Two data breaches a year is typical for hospitals

March 2011
Healthcare Risk Management;Mar2011, Vol. 33 Issue 3, p35
The article enlists some results from the "Benchmark Study on Patient Data Security Practices," conducted by the Ponemon Institute in Traverse City, Michigan, including one indicating that most hospitals average two patient data breaches a year.


Related Articles

  • Lawsuit woes. Conn, Joseph; Carlson, Joe // Modern Healthcare;2/18/2013, Vol. 43 Issue 7, p22 

    The article reports that North Shore Long Island Jewish Health System in New York is facing a legal battle over allegations that it failed to notify patients about an identity theft that resulted in their confidential information being stolen. Twelve people have reportedly filed a class action...

  • Study: Breaches of data up 32%.  // Healthcare Risk Management;Feb2012 Supplement, p4 

    The article discusses key findings of the second annual benchmark study by the Ponemon Institute in Traverse City, Michigan, which revealed a 32-percent increase in data breaches involving protected health information (PHI) in healthcare organizations.

  • Where to Begin with Cyber Defense. Lewis, Sharon; McDonald, Kevin B. // Journal of AHIMA;Apr2015, Vol. 86 Issue 4, p40 

    The article discusses a research concerning the risks of increasing number of public and private channels. It states the ethical and legal responsibility of protected health information (PHI) or personally identifiable information (PII), health information management (HIM) professionals to...

  • PRIVACY IN THE DATA-SHARING AGE. Lee DeOrio // For the Record (Great Valley Publishing Company, Inc.);2/11/2013, Vol. 25 Issue 3, p4 

    An introduction is presented in which the editor discusses various reports within the issue on topics including health information exchanges (HIEs), treatment of sexually transmitted diseases and electronic exchange of health information with improved medical care.

  • President's Message. Creating an Environment of Trust for Patients and Consumers. Birnbaum, Cassi // Journal of AHIMA;Apr2015, Vol. 86 Issue 4, p8 

    An introduction is presented which discusses various reports within the issue on topics including the use of protected health information (PHI) in the U.S., the significant role of organization's staff in creating an environment for patients and consumers and the integration of delivery system.

  • Data breaches attributed to business associates increase.  // Healthcare Risk Management;Feb2012 Supplement, p1 

    The article presents several scenarios highlighting the breach of patient privacy and data security due to the actions of business associates (BA) while discussing ways by which covered entities can monitor their BA's privacy and security program.

  • South Shore Hospital to pay $750,000 for data breach.  // Healthcare Risk Management;7/1/2012, p78 

    The article discusses an announcement made by Martha Coakley, Massachusetts Attorney General, that, South Shore Hospital in Boston agreed to pay $750,000 to resolve allegations for failure to protect the personal and confidential health information of more than 800,000 consumers.

  • Hospital shared medical files with reporters, state says.  // Healthcare Risk Management;7/1/2012, p83 

    The article discusses a finding by the California Department of Public Health, that Shasta Regional Medical Center in Redding violated the patient confidentiality by sharing a woman's medical files with journalists and sending an email about her treatment to 785 hospital workers.

  • Cloud-Based EHR Targets Small Hospