What George Clooney Can Teach Us About Medical Privacy

June 24, 2011
A hospital's compliance program is never tested more than when a hospital employee, public figure or celebrity is a patient.  In a struggle between

A hospital's compliance program is never tested more than when a hospital employee, public figure or celebrity is a patient. In a struggle between human curiosity and HIPAA policies and procedures, curiosity often wins. Case in point -- the disclosure last month of George Clooney's medical records when he was admitted as a patient to Palisades Medical Center Hospital in New Jersey after a motorcycle accident. The press later reported that dozens of employees, including doctors and nurses, were suspended for unauthorized access to Clooney's medical records. At a recent health care compliance conference, I asked an audience of privacy officers and compliance professionals whether they would fire an employee for unauthorized access to the health information of a public figure. A show of hands indicated that the audience was evenly split on that question. While there is room for debate as to what constitutes a firing offense, there is no question that privacy policies must be rigorously and consistently enforced. One of the best ways to do that is through the use of audit logs. What if the employee says someone else used their user name and password? Ideally, access logs should identify the workstation name and/or IP address. Also consider whether building access logs or security cameras can establish the employee's location at the time of the incident.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...