<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; PHI</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/phi/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Protecting high-risk information in EHRs</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/#comments</comments>
		<pubDate>Tue, 03 Jul 2012 17:34:58 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1410</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). According to one recent study[i], more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F03%2Fprotecting-high-risk-information-in-ehrs%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,HIPAA,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div>
<div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/medical-records.jpg"><img class="aligncenter size-full wp-image-1415" title="medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/medical-records.jpg" alt="" width="440" height="298" /></a></em></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p>According to one recent study<a href="http://www.experian.com/blogs/data-breach/wp-admin/post-new.php#_edn1" class="broken_link" rel="nofollow">[i]</a>, more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These studies strive to establish a business case for health organizations to create strengthened compliance programs that will enhance PHI security and privacy.  The programs focus primarily on the financial risk that health organizations face – through examination of elements that pose a threat. For example, these risks can manifest themselves through the number of varied health care organization handling PHI, and human threats which may come from malicious insiders, outsiders, or even cyber-crime rings.  In addition, these may include the dissemination of data through<a title="Medical and mobile: Convenience trumps security" href="http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/"> wireless devices or mobile devices</a>. There are other methods which may include lost or stolen information. </p>
<p>PHI is valuable to identity thieves because it is considered to provide a lucrative outlet in the area of<a title="Annual Study on Medical ID Theft" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp"> Medical Identity Theft</a>.  The rewards to this crime have surged as it is commonly tied to Financial Identity Theft.  The released studies highlight the necessity for those organizations in the health care industry to assess the threat, consequences, and vulnerability to PHI.  The proposed areas to be considered include procedures, policy, and the technology threat to the security of PHI.  With that said, privacy and security should be viewed as a priority by health care organizations. In order to determine the impact, these organizations need to analyze the relevance of the problem, and analyze the impact of the consequences that arise.  In doing so, health care organization will need ample and strong support for security, safeguards and controls, accessibility to resources, accountability both from leadership executives and below, strong authentication practices, and knowledge of the PHI flow within the organization and related.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_070312_article  ">View Now! </a></div></div>
<p>In the health care community, privacy is a fundamental right protected not only by laws, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), but is also a right expected by the patient.  As the health industry adopts the use of electronic files, the number of organizations handling Protected Health Information (PHI) increases.  An understanding of the risks, and the impacts – financial or not, can help organizations that handle PHI strengthen their<a title="Webinar: The State of Healthcare Information Security Today" href="http://www.experian.com/innovation/business-resources/healthcare-info-sec-today-webinar.jsp"> prevention and detection efforts</a> in addition to reducing liability. The breach of PHI creates problems both for the organizations and the patients whose information is entrusted to be protected.</p>
<div>
<div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-admin/post-new.php#_ednref1" class="broken_link" rel="nofollow">[i]</a> Redspin study, Breach Report 2011/Protected Health Information</p>
</div>
</div>
<p>&nbsp;</p>
</div>
</div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/&via=Experian_DBR&text=Protecting high-risk information in EHRs&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F03%2Fprotecting-high-risk-information-in-ehrs%2F&amp;title=Protecting%20high-risk%20information%20in%20EHRs" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Medical and mobile: Convenience trumps security</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/#comments</comments>
		<pubDate>Wed, 02 May 2012 16:30:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1177</guid>
		<description><![CDATA[Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too. A recent study suggests that adopting new [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg"><img class="aligncenter size-full wp-image-1183" title="medicalmobileapps" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg" alt="" width="540" height="270" /></a></p>
<p>Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too.</p>
<p>A recent study suggests that adopting new technology is a far greater priority than securing it. Eighty-one percent of healthcare organizations are using mobile devices to “collect, store and/or transmit” protected health information (PHI) but 49% “do nothing” to protect the devices.</p>
<p>The lack of security has been detrimental. The same study found that the breach of protected health information (PHI) records increased 97% from 2010 to 2011.</p>
<p>While data loss is certainly a burden to organizations, mobile security doesn’t have to be. Here are four key considerations for mobile-equipped medical offices:</p>
<ol>
<li>Encryption<br />
Consider the <a title="Encryption: Data's best friend" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> capabilities of a device before you purchase, not after. Carefully choose tablets and phones that offer a high level of encryption across the various functions and facets, including removable storage, of the device. If your office is already mobile-equipped, be sure encryption is standard procedure.</li>
<li>Storage<br />
Think of a mobile device as a way to access data, not store it. A secure server or cloud network is more appropriate for a centralized storage location, to which your mobile devices can connect and disconnect. The latter function is essential, as the portability of a mobile device makes it both easier to lose and more attractive to thieves. According to the Department of Health and Human Services, stolen physical devices account for 71% of breached healthcare records. A missing device that’s online with your data bank poses a serious threat to you and your patients.</li>
<li>Access<br />
Mobile devices should be password-protected, and so should access to your data bank through the devices. Job requirements should determine what devices and passwords each employee in your office can access. Also consider whether bring your own device (BYOD), when employees use their personal devices to access work data, fits with your security approach.</li>
<li>Employees<br />
Don’t overlook the element of human error in your mobile security plan. In 2011, the volume of breached medical records resulting from an employee losing an unencrypted device jumped 525%. Since you can’t ever completely eliminate human error, be sure to train your <a title="Your biggest data breach risk may be on your payroll " href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">employees </a>on properly using and handling mobile devices, as well as reporting any loss, theft or signs that a device has been tampered with.</li>
</ol>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_050212_article ">View Now! </a></div></div>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/&via=Experian_DBR&text=Medical and mobile: Convenience trumps security&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F&amp;title=Medical%20and%20mobile%3A%20Convenience%20trumps%20security" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Responding resourcefully to medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/#comments</comments>
		<pubDate>Thu, 26 Apr 2012 22:58:01 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1153</guid>
		<description><![CDATA[&#160; It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Data+Breach+Notification,healthcare,HIPAA,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg"><img class="aligncenter size-full wp-image-1166" title="patient-data-breaches" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg" alt="" width="400" height="300" /></a></p>
<p>It’s safe to say that healthcare data is/are under attack. Breaches of <a title="Differentiating factors of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/">medical records increased 97% </a>from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute.</p>
<p><strong>Be prepared:</strong> Does your organization observe security protocols and have controls in place to protect patient health information (PHI)?</p>
<p><strong>Have a response plan ready to deploy:</strong> In the event of a data breach, the first thing to do is activate your <a title="Data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/">response plan</a>. In general, this plan spells out in great detail everything from who will lead the response team to step-by-step processes for sending out notifications, customer care and more.</p>
<p><strong>Evaluate your situation post-breach:</strong> Once you’ve weathered the storm of a data breach and its consequences, take time to review the ways your organization responded and grade your response plan. This is also the time to make changes, small and substantial, to the response plan and implement any other protections or processes that you feel would improve your readiness and ability to respond in the event of another incident.</p>
<p>Look for Experian at the 2012 Compliance Institute in Las Vegas from April 29 to May 1. It’s a great opportunity to immerse yourself in solutions for preventing and managing data breaches, as well as meet experts who can help your organization be better prepared in the event of an incident.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_042612_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/&via=Experian_DBR&text=Responding resourcefully to medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F&amp;title=Responding%20resourcefully%20to%20medical%20data%20breaches" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>5 Differentiating factors of a healthcare breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/#comments</comments>
		<pubDate>Tue, 10 Apr 2012 08:30:58 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1125</guid>
		<description><![CDATA[Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting. With breaches of medical records increasing 97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,healthcare+data+breach,HIPAA,HITECH+Act,Identity+Theft,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg"><img class="aligncenter size-full wp-image-1131" title="hand-stealing-data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/stealing-data1.jpg" alt="" width="426" height="282" /></a></p>
<p>Data breaches occur in every industry, but, in healthcare, they’re a whole different ballgame. Black market prices and mobile devices drive data theft and loss. Federal regulations govern breach reporting.<br />
With <a title="Trends in healthcare data breaches" href="http://www.experian.com/blogs/data-breach/2012/03/20/trends-in-healthcare-data-breaches/" target="_blank">breaches of medical records increasing </a>97% from 2010 to 2011, the medical field has been especially hard hit. Here’s a look at five factors that make breaches in this one industry so cumbersome, dangerous and difficult to deter.<br />
 <br />
1. Heavy regulations<br />
While various state laws govern many breaches, a healthcare breach falls under federal law—both for providers and their business associates. The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act (HIPAA) in 1996 to govern PHI management. The Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 further enforced it. HITECH’s tiered system of fines can cost a company as much as $1.5 million for mishandling a breach.</p>
<p>2. Black market premium<br />
By many estimates, a medical record sells for $50 on the black market, compared to just $1 for a Social Security number (SSN), according to a GovTech.com article. A single breach can be highly lucrative with an average of 49,000 records impacted per incident. This profitability makes it all the more difficult to deter medical breaches and protected health information (PHI) fraud stemming from both internal and external threats.</p>
<p>3. Substantial harm to patients<br />
Ninety percent of healthcare organizations in a recent study agreed that breaches cause patients harm. One example of this is medical identity theft. Another study found that resolving medical identity theft costs victims $20,663, an extrapolated average. Patients with breached PHI may face even worse. They could lose their medical insurance altogether, due to abuse of their benefits by an imposter. And that imposter’s health conditions, blood type, allergies and prescriptions could end up being part of the victim’s medical file. That misinformation could lead to improper medical care, potentially resulting in a life-threatening situation for the victim.</p>
<p>4. High volume of breaches<br />
According to data from the<a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" rel="nofollow" target="_blank" class="broken_link"> Identity Theft Resource Center</a>, the overall volume of breached records increased 35% from 2010 to 2011. Yet, according to HHS data, the volume of breached PHI records increased 97% in the same timeframe. In fact, three of the top six breaches of 2011 were in healthcare, according to the Privacy Rights Clearinghouse. The numbers point to an industry in crisis. Ninety-six percent of providers in a recent study have experienced at least one breach in the past two years.</p>
<p>5. Unprepared entities<br />
The increase in medical breaches comes at a time when entities are updating their offices with both electronic health records (EHR) and mobile devices. Many are doing so without putting the proper security measures and access controls in place first. In a recent study, 81% of healthcare entities reported using mobile devices to “collect, store and/or transmit” PHI but 49% haven’t implemented any protection measures for the devices.</p>
<p>With so many different factors at play in <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">healthcare breaches</a>, the sector will continue to be an interesting one to watch. As the HHS promotes greater transferability of EHR, the road ahead may become even rockier.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_041012_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/&via=Experian_DBR&text=5 Differentiating factors of a healthcare breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F10%2F5-differentiating-factors-of-a-healthcare-breach%2F&amp;title=5%20Differentiating%20factors%20of%20a%20healthcare%20breach" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Big data can mean big breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/#comments</comments>
		<pubDate>Tue, 27 Mar 2012 08:20:33 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1042</guid>
		<description><![CDATA[As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F27%2Fbig-data-can-mean-big-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=big+data,breach+prevention,Business+identity+theft,Data+Breach,Data+Security,PHI,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/big-data1.jpg"><img class="size-full wp-image-1051 alignnone" title="big-data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/big-data1.jpg" alt="" width="491" height="369" /></a></p>
<p>As companies accumulate vast amount of data to improve their business intelligence, the risks of <a title="Consequences following a data breach" href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/" target="_blank">data breaches </a>accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data can be personal, sensitive and subject to regulation.  A recent Forrester report highlights the escalating security threats of this sort of “big data processing,” meaning the tools and techniques that handle extreme data volumes and formats.</p>
<p style="text-align: left;">The report underscores the importance of identifying the “toxic data” within these big data stores &#8211; in other words, the kind of data that will spell big trouble if it slips from an organization’s control.  This includes credit card numbers, <a title="Ensuring the security of personal identifiable information " href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personally identifiable information </a>(PII) like Social Security Numbers, and <a title="Help your customers protect their PHI" href="http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/" target="_blank">personal health information</a> (PHI) — and sensitive intellectual property, including business plans and product designs.  This is, of course, exactly the type of data that hackers and fraudsters are eager to steal.  Further, big data can include information that companies control but don’t own, such as customer and business partner data.  Big data can make a thief’s job easier by concentrating disparate toxic data in one place.</p>
<p style="text-align: left;">Forrester suggests a framework to help security and risk professionals control big data:</p>
<p style="text-align: left;">1) <em>Define the data</em></p>
<p style="text-align: left;">Data discovery locates and indexes big data, while data classification catalogs data to make it easier to control. Classify data based on toxicity, which will determine where it is stored.  Implement strong policies regarding data handling, storage, and records management, which will preclude the storage of sensitive information on laptops and mobile devices.  Security professionals must continuously discover and classify data as users create it throughout the organization’s network.</p>
<p style="text-align: left;">2) <em>Dissect and analyze the data</em></p>
<p style="text-align: left;">Experts can extract important data from big data sets that will help protect corporate assets; in other words, big data can be used to protect big data.  Analyzing this information is helpful in understanding how to protect big data.</p>
<p style="text-align: left;">3) <em>Defend and Protect the data.</em></p>
<p style="text-align: left;">Limit access to all resources, strictly controlling the number of people that can access data and continuously monitoring those users’ access levels throughout their employment. ·Inspect data usage patterns so that you can detect potential abuses.  Dispose of data when it’s no longer needed, and “kill” data  &#8211; using data abstraction techniques such as <a title="Encryption: Data's best friend" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/" target="_blank">encryption</a>, tokenization, and masking &#8211; to devalue it for use on the <a title="8 insights to the underground fraud economy" href="http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/" target="_blank">underground market</a>.</p>
<p style="text-align: left;"> <div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_032712_article ">Breach Weary? Download this free white paper and learn how cyber insurance can help reduce your risk</a>.</div></div></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/&via=Experian_DBR&text=Big data can mean big breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F27%2Fbig-data-can-mean-big-breaches%2F&amp;title=Big%20data%20can%20mean%20big%20breaches" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Year of the breach: 2011 in review</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 23:24:20 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=888</guid>
		<description><![CDATA[Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F20%2Fyear-of-the-breach-2011-in-review%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Identity+Theft+Resource+Center,PHI,Phishing,PII,privacy+legislation,Security+Breaches,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg"><img class="aligncenter size-full wp-image-891" title="usb_data_breach_laptop_610" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg" alt="Business person inserting usb into laptop" width="610" height="407" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">consumers information</a> was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.</p>
<p>More and more entities are now tracking data breach occurrences by:</p>
<ul>
<li>Industry sectors (categories): Business,      educational, government, medical, financial</li>
<li>Breach “type” (method of access): hacking,      insider, portable device (“data on the move”), accidental exposure,      subcontractor, and lost or stolen.       In some cases, discarded paper documents.</li>
<li>various attributes: paper or electronic, encrypted,      password-protected, number of records unknown or published</li>
</ul>
<p>While most definitions and terms are relatively consistent between these monitoring sources, there are some notable differences.  Differing filters applied by each monitoring entity as to what qualifies as a data breach on any given list create some divergence in comparison of breach lists.  These filters may range from whether the incident involves specific types of exposed PII to whether a designated minimum number of records have been compromised (i.e. 10 or 500 minimum).</p>
<p>Often it is how a “record” is defined that yields the greatest disparity in determining the number of “records” exposed.  Many breach analysts consider “records” to those persons whose sensitive <a href="../2011/09/27/ensuring-the-security-of-personal-identifiable-information/">personal identifying information</a> (PII), such as Social Security numbers, debit or credit card numbers, financial account numbers, medical record numbers, and driver’s license or state identification numbers have been exposed.  How then, does one then account for compromised non-PII information, such as email addresses, user names, or other non-financial account information?</p>
<p>Many <a href="../2011/09/06/how-hackers-find-their-targets/">hacking incidents</a> this past year didn’t target personal identifying information, but instead focused on emails addresses, passwords and other pieces of non-sensitive personal information.   The challenge for many who analyze breach incident statistics is how to “quantify” the number of breached records that do not involve PII.  Should emails and passwords be counted as “records” in the same way as Social Security numbers and financial account numbers?   As of now, most state laws do not include non-sensitive personal information as triggers for breach notification therefore there is no obligation to report the incident.</p>
<p>&#8220;The law only requires that an entity notify those who had sensitive information compromised, like Social Security numbers,&#8221; says Lisa Sotto, a managing partner for New York-based law firm Hunton &amp; Williams, in a recent interview with BankInfoSecurity.   &#8220;But now we know other things, like e-mail addresses, can lead to compromise through social engineering and phishing.</p>
<p>The challenge then for the incidence response team is determining if a breach notification is required.  If so, “what happened?”, “who needs to be notified”, “what specifics are required?”, “when do we do it?”, “how did it happen?”, and “what have we done to make sure it won’t happen again?”  The answers to these questions should all be part of an established Breach Response Plan.  Other pieces of this plan should include best practice protocols, procedures, corporate training guidelines and employee education.  In addition, an organizational ethic must be created so that all employees realize the importance of protecting personal information.  A corporate environment must be maintained which fosters and strengthens information security awareness at all levels of the organization.</p>
<p>Another important issue to consider in your company’s <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">incident response plan</a> is whether it is in the best interest of the company to report a data breach incident when there is no legal obligation to do so.  Under these circumstances, it is critical that the response team identify the best notification and crisis management tactics before a breach ever occurs.   Those companies with strong incident response plans are able to react more quickly and accurately, prevent further data loss (and potential fines), and present factual reporting to the public that minimizes customer backlash and negative publicity.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/&via=Experian_DBR&text=Year of the breach: 2011 in review&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches – to prepare or not to prepare? The answer is simple.</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/#comments</comments>
		<pubDate>Tue, 17 May 2011 16:00:22 +0000</pubDate>
		<dc:creator>pluehr</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=566</guid>
		<description><![CDATA[All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F17%2Fdata-breaches-%25e2%2580%2593-to-prepare-or-not-to-prepare-the-answer-is-simple%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,healthcare+data+breach,HITECH+Act,PHI,PII,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em>Our guest blogger this week is</em><em> Paul Luehr, Managing Director, General Counsel, <a href="http://www.strozfriedberg.com/professionals/xprProfessionalDetails1.aspx?xpST=ProfessionalDetail&amp;professional=11" rel="”nofollow” nofollow" target="_blank" class="broken_link">Stroz Friedberg, LLC</a> -</em> <em>a global digital risk management and investigations firm</em><em>.</em><em></em></p>
<p>All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. Healthcare institutions especially should heed the call for an incident response plan because it provides the best preventive medicine to minimize financial and reputational risks.  So <strong>PLAN</strong>, keeping in mind:  <strong><span style="text-decoration: underline;">P</span></strong>eople, the <strong><span style="text-decoration: underline;">L</span></strong>aw, and <strong><span style="text-decoration: underline;">A</span></strong>ction, with <strong><span style="text-decoration: underline;">N</span></strong>o time to waste.</p>
<p><strong><span style="text-decoration: underline;">P</span></strong>eople – Define the responsibilities of a coordinated incident response team. Don’t act alone. A good response team should include key internal players (In-house Counsel, IT, Compliance/Security, HR and Public Relations), as well as outside experts who confront data breaches on a regular basis (trusted Attorneys, Forensic Analysts and Fraud Monitors). These external experts can help restore key business functions, preserve crucial forensic evidence, strengthen data security, address victims’ needs, and communicate effectively with regulators and the public.</p>
<p><strong><span style="text-decoration: underline;">L</span></strong>aw – Track fast-changing data breach laws, privacy regulations, and notification mandates <em>before</em> a breach should occur.  This can help your organization identify protected health or personally identifiable information (PHI/PII which may trigger liability), navigate the HITECH Act and state law, understand reporting timelines, and effectively reach select constituents (i.e. Health and Human Services, victims, law enforcement and/or the media).</p>
