Monday, November 30, 2015

Cop Inappropriately Accessed Confidential Info

A police officer with alleged romantic links to an accused drug dealer has been suspended from work.

The female officer was the subject of an internal investigation by the Queensland Australia Ethical Standards Command. Reportedly she has failed to resolve a conflict of interest and inappropriately accessed confidential information on the police database.

"[She] inappropriately accessed confidential information on a police computer system."
- Queensland Police Service spokesperson
It is unclear how the inappropriate access was discovered. Organizations seeking to detect data privacy breaches and identity theft can utilize identity and access analytics.
Learn how to proactively detect identity theft and unauthorized breaches of data privacy, even by insiders such as employees, contractors, providers, and vendors.
Sources:
(a) Qld cop suspended amid crim dating reports - www.News.Com.Au, 11/30/2015

Friday, November 20, 2015

EHR Adoption Nears 75%

Basic EHR adoption rates have climbed to nearly 75%, according to a recent study published in Health Affairs.

The researchers think that nationwide EHR adoption is possible soon. The study's authors suggest the high adoption rates were a result of the Centers for Medicare & Medicaid Services EHR Incentive Programs, which recently added penalties for lacking EHR integration.

"Because EHR use is incentivized, an increasing number of healthcare organizations are adopting the technology.."
-EHR Intelligence
While EHRs have been credited with improving healthcare delivery they have also made it easier to steal patients' IDs and medical information. Healthcare organizations seeking to proactively detect identity theft and data privacy beaches can utilize identity and activity analytics.
Learn how to proactively detect identity theft and unauthorized breaches of data privacy, even by insiders such as employees, contractors, providers, and vendors.
Sources:
(a) Basic Hospital EHR Adoption Rates Climb to Nearly 75% - www.EHRintelligence.com, 11/12/2015

Friday, November 13, 2015

Stolen Patient IDs Used by Tax Refund Fraud Ring

Three people in Florida have been sentenced to prison for filing fraudulent tax returns using identities stolen for assisted living residents and patients of a laboratory service.

One defendant had been employed at the assisted living organization; it is unclear who stole patient identitise from the medical laboratory service. The conspirators attempted to steal more than $276,000 from the United States Treasury through the fraud scheme.

"They conspired to file fraudulent tax returns using the stolen identities of assisted-living facility residents." - US Attorney's Office, Northern District Florida

It appears that the patient ID thefts were discovered by the IRS, not by the organizations holding the personally identifiable information (PII). Organizations seeking to proactively detect identity theft and data privacy breaches can utilize identity and activity analytics services.

Learn how Veriphyr uses Structural Analytics to detect "impermissible use" of patient data in clinical and business applications by employees, contractors, and third parties.

Sources:
(a) FL: Three People Sentenced in Tax Refund Fraud Scheme That Used Patient Data - www.DataBreaches.net, 11/06/2015

Thursday, November 5, 2015

Class Action Suit by Employees Over Insider Privacy Breach

Approximately 2,000 employees of a UK supermarket are suing over an insider data breach that involved the theft and posting online of the financial and personal details of 99,998 fellow employees by a disgruntled internal auditor.

"Whenever employers are given personal details of their staff, they have a duty to look after them."- Data Privacy lawyer Nick McAleenan, JMW Solicitors

Other employees who were affected have a four-month window in which to join the group claim. Data Privacy lawyer Nick McAleenan from JMW Solicitors said the case has “important implications for every employee and every employer”.

Learn how Veriphyr uses Structural Analytics to detect "impermissible use" of employee data in corporate applications by employees, contractors, and third parties.

Sources:
(a) Thousands of Morrisons employees to sue bosses over huge data breach - www.YorkshireEveningPost.co.uk,10/27/2015
(b) Thank you to Databreaches.net who was the source for this posting

Monday, November 2, 2015

Cybersecurity Bill Passes Senate

Last week the Senate approved a key cybersecurity bill and it awaits reconciliation with an earlier House version of the bill.The Cybersecurity Information Sharing Act (CISA) would make it easier for the private sector and government to share cyber threat information.

Healthcare industry organizations comments have been favorable. The College of Healthcare Information Management Executives (CHIME) and the Association for Executives in Health Information Security (AEHIS) welcomed passage of the act. “CISA will represent a significant advancement in cyber security and better enable the nation's chief information officers (CIO) and chief Information security officers (CISO) to better protect patient health information,” according to CHIME’s statement.

"The healthcare sector has become a prime target for bad actors, and it's important that the federal government works in conjunction with the industry to ensure provider organizations understand best practices to protecting patient data."
- Charles E. Christian, chair of the CHIME board of trustees
Learn how to proactively detect identity theft and unauthorized breaches of data privacy, even by insiders such as employees, contractors, providers, and vendors.
Sources:
(a) Major Cybersecurity Bill Clears Senate - www.HealthDataManagement.com, 10/28/2015

Popular Posts

Copyright © 2010-2017 by Veriphyr Incorporated, All Rights Reserved.

Contact us at Veriphyr.com.