Physician Practices, Healthcare Organizations See Own Staff as Source of Security Breaches

Published Online: March 20, 2014
Tony Berberabe, MPH
Results from the final report of the 2013 Healthcare Information and Management Systems Society Security Survey suggest that physician practices and health care organizations such as hospitals view their own staff members as the greatest source of patient information and confidentiality security breaches. In fact, 80% of respondents noted that they were concerned that human-related factors would put data at risk.

In the survey, respondents were most likely to identify human-related factors such as individuals circumventing controls or disclosing information in error as the greatest area of concern. Respondents were least likely to identify loss of information integrity, such as database corruption, as a concern. The respondents used a scale from 1 to 7, where 1 was not perceived as a threat and 7 represented an area that was of highthreat concern.

A security breach from an insider remains a major challenge, according to the 283 information technology and information security professionals who responded to the survey. The survey was supported by Medical Management Association and sponsored by the Experian Data Breach Resolution.

To prevent staff’s prying eyes, hospitals and practices are adding technology to existing Information technology systems to prevent snooping into electronic records. These include user access controls and audit logs of each user’s access to patient health records. Additionally, two-thirds of respondents reported that they use at least 2 access control mechanisms, such as user-based and role-based access controls, for controlling employee access to data. Furthermore, the number of respondents indicating their organization is collecting and analyzing data from audit logs is also increasing. For instance, the number of respondents that report their organization analyzes data from their firewalls, applications, and servers has all increased in the past year.

Lastly, healthcare organizations are more frequently auditing their information technology security plan to ensure they are ready in the event that a breach—internal or external—takes place.

Other key survey results include:

• Risk Analysis: The number of respondents working for physician practices that reported their organization conducted a risk analysis increased from 65% in 2012 to 78% in 2013.

• Data Breach Response Plan: More than half of the respondents (54%) reported that their organization has tested their data breach response plan.

• Security Breaches: Nineteen percent of respondents reported that they had a security breach in the last year. The majority of these breaches involved fewer than 500 patients.

Three-fourths (79%) reported that they notified patients affected by the breach. Only 8% of respondents indicated that the security breach was the result of actions taken by a business associate.
Recommended Articles
The Office of the National Coordinator for Health Information Technology will be awarding $38 million to 20 organizations in 3 health information technology grant programs working to further nationwide efforts to achieve better care, smarter spending, and healthier people.
A review published before FDA's vote on alirocumab outlines how editorials in 2 major journals were reflected in subsequent votes by advisory panels.
Physicians at the Brigham and Women’s Hospital have published results from a proof-of-concept study that used mass spectrometry in almost real-time to detect and delineate pituitary tumors from normal tissue.
Genevieve Kumapley, PharmD, BCOP, reflects on the significant out-of-pocket costs associated with oral oncolytics and suggests how a change in benefit design can help patients afford the treatments they need.
All-cause mortality and hospitalization rates and inpatient expenditures among Medicare fee-for-service beneficiaries decreased from 1999 to 2013.