<p><strong><span style="text-decoration: underline;">A</span></strong>ction – Outline clear action items to accomplish within the first seventy-two hours. One early misstep can destroy crucial evidence, delay an effective response, and trigger government penalties or class-action lawsuits.</p>
<p><strong><span style="text-decoration: underline;">N</span></strong>o time to waste – Remember that time is of the essence. <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">Once a breach is identified</a>, the clock starts ticking and may require immediate notice to regulators and/or notification to individual victims within 60 days.  </p>
<p>A comprehensive preparedness plan can promote extraordinary efficiencies when a breach threatens a healthcare entity. So, <strong>create your PLAN now.</strong></p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Download the free Data Breach Response Guide by Experian!" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_051711_article ">Download your free Data Breach Response Guide!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/&via=Experian_DBR&text=Data breaches – to prepare or not to prepare? The answer is simple.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%e2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Help your customers protect their PHI</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/#comments</comments>
		<pubDate>Tue, 21 Sep 2010 23:15:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=138</guid>
		<description><![CDATA[Recently I addressed the importance of having plans in place to protect personal health information in light of the sharp increase in healthcare data breaches.  Unfortunately, research studies are finding that incidents of fraud resulting from exposed healthcare data are on the rise.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F21%2Fhelp-your-customers-protect-their-phi%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cybercrime,Fraud,healthcare,Medical+Data+Breach,National+Cyber+Security+Awareness+Month,PHI,security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Recently <span style="text-decoration: underline;"><a href="http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/" target="_blank">I addressed</a></span> the importance of having plans in place to protect personal health information in light of the sharp increase in <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare data breaches</a>.  Unfortunately, research studies are finding that incidents of fraud resulting from exposed healthcare data are on the rise. A recent Javelin Strategy and Research study noted that fraud resulting from exposed health data has more than doubled over the past year.</p>
<p>This sharp spike is due to the extensive personal information available on an individual’s health record.  According to a recent <span style="text-decoration: underline;"><a href="http://www.rsa.com/solutions/consumer_authentication/intelreport/10947_Online_Fraud_report_0510.pdf" target="_blank" class="broken_link" rel="nofollow">RSA Online Fraud Report</a></span>, the types of fraud that can be committed using full information profiles are limitless. Not only is the individual a potential victim, the healthcare providers, insurers and the pharmaceutical companies are as well.</p>
<p>The RSA Report sites examples where a cybercriminal steals personal health information (PHI) to file false patient claims to an insurer.  A second example includes making false prescription orders to fuel the underground prescription drug trade.  Unfortunately, the consumer whose PHI is being abused may incur damages beyond being a victim of someone stealing their medical information.  Consumers may come under criminal investigation for defrauding the insurer or buying prescriptions illegally.  That doesn’t sound fair, does it?</p>
<p>It is of paramount importance to develop policies to deter and detect <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach </a>threats.  However, it is of equal importance to keep customers informed of how to <span style="text-decoration: underline;"><a href="http://www.worldprivacyforum.org/hipaa/index.html" target="_blank" class="broken_link" rel="nofollow">protect</a></span> their health privacy themselves. <span style="text-decoration: underline;"><a href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">National Cyber Security Awareness Month</a></span> begins October 1 this year. Please consider informing your clients and customers of how they can <span style="text-decoration: underline;"><a href="http://www.staysafeonline.org" target="_blank" class="broken_link" rel="nofollow">remain safe</a></span> online.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/&via=Experian_DBR&text=Help your customers protect their PHI&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do your business associates know how they will be affected by HITECH?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:30:30 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=37</guid>
		<description><![CDATA[Just as the healthcare industry came up to speed on the regulations defined  in The Health Information Technology for Economic and Clinical Health ("HITECH") Act, additional modifications are being proposed. These proposed rules focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs). So why is this significant? ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdo-your-business-associates-know-how-they-will-be-affected-by-hitech%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH+Act,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><img class="size-full wp-image-129 alignnone" title="medical doctor" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/medical-doctor.jpg" alt="" width="521" height="260" /></p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p>Just as the <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare industry</a> came up to speed on the <a href="http://www.hipaasurvivalguide.com" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">regulations defined</span></a> in The Health Information Technology for Economic and Clinical Health (&#8220;HITECH&#8221;) Act, additional modifications are being proposed. These <span style="text-decoration: underline;"><a href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotificationifr.html" target="_blank" class="broken_link" rel="nofollow">proposed rules</a></span> focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs).</p>
<p>So why is this significant? For two reasons. First, combined with the HITECH Act, the new rules will expand both the application of certain HIPAA Security and Privacy requirements and penalties to business associates.  Secondly, the proposal expands the definition of BA to include subcontractors who handle health information. Subcontractors would be considered BAs and are subject to direct liability under the HIPAA rules.</p>
<p>Many provider networks, physician practices and insurance plans work with outside vendors to manage their businesses and patient health information.  Many of these providers are BAs who use sub-contractors.  Under the proposed new regulations, these subcontractors must also be HIPAA compliant and follow the HITECH regulations or face penalties. This also means that CEs could be held liable when a BA does not comply.</p>
<p>How well does your company know its business associates…<em>and the businesses that they do business with</em>? As health care organizations expand their operations, it is imperative that due diligence is performed to avoid potential liability stemming from non-compliant vendors.  <a href="http://www.abanet.org/health/esource/Volume5/10/Nosowsky.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Some privacy professionals</span> </a>feel the best way to prevent liability under the new requirements is to be proactive about adhering to compliance standards.</p>
<p>Companies should consider actively working with their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">vendors </a>to address the stringent HITECH requirements and ensure that anyone that falls under the BA category is aware of the full implications as it relates to HITECH and HIPAA.  The more proactive you are the better chance you have of avoiding potentially heavy fines due to the ignorance of a BA that was not aware of the law.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/&via=Experian_DBR&text=Do your business associates know how they will be affected by HITECH?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Warning: Medical data breaches are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:22:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=36</guid>
		<description><![CDATA[According to a recent study by the Identity Theft Resource Center, data breaches in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.

What is the cause of this large discrepancy between industries?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fwarning-medical-data-breaches-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Policy,Fraud,healthcare,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png"><img class="size-full wp-image-58 alignnone" title="Medical Files 2010-09-07 at 10.40.38 PM" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png" alt="" width="487" height="325" /></a></p>
<p>According to a recent study by the <a href="http://www.idtheftcenter.org/index.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Identity Theft Resource Center</span></a>, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.</p>
<p>What is the cause of this large discrepancy between industries?  According to commentary provided by<a href="http://www.esecurityplanet.com/trends/article.php/3896676/Data-Breaches-Continue-to-Plague-Health-Care-Orgs.htm" target="_blank" class="broken_link" rel="nofollow"> <span style="text-decoration: underline;">eSecurity Planet</span></a>, the increase may be due to the many different types of workers that have access to areas in healthcare organizations buildings where sensitive data is stored. This unrestricted access provides an opportunity for unauthorized employees to access laptops, USB drives or desktops with sensitive information from areas that are far less secure than at a bank or other financial institutions.</p>
<p>This sharp increase has caught the attention of the US Congress that is set to approve $1.7 billion to <span style="text-decoration: underline;"><a href="http://www.bloomberg.com/news/2010-08-06/government-fraud-strike-forces-to-expand-under-obama-spending-plans.html" target="_blank" class="broken_link" rel="nofollow">fight healthcare fraud</a></span>. A large portion of that spend will go towards creating fraud “task forces” in up to 20 cities across the U.S. Watchdog groups and patient privacy advocates are also putting pressure on healthcare organizations to protect patient’s medical records and personal information especially as patient records become digital and are stored by third parties.</p>
<p>Deterring and detecting data breach threats does not happen by chance.  Now more than ever, it is important for healthcare companies to take advantage of proven data security solutions and to develop policies, like those used in other industries, to help protect patient data.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/&via=Experian_DBR&text=Warning: Medical data breaches are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>