Tuesday, April 30, 2013

HHS Tools to Educate Consumers about HIPAA Privacy

A number of consumers are unfamiliar with their rights under the HIPAA Privacy Rule. The Department of Health and Human Services (HHS) for Civil Rights (OCR) has released several new tools to educate not only consumers but health care providers.

HHS has produced FAQs in multiple languages that compliment videos released earlier in 2013.

"OCR has posted a series of factsheets, available in eight languages, to inform consumers about their rights under the HIPAA Privacy Rule." -HHS, HealthIT.gov
One point the FAQs and videos mention is that patients have a right to request a report of everyone who has accessed their medical records - what is know as "an accounting of disclosures."

An accounting of disclosures, which can be an daunting task for providers, can now be handled easily with new low-cost on-demand SaaS services.

Download a white paper on accounting of disclosures and patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) New Tools to Educate Consumers and Providers - HHS, HealthIT.gov, 04/29/2013

Monday, April 29, 2013

Again, FL Patient Identity Theft for Fraud

Florida hospitals continue to be in the news for identity theft of their patients' data.

The HHS breach tool reports 16 new incidents. Included is a Florida hospital that reported data theft,for tax refund or other fraud, not by a their, but by a vendor's employee.

"And once again, it seems, the hospital did not detect any problem until law enforcement alerted them. ."
- PHIprivacy.net
While full details of the breach are not yet available it seems the hospital was unaware of the problem until notified by law enforcement.

Proactive privacy breach detection is now available as low-cost on-demand SaaS, enabling organizations to take action before they learn of thefts from third parties.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) HHS Breach Tool Includes Yet Another Florida Hospital Whose Patient Data Were Stolen - PHIprivacy.net, 04/25/2013
(b) HHS Breach Tool, Health Information Privacy - HHS.gov Breach Tool, 04/25/2013

Friday, April 26, 2013

Privacy Breach Can Mean Loss of Customers

Companies that sustain a data breach not only risk losing customers but also having them tell family and friends not to patronize that organization.

A study of consumer attitudes worldwide about their personal data and how companies protect it found 23% had suffered a data loss within the last 2 years, and because of the breach, 38% of them no longer did business with that company.

"More than 32% of respondents in the study said they "strongly agreed" with the statement that, in the event of a data breach, they would cease to do business with the organization concerned."
- Economist Intelligence Unit
"Consumers clearly feel very strongly about the perceived betrayal of trust that a data breach represents," said Paul Bantick , who heads Beazley's Technology, Media and Business Services team in London. About 70% of respondents felt incentives for businesses to protect personal information are inadequate.

With so much at risk companies can consider proactive detection of data privacy breaches; low-cost on-demand SaaS services are now available.

Download a white paper on privacy breach detection. Learn how to proactively identify unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Research Reveals Damage That Privacy Breaches Can Cause - NetSecurity.org, 04/19/2013

Thursday, April 25, 2013

Join Us to 'Make an EPIC Difference for Kids' this Spring

Twentieth Century FOX, Children's Miracle Network Hospitals and Rite Aid join forces for EPIC, in theaters May 24.

Raise money for your local Children's Miracle Network Hospital -- visit a Rite Aid store -- they are selling Miracle Balloons of "EPIC" proportions! Buy one and make a miracle, through May 11!

The team at Veriphyr encourages you to help your local Children's Miracle Network Hospital. Together, we can provide hope and healing to sick children in your community. Join us and people across the USA and make miracles happen.

Children’s Miracle Network Hospitals
Children’s Miracle Network Hospitals is a charity that raises funds for more than 170 children's hospitals. Donations to Children’s Miracle Network Hospitals are used to provide charitable care, purchase life-saving equipment, and fund research and education programs that save and improve the lives of 17 million children each year

Why Veriphyr Supports Children’s Miracle Network Hospitals
Like our customers, Veriphyr is committed to doing the right thing for our customers and communities. Veriphyr gives back to the communities by contributing a part of each sale to the Children’s Miracle Network Hospitals in the customer's community.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.

CMS: Audit 1 in 20 Meaningful Use Attesters

CMS plans on auditing 1 in 20 for compliance with the meaningful use program requirements.

While CMS has notified some health organizations about adverse findings, the agency is in the early stages of its auditing efforts. A few with adverse audit notices are appealing and some are facing investigation for possible fraud.

"CMS aims to audit about 5% of all meaningful use program participants... ."
- Robert Anthony, Deputy Director, CMS Health IT Initiatives Group
To date the most frequent problems found in audits are:
  • Noncompliance with the requirement that health care providers conduct a data security risk assessment, which also is a requirement under HIPAA; and
  • A lack of adequate documentation to support responses to some of the "yes or no" meaningful use requirements, such as whether an EHR system has been tested for the ability to exchange clinical data
To address data security risk assessment requirements there are now on-demand SaaS privacy breach detection and access compliance services available.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) One in 20 Meaningful Use Attesters To Face Audits, Official Says - ihealthbeat.org, 04/23/2013

Wednesday, April 24, 2013

Blood Donor ID Tax Fraud

Some donors gave more than blood when they visited BioMat USA. Bridgette Williams, of their employees, has pleaded guilty to stealing the donors' identities which were then used to file fraudulent tax returns by co-conspirators.

The identities of more than 130 people were stolen and almost $200,000 in tax returns were filed; the IRS issued $23,879 in fraudulent returns.

"Williams admitted she delivered 86 identities — including names, birthdays and social security numbers — to a conspirator in exchange for $400."
- The Telegraph, Middle Georgia's News Source
This type of incident reminds us how valuable identity information is to tax fraud thieves and why such information must be protected from inappropriate use.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Learn how Veriphyr Identity and Access Intelligence delivers business insights - with no hardware and no on-site software.
Sources:
(a) Macon Woman Pleads Guilty to Stealing Blood Plasma Donor's Identity Information for Tax Fraud Scheme - PHIprivacy.net, 04/23/2013
(b) Macon Woman Pleads Guilty in Blood Donor ID Fraud Scheme - Telegraph, 04/23/2013

Tuesday, April 23, 2013

Eel X-ray Leak Breached Privacy: 33 Fired, Disciplined

A New Zealand man who sought treatment for an eel in his rectum had his privacy breached when hospital staff leaked his x-rays and inappropriately accessed his medical records.

Thirty-three physicians, nurses and other hospital staff have been disciplined, and in some cases fired. A six month investigation found there was no legitimate reason for these individuals to access this patient's medical record. Most snooped in his x-ray images, but some viewed test results and discharge summary; the privacy breach extended to distribution of information to the public and the media.

"The privacy breach stretched to the distribution of information to public and media ."
- Fairfax New Zealand News
Patients have not only the expectation but the right their medical information will be kept private. Unfortunately, people's curiosity or malicious intent make them snoop in patients' records. Proactive detection of such inappropriate access is now available as a low-cost on-demand SaaS service, using data an organization already has.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Follow-up: Auckland District Health Board Disciplined More Than 30 Staff Members for Snooping - PHIprivacy.net, 04/16/2013
(b) Eel X-ray Staff Disciplined - Fairfax New Zealand News, 04/17/2013

Monday, April 22, 2013

Police Officer Breaches Database for Drug Dealer

A Baltimore police officer provided a drug dealer with private information from a law enforcement database.

The officer was fired and has plead guilty to charges of accessing a protected computer without authorization. He faces a sentence of one year and a $100,000 fine.

"No problem anything for u,” was text message to drug dealer from officer who inappropriately accessed police database.
- Prosecutor
It is unclear if this breach would have been uncovered without the wiretap in place as part of a drug trafficking investigation.

For proactive data breach detection, without the need for a wiretap, there are now low-cost on-demand SaaS services available that track inappropriate access by any system user.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Former Baltimore Officer Pleads Guilty to Improperly Accessing a Law Enforcement Database - www.privateofficer.com, 04/21/2013

Friday, April 19, 2013

Employee, responsible for privacy training, charged with license breach of 5000

A former Minnesota Department of Natural Resources employee has been charged with six counts of unauthorized computer and data access, as well as public employee misconduct.

John Hunt allegedly inappropriately accessed driver's license records of 5,000 people, many of whom were women in the public eye, over a five year period. He kept a file called "Mug Shots" on his work computer -- it held 170 womens' driver's license photos.

"What makes this case particularly egregious is that Hunt was also a data practices designee, responsible for making sure new employees were familiar with the laws and rules concerning access to driver's license records."
- Mike Durkin, reporter, MyFoxTwinCitiesNews
Of note is that Hunt was designated as the person to train others on maintaining the privacy of the driver's license database information. He had the authority to access the database, but abused his access privileges.

Knowing when authorized users abuse their privileges is now possible with low-cost SaaS proactive breach detection services.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Charges Filed Against Minnesota DNR Worker in License Data Breach - MyFoxTwinCities.com, 02/08/2013

Thursday, April 18, 2013

MN Police Breach Lawyer's Private Info 700 times

A former lawyer for the Minnesota state police union was shocked to learn her private driver's license information was inappropriately accessed by over 100 Minnesota entities, most of them law enforcement, on over 700 occasions.

