Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Storage

    Stanford Hospital Contractor Leaks 20,000 Patient Records to Public Website

    Written by

    Fahmida Y. Rashid
    Published September 8, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A data privacy breach at Stanford University’s hospital has resulted in medical records for 20,000 emergency room patients being posted on a public Website for nearly a year, according to The New York Times.

      A patient notified the hospital of the breach Aug. 22, and the hospital has been investigating how a detailed spreadsheet containing sensitive patient information wound up being posted on a commercial site, The New York Times reported Sept. 8. The compromised information belonged to patients who went to Stanford Hospital’s emergency room over a six-month period in 2009.

      The records included names, diagnosis codes, account numbers, dates of admission and discharge, and billing charges. Social Security numbers, birth dates, credit card accounts or other information that could potentially result in identity theft was not exposed. Even so, the hospital is offering free identity-protection services to all affected patients.

      “It is clearly disturbing when this information gets public,” Diane Meyer, Stanford Hospital’s chief privacy officer, told the Times, adding, “It is our intent 100 percent of the time to keep this information confidential and private, and we work hard every day to ensure that.”

      The nature of the incident was “quite strange,” but it doesn’t appear that it was part of a widespread breach, Mike Paquette, CSO at Corero, told eWEEK.

      The spreadsheet originated at one of the hospital’s vendors, a billing contractor called Multi-Specialty Collection Services. The spreadsheet appeared on a Website called Student of Fortune, where students pay for assistance with schoolwork. The spreadsheet was part of a question on how to convert the data into a bar graph and appeared Sept. 9, 2010. Student of Fortune removed the post with the spreadsheet immediately after being contacted by Stanford last month.

      “It’s baffling why anyone would post a spreadsheet with this kind of personal and sensitive information to a public forum looking for advice on how to create a graph,” Geoff Webb, director of product marketing at Credant Technologies, told eWEEK.

      Stanford Hospital has canceled its contract with Multi-Specialty Collection Services and received a written promise that all hospital-related files would be either destroyed or returned.

      Unfortunately, this kind of breach is becoming altogether common as information is shared between partners, customers and contractors to reduce costs and improve services, Webb said. The idea of protected information staying within the network perimeter is “effectively dead,” said Webb.

      The offending employee ignored both policy and “frankly, any kind of good sense,” Webb said, adding that “a number of things either went wrong or were simply missing” at Stanford Hospital, such as the ability to enforce policies around protecting sensitive health care information and technical controls to prevent this kind of misuse.

      While it’s essential that organizations have to have strong perimeter security and comprehensive authentication and authorization policies in place, organizations have to “rigorously” control all private data leaving the network, Phil Waltson, vice president of development and product management at Layer 7 Technologies, told eWEEK.

      Security Information and Event Management (SIEM) products can provide continuous monitoring of patient data, the systems and networks on which it resides and the individuals accessing it. When deployed properly, SIEM would send health care organizations an alert for unauthorized data access or anomalous activity, Mike Reagan, vice president of marketing at LogRhythm, told eWEEK.

      Reagan acknowledged that even if Stanford Hospital itself had been “doing all the right things” to protect the data, they didn’t seem to be demanding the same of their contractors and service providers.

      “It’s like going into battle wearing Kevlar pants and a T-shirt. It looks like the collection agency from which this information was leaked may have been wearing a T-shirt,” Reagan said.

      Considering the kind of sensitive information this spreadsheet contained, there should have been various security controls ensuring that the personal health information remained protected, John Linkous, vice president and chief security and compliance officer at eIQnetworks, told eWEEK.

      The security controls should have been in place for the entire lifecycle of the data, from when it was collected through to secure destruction after it was no longer needed. This isn’t just proper security, as there are a “plethora of mandates” dictating how the document should have been protected, including Health Insurance Portability and Accountability Act (HIPAA) and state privacy laws, Linkous said.

      Education is critical. Employees have to be taught that information has to be private. No matter how much training there is, the organization has to assume that at some point, information will be exposed. So there needs to be technology in place to “step in to protect” data when the employee still acts contrary to training, Webb said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.