11-03-2011
Adam Kehler, PA REACH, HIT Privacy & Security Specialist
In the interest of staying current on trends in data breaches, I would like to call attention to three recent incidents of breaches of protected health information (PHI) that have appeared in the news.
Some takeaways from these incidents are:
1. Encryption – In each of these cases, there was one simple solution that could have prevented these breaches. If the backup tapes or flash drives were encrypted using strong encryption (AES), these cases would not have been considered breaches because the data would be deemed unusable. I recently visited a practice that had their EHR server stolen from their facility. Many EHR installations do NOT have their databases encrypted even though all certified EHRs are required to have the ability to encrypt the database. Furthermore, many practices assume their databases are encrypted because they are password-protected or they are using a SQL Server Database; this is simply not the case. The encryption of the database and backups are incredibly important issues to bring up during the implementation of an EHR system.
2. Know where your data resides – The location of protecting Protected Health Information (PHI) extends well beyond the walls of the EHR system. In the second article above, a flash drive containing medical images was stolen. Other locations can include billing systems, practice management systems, Word and Excel files, fax images, images creating from imaging devices, text messages from an answering service, etc. This reinforces the importance of doing comprehensive risk assessment. The first step in the risk assessment process is to identify all of the locations where PHI resides and is transmitted. Then for each of those locations, you determine potential risks to the information and ways to encrypt or otherwise protect the information.
$$$$ - The 3rd article illustrates the fact that there are real financial costs to not properly protecting PHI. Costs can include fines from OCR, lawsuits, administrative costs for notifying all affected patients, and reputational harm. The cost of encrypting PHI or otherwise putting strong controls around protecting PHI are generally much smaller than the cost of a breach.