The volume and scope of the private information accessed went far beyond legitimate purposes.

"You're going to see a lot of individuals who, once they have an audit done of their information, they're going to come back scratching their heads; it's a system that was fraught with abuse."
- Jeff Montpetit, attorney, Sieben Grose Von Hotum & Carey
Law enforcement officers across Minnesota are undergoing training on the ethical use of computer databases and the Drivers' Privacy Protection Act.

Training and policies on data privacy certainly contribute to protecting peoples' privacy. But technology can also play a role: low-cost SaaS proactive data breach detection can prevent situations where someones records are accessed inappropriately.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Minnesota Cops Checked Out Lawyer's Private Info - 700 Times - www.twincities.com,04/15/2013

Wednesday, April 17, 2013

Call-center Employee Stole Social Security Numbers, 6000 Patients Affected

An employee of a call-center that serviced several insurance companies has confessed to stealing social security numbers. This ID theft has affected 4800 patients.

A spokesperson for one of the health insurance companies said the now terminated employee may have conveyed the stolen information to third parties who are part of an ongoing criminal investigation.

"...the employee may have conveyed some of this information to third parties who are the subject of an ongoing criminal investigation."
- Cindy Wakefield, Wellpoint spokesperson
Many organizations utilize third parties such as call-centers and therefore it is another opportunity for sensitive customer information to be put at risk.

To protect customers' personally identifiable information accessed by their third party vendors, companies can now use low-cost SaaS proactive data breach detection.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Three Health Insurers Notifying Patients After Learning Call-center Employee Stole Members' Social Security Numbers - PHIprivacy.net, 04/05/2013

Tuesday, April 16, 2013

Survey: Healthcare Data Security Priorities

The second annual Healthcare Information Security Today survey shed light on how healthcare security professionals are dealing with HIPAA rules and improving data security approaches.

Refining regulatory compliance efforts (55 percent), bettering security awareness/education (45 percent), and spotting data breaches (34 percent) ranked highest as respondents' priorities.

"The three highest-ranked priorities for healthcare security professionals were refining regulatory compliance efforts (55 percent), bettering security awareness/education (45 percent) and spotting data breaches (34 percent).."
- Health IT Security
Two of these, "refining regulatory compliance efforts" and "spotting data breaches," can be addressed with low-cost on-demand SaaS analytics services that deliver actionable intelligence on data organizations already have.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Survey Reveals Healthcare Data Security Priorities, Concerns - HealthITSecurity.com, 04/15/2013
(b) Healthcare Information Security Today Survey - Healthcare Information Security Today, 04/2013

Monday, April 15, 2013

VIP Privacy Breach: Cricket Star Jesse Ryder

While being treated in a New Zealand Hospital, cricket star Jessee Ryder's medical records were inappropriately access by four clinical staff members.

Hospital staff members are supposed to access only records of patients under their care, so this was clearly a breach of a patient's privacy. The hospital issued an apology to Ryder and contacted the office of the Privacy Commissioner.

"During Ryder's time in hospital four clinical staff allegedly accessed his x-ray results, despite not being involved in his care."
- David Meates, Board Chief Executive, Christchurch Hospital
Today there are new, low-cost on-demand SaaS services available so healthcare organizations can detect privacy breaches on every patient, including VIPs.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Apology to Ryder Over Privacy Breach - Otago Daily Times, 04/13/2013

Friday, April 12, 2013

Prison for $10 Mil Fraud Based on Stolen Medical Data

An owner of a NY medical equipment company was sentenced this week to federal prison for 12 years. She was convicted of health care fraud and HIPAA identity theft.

Over a five year period she used her company as an entree into nursing homes in order to access and steal patient records. She used the records to submit $10 million in false Medicare billings.

"She violated the privacy of over a thousand patients and stole Medicare funds dedicated to preserving the health of our seniors and other citizens."
- United States Attorney Loretta E. Lynch
This type of fraudulent activity highlights the value of patients' medical identity to thieves and the need for proactive privacy data breach detection.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Long Island Health Care Provider Sentenced to 12 Years in Prison for $10 Million Medicare Fraud and HIPAA Identity Theft - PHIprivacy.net, 04/11/2013

Thursday, April 11, 2013

Man Uses Another's Medical ID to Receive $350K in Services

Just yesterday we blogged about health insurance cards being more valuable than credit cards and today we report a case that illustrates why medical records are such a target by the cost of the resulting medical id theft.

