Pennsylvania Hospital Notifies 1,801 Patients of HIPAA Breach

June 9, 2014
Penn State Milton S. Hershey Medical Center is notifying 1,801 patients that their protected health information (PHI) had the potential to be accessed by individuals not involved in their care due to the actions of an employee who had accessed the data without having proper IT security protections in place.

Penn State Milton S. Hershey Medical Center is notifying 1,801 patients that their protected health information (PHI) had the potential to be accessed by individuals not involved in their care due to the actions of an employee who had accessed the data without having proper IT security protections in place.

Results of an internal investigation give no indication that any unauthorized person actually viewed or accessed this PHI as a result of the employee’s activity. However, because the employee worked with this information on devices and systems outside the safeguards and controls of the secure Penn State Hershey information network, medical center officials said they cannot completely rule out the possibility and are notifying patients out of an abundance of caution.

The information involved is specifically related to a type of test ordered by Penn State Hershey women’s health or family medicine clinicians, as well as other medical practitioners in the community who used Penn State Hershey laboratories for testing, between August 1, 2013 and March 26, 2014.

On April 11, 2014, the 551-bed medical center learned that one of its clinical laboratory technicians had been working with PHI—entering this information into a test log—from his home. Specifically, the test log contained information related to tests ordered in conjunction with patient visits that occurred at Penn State Hershey’s women’s health and family practice clinician offices. It also contained information from other physicians’ offices in the community that used Penn State Hershey’s lab to perform the tests over the same time period. The test log information included patient names, medical record numbers, name of lab test, visit dates, and test results.

The employee was authorized to access and use this information because of his job at Penn State Hershey. However he worked on the test log at home using systems and devices outside the secured Penn State Hershey system—his personal computer, a removable storage device (a flash drive) to transport the log home to continue his work after hours and his personal email account to send the updated test log to two Penn State Hershey physicians. No Social Security numbers and no financial information were included in the test log, officials said.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...