The Unpopular Answer to Data Protection

Oct. 6, 2012
I’ve been thinking about data breaches in healthcare a lot lately. For my feature in the October/November issue of Healthcare Informatics, I interviewed various industry thought leaders who had plenty to say on the topic. One constant theme from every interview subject was that this issue is primarily an organizational one.

I’ve been thinking about data breaches in healthcare a lot lately. For my feature in the October/November issue of Healthcare Informatics, I interviewed various industry thought leaders who had plenty to say on the topic. One constant theme from every interview subject was that this issue is primarily an organizational one. When I interviewed James Rountree, senior consultant for Aspen Advisors, in a recent two-part podcast series, he echoed those feelings.

As Michael ‘Mac’ McMillan, chair of the HIMSS Privacy & Policy Task Force, and co-founder and CEO of CynergisTek Inc., a health information security and regulatory compliance firm located out of Austin, Texas, says, the unpopular answer to why we’ve seen an uptick in the amount of data breaches is “carelessness or lack of attention to controls, or lack of attention by the organization.”

What does this mean? It can mean lost portable devices, stolen devices, unencrypted devices and unencrypted data, and the lack of a multi-layered firewall. It can mean uneducated employees, the lack of uniform BYOD policies, or a miscommunication with a third-party. It can mean a lot of things, but whatever it is; it ultimately falls back on the organization. I keep thinking of something John Halamka, M.D., CIO at the Boston-based 649-bed Beth Israel Deaconess Medical Center (BIDMC), told me during our interview.

“CIOs may not have a lot of authority, but we have a whole lot of accountability,” he says.

That is an accurate statement if I’ve ever heard one!

Take a recent story I read about in Florida. At the 525-bed general medical and surgical facility, the University of Miami Hospital, two employees accessed patient information from registration “face sheets,” and reportedly sold that information to a third-party. According to the hospital, this happened between Oct. 2010 and July 2012, almost two years uninterrupted.

Interestingly, this mirrors another Florida-based data breach. This one occurred at Florida Hospital Celebration Health, a 112-bed acute care facility. In that case, a 35-year-old hospital employee, his 31-year-old wife, and a 30-year-old co-conspirator accessed more than 760,000 patient records from 2009-11, and reportedly sold them to the agent of a medical center, chiropractic clinics, and an injury hotline.

Let’s say for the sake of argument that these charges are true. How does an organization let this kind of behavior happen over a two-year period? You can make every excuse in the book and hospital leaders may not be directly at fault, but don’t be mistaken, as Halamka says, the unquestioned accountability lies at the top.

Halamka would know. His hospital, an industry-recognized leading medical facility, has had to deal with multiple data breaches. After the most recent one, tired of dealing with accountability, he decided to take a more aggressive stance. Every device that touches the BIDMC network, whether it’s the hospital’s own device, the physician’s personal device, or something else, must be synched by the IT team. This forces password-protection and encryption on every device that touches the network, Halamka says.

Other CIOs would likely agree that shoring up policies is the way to go. I heard similar things from Sue Schade, currently CIO of the University of Michigan Hospitals and Health Centers and formerly CIO of Brigham & Women’s Hospital at the time of a recent breach, and Jim Turnbull, CIO of the four-hospital, integrated University of Utah Health Care system, both of whom dealt with breaches of their own.

With all the digitization of healthcare data set to take place in the coming years, this issue will only become more prominent. What’s the first thing providers need to focus on to avoid making the federal Department of Health and Human Services (HHS)’ growing list of data breach victims? Schade’s three-word answer should suffice: “Policy and training.”

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...