sector will continue to be an interesting one to watch. As the HHS promotes greater transferability of EHR, the road ahead may become even rockier.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_041012_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/&via=Experian_DBR&text=5 Differentiating factors of a healthcare breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F&amp;title=5%20Differentiating%20factors%20of%20a%20healthcare%20breach" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The RX for medical breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/#comments</comments>
		<pubDate>Tue, 03 Apr 2012 17:21:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1116</guid>
		<description><![CDATA[It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable to hackers, fraudsters, and costly bad luck (such as when a lost portable hard drive exposes the personal health records of thousands of patients.) The threat is real, so how do [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F03%2Fthe-rx-for-medical-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,HIPAA,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><strong><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/MedicalData.jpg"><img class="aligncenter size-full wp-image-1119" title="MedicalData" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/MedicalData.jpg" alt="" width="536" height="352" /></a></strong></p>
<p>It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable to hackers, fraudsters, and costly bad luck (such as when a lost portable hard drive exposes the personal health records of thousands of patients.)</p>
<p>The threat is real, so how do security experts suggest you protect yourself?</p>
<p>According to GovInfoSecurity, here are 8 tips to help ward off healthcare security breaches:</p>
<p>1. Risk Assessments<br />
HIPAA security risk analysis has been in short supply, thus exposing personal health information to the vagaries of chance.  Many large healthcare breaches have involved the loss or theft of mobile devices and media containing unencrypted PHI, pointing to the fact that risk assessments were not conducted or had failed to identify mobile devices as a vulnerability.  Comprehensive assessments should take into account internal and external infrastructure, web applications and wireless security, and mobile device policies and employee training should be conducted for all healthcare organizations.</p>
<p>2. Encrypt Mobile Devices and Media<br />
<a title="Data encryption_DB blog" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/" target="_blank">Data encryption</a> is important in every setting, and this is especially true when it comes to healthcare data.  Further, some experts think that health organizations should go further than encryption and simply not allow patient data to be stored on <a title="How memory sticks can lead to data breaches" href="http://www.experian.com/blogs/data-breach/2011/08/30/lost-memory-how-memory-sticks-can-lead-to-data-breaches/" target="_blank">mobile devices </a>at all.</p>
<p>3. Increase Training<br />
Security policies alone are not enough.  Employees must be trained in these policies in order for them to be effective.</p>
<p>4. Conduct Internal Audits<br />
<a title="Your biggest data breach risk may be on your payroll" href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/" target="_blank">Internal breach threats</a> can be mitigated by the establishment of regular internal audits, which can deter would-be fraudsters while also identifying <a title="Insider fraud" href="http://www.experian.com/blogs/data-breach/2011/06/21/scam-report-insider-fraud/" target="_blank">internal breaches </a>before they snowball further.</p>
<p>5. Monitor Business Associates<br />
With business associates accounting for 22% of major breaches, it’s important to make sure that vendor partners are as security conscious as you are.  Audits should extend to business associates in order to ensure vendors are practicing agreed-upon security measures.</p>
<p>6. Limit Data Storage<br />
Massive unencrypted databases are a recipe for disaster.  Encryption is important, but addressing the size of databases is also relevant.  Limiting the amount of personal data your organization possesses is an important step in ameliorating the consequences of data breaches.</p>
<p>7. Paper Records Are Also Important<br />
Good old-fashioned paper records can also lead to data breaches, so amidst the focus on online threats don’t forget about the hazards of paper.</p>
<p>8. Address Other Vulnerabilities<br />
Weaknesses such as wireless access vulnerabilities, ineffective encryption, rogue wireless access points, firewalls separating wireless networks from internal wired networks, and authentication requirements for entering wireless networks are examples of breach threats hat fall into the “miscellaneous” category.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_040312_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/&via=Experian_DBR&text=The RX for medical breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F03%2Fthe-rx-for-medical-breaches%2F&amp;title=The%20RX%20for%20medical%20breaches" id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Trends in healthcare data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/#comments</comments>
		<pubDate>Tue, 20 Mar 2012 08:25:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1058</guid>
		<description><![CDATA[As far as data security goes, 2011 was a dismal year.  Relentless, high-profile breaches punctured any sense that hack attacks are a remote threat, and by year’s end it was clear (if it wasn’t before) that protection against security disaster can only come from the most rigorous breach defense. Unfortunately, disaster is exactly what has [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F20%2Ftrends-in-healthcare-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare+data+breach,HIPAA,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/equipment-on-patient-folder2.jpg"><img class="aligncenter size-full wp-image-1102" title="equipment on patient folder" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/equipment-on-patient-folder2.jpg" alt="" width="419" height="280" /></a></p>
<p style="text-align: left;">As far as data security goes, 2011 was a dismal year.  Relentless, high-profile breaches punctured any sense that hack attacks are a remote threat, and by year’s end it was clear (if it wasn’t before) that protection against security disaster can only come from the most rigorous breach defense.</p>
<p style="text-align: left;">Unfortunately, disaster is exactly what has befallen the healthcare industry.  As health care regulations like HIPPA have become more pervasive, and healthcare records have increasingly moved online, the healthcare field has become a larger target of hackers and fraudsters while also becoming more vulnerable to breach by accident (such as a lost laptop).   That’s why health data breaches were up a whopping 97% last year, according to Redspin’s 2011 PHI Breach Analysis Report, with 19 million patients&#8217; health records affected, with 59% of all breaches involved a business associate.</p>
<p style="text-align: left;">The increasing use of portable devices, such as tablets, has not kept up with security policies to protect new technologies and systems (such as electronic health records) against data breaches.  Of 385 breaches of protected health information during this period, 39% occurred on a laptop or other portable device, 25% occurred on a desktop PC or server, and 60% resulted from malicious intent such as theft or hacking.</p>
<p style="text-align: left;">The rise of healthcare data breaches have been a<a title="Medical data breaches are on the rise" href="http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/" target="_blank"> known problem</a>.  Last year’s Ponemon Institute’s <em>Second</em><em> </em><em>Annual</em><em> </em><em>Survey</em><em> </em><em>on</em><em> </em><a title="A billion dollar crime that needs an urgent response" href="http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/" target="_blank"><em>Medical</em><em> </em><em>Identity</em><em> </em><em>Theft</em></a> estimated that more than 1.49 million Americans had at that point been targeted by this crime.  With an average cost per victim of $20,663 the total national economic impact of medical identity theft crimes was calculated to be in excess of $30 billion.</p>
<p style="text-align: left;">Some of the<a title="Redspin report: Health data breaches up 97% in 2011" href="http://www.informationweek.com/news/healthcare/security-privacy/232600746" rel="nofollow" target="_blank" class="broken_link"> key takeaways </a>from the Redspin report:</p>
<p style="text-align: left;">●     The federal government should update the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule so that healthcare providers have more relevant and practical guidance.</p>
<p style="text-align: left;">●     Healthcare providers should conduct a HIPAA security risk analysis on an annual or, at the least, bi-annual basis and put a plan in place to address any vulnerabilities found.</p>
<p style="text-align: left;">●     Hospitals should conduct a specific &#8220;portfolio&#8221; risk analysis of the numerous vendors, contractors, and consultants they work with to focus on the subset of business associates that present a high risk of potential damage from data breaches.</p>
<p style="text-align: left;">●     Healthcare providers must make their employees more security-conscious.</p>
<p style="text-align: left;">Consumers need to<a title="Help your customers protect their PHI" href="http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/" target="_blank"> do what they can</a> to protect their own health information, but healthcare organizations must mount vigorous defenses to ward off data breaches and implement <a title="Data breaches - to prepare or not to prepare?" href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">incident response plans</a> to quickly address breaches when they happen.</p>
<p style="text-align: left;"><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_032012_article ">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div></p>
<p style="text-align: left;"> </p>
<p style="text-align: left;"> </p>
<p style="text-align: left;"> </p>
<p style="text-align: left;"> </p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/&via=Experian_DBR&text=Trends in healthcare data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F20%2Ftrends-in-healthcare-data-breaches%2F&amp;title=Trends%20in%20healthcare%20data%20breaches" id="wpa2a_20"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>