A man in Ohio is accused of receiving $350,000 of medical services using the medical ID of a South Carolina man.

"...fraudulent use of a man’s ID went on for 5 years, and was only detected because the man questioned why he continued to get bills for services he never received...why didn’t the hospital catch this problem sooner?."
- PHIprivacy.net
It seems that the medical identity theft was discovered because the victim kept complaining about bills for services, that occurred over a five year period, he never received. It is unclear when the victim first contacted the hospital about the erroneous bills or why the hospital didn't discover the identity theft sooner.

There are new, low-cost on-demand SaaS services available to detect privacy breaches before a victim has to contact the hospital about a possible medical identity theft.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Blue Cross Card More Valuable than Credit Card - Veriphyr Blog, 04/10/2013
(b) Man Allegedly Receives $350,000 In Medical Services Using Another Person's ID_ - 10TV.com, 04/04/2013
(c) Man Allegedly Receives $350,000 in Medical Services Using Another Person's ID - PHIprivacy.net, 04/04/2013

Wednesday, April 10, 2013

Blue Cross Card More Valuable than Credit Card

"I don't think many folks realize the Blue Cross card is much more valuable than any of their credit cards. We have seen instances where they can take a card and use it for a million-dollar transaction."
- Alanna Lavelle, director of investigations, Anthem Health Plans of Virginia
http://hamptonroads.com/2013/03/lapses-security-put-personal-health-records-risk
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Lapses in Security Put Personal Health Records at Risk - PilotOnline.com, 04/01/2013

Tuesday, April 9, 2013

ID Theft 14000 Patients

An employee of a Florida medical clinic had ties to an identity theft ring and 14,000 patients' personal information is at risk.

The employee, who was terminated and may face criminal charges, inappropriately accessed patient records and information such as names, addresses, dates of birth and Social Security numbers, may have been sold.

"The Secret Service told the University of Florida (UF) Privacy Office that an employee working at a UF Clinic may have been part of an identity theft ring."
- University of Florida website
Unfortunately an identity theft ring has recently affected several healthcare organizations in Florida, and most learned of the data breaches from the Secret Service or the IRS. To allow healthcare organizations to proactively detect privacy breaches, before a visit from law enforcement, there are new low-cost on-demand SaaS services available.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) College of Medicine University Physicians Group Practice ID Theft Privacy Brech - University of Florida, 04/03/2013
(b) U-Florida: ID Theft a Risk for 14000 Patients - HealthDataManagement, 04/05/2013

Monday, April 8, 2013

Physician Suspended for Privacy Breach

An emergency room physician was suspended for accessing the medical records of patients she was not treating; she was in a personal relationship with one patient, and in a relationship with the former spouse of another.

In addition to the suspension the physician was required to take an ethics course and to cover the $22,232.59 cost of the college’s investigation. The doctor also paid a significant monetary settlement in a related lawsuit.

"She accessed electronic health records of three people who she was not treating. It’s an invasion of privacy."
- Kelly Eby, spokesperson, College of Physicians & Surgeons of Alberta
While it's good these breach were brought to light, this only occurred because a patient filed a complaint with the hospital. Today there are new low-cost on-demand SaaS services that allow healthcare organizations to proactively detect privacy breach before anyone complains.
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) St. Albert Doctor Suspended for Privacy Breach - St Albert Gazette, 03/28/13

(b) CPSA Suspends Dr. Deanne Watrich for Inappropriately Accessing Patient Records - College of Physicians & Surgeons of Albert, 03/26/13

Friday, April 5, 2013

Insider Data Breach Probe Widens

County jail personnel were already under investigation for accessing colleagues' medical records and it now seems they also breached medical information of a private individual, a child.

A local hospital, which treats inmates and corrections officers with job related injuries, alleges the jail violated HIPAA regulations by inappropriately accessing correction officers' medical records, many of whom were out on disability.

"...I'm trying to find out how many times my records were accessed." - corrections officer whose medical records were inappropriately accessed while on disability.
Allegedly the breaches include an officer who attempted to access the record of a child being treated for bites inflicted by the officer's dog, in addition several corrections officers, while out on disability, had their medical records inappropriately accessed by a supervisor at the jail.

It's unclear how the hospital discovered the breaches but unfortunately organizations often find out from third parties rather than proactively auditing for breaches, as well as providing accounting of disclosures, which is now available as a SaaS on-demand service.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Breach of files probe widens - Times Union, 02/28/13

Thursday, April 4, 2013

HIPPA Omnibus: Experts' Tips for Small Providers

Even smaller healthcare organizations must keep in mind they have the same compliance responsibilities as larger entities.OCR made this point with the recent penalties it levied on small organizations for data breaches.

But smaller healthcare providers with limited resources can find compliance preparation challenging. Experts in healthcare security and compliance such as Rebecca Herold, Compliance Helper and CEO The Privacy Professor, Tom Walsh, Tom Walsh Consulting, have advice for smaller organizations.

"There are no excuses for noncompliance - which now would be considered 'willful neglect' and put an organization into the highest category of enforcement."
- Tom Walsh, Independent Healthcare Security Consultant
Their recommendations include taking advantage of free or low-cost reference materials from non-profits, government agencies, and trade associations.

Another low-cost option for complying with HIPAA omnibus privacy and security is SaaS privacy breach detection and user access compliance on-demand services.

Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) HIPAA Omnibus: Tips for Small Providers - Healthcare Info Security, 04/03/2013/

Wednesday, April 3, 2013

IT Staff Shortages Put Patient Privacy at Risk

The 2013 (ISC)2 Global Information Security Workforce Study (GISWS) reports that more that two-thirds of chief information security officers say they're understaffed which increases the threat of a data breach. Healthcare respondents said their top concern as a result of insufficient staff was patient privacy violations.

The study also found application vulnerabilities rank highest among concerns, across all industries. In healthcare, versus other industries, there was a greater interest in auditing tools and policy management.

"More and more enterprises are being breached. We must focus on building a skilled and qualified security workforce equipped to handle today’s and tomorrow’s most sophisticated cyber threats." - W. Hord Tipton, (ISC)2 Executive Director
While Mr. Tipton notes more enterprises are being breached and wants to focus on building a qualified workforce, other effective options are available immediately. SaaS data breach detection services deliver actionable intelligence within days, not months, from data an organization already has, and without burdening already stretched staff.
Download a white paper on SaaS data breach detection. Learn how to proactively identify unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Security Shortages Exacerbating Breaches - Healthcare IT News, 02/25/2013
(b) Global Information Security Workforce Study - (ISC)2, 2013

Tuesday, April 2, 2013

Data Breaches: Insiders Bigger Issue than Outside Hackers

A number of experts recommend more attention be paid to the threat employees, former employees, and contractors, pose to data theft.

According to former chief of the Justice Department's Computer Crime and Intellectual Property Section, Mike Dubose, more than two-thirds of all cyber cases involve company insiders, not outside hackers. Of note is that he feels there is probably under-reporting because many internal breaches are not made public.

"...organizations with good insider threat and data protection programs will be around in 10 years, and those that don't - won't."
- FBI Chief Information Security Officer Patrick Reidy
Dubose says companies need to become more sophisticated about monitoring their networks for unusual and suspicious user patterns. He recommends instituting centralized, system-wide logs of data access and transference that are easily accessible once a breach has been discovered.

Savvy organizations are utilizing big data analytics SaaS, on data they already have, to reveal insider patterns indicative of data breaches or fraudulent activity.

Download a white paper on detecting suspicious user activity patterns. Learn how to proactively identify unauthorized breaches of data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Insider Threats Aren't Hackers-They're Employees - Bit Defender, 03/12/2013

Monday, April 1, 2013

Ambulance Patients' Data Sold to Theft Ring

An ambulance ride can now mean worrying about ones identity, not just ones health.

Yuma Arizona's ambulance department was notified that personal data of patients transported had been sold to a Florida identity theft ring by an ADP employee; ADP provides billing for Yuma ambulance service. Patients in other US cities were also affected by this ADP employee's actions.

"Unfortunately, this is a big problem … a nationwide problem."
- Lisa MacKenzie, ADP, Inc.
The local news station in Yuma, KSWT News 13, asked why neither the city nor ADP could explain why it took six months and a federal mandate to inform the public about the compromised personal information. These are the types of questions more people are asking when they learn of data privacy breaches - why isn't breach detection being done proactively?
Download a white paper on patient privacy breach detection. Learn how to proactively identify unauthorized breaches of patient data privacy, even by authorized users - with no hardware and no on-site software.
Sources:
(a) Yuma ambulance riders' data at risk after billing company employee steals information - www.kswt.com, 03/14/2013

Popular Posts

Copyright © 2010-2017 by Veriphyr Incorporated, All Rights Reserved.

Contact us at Veriphyr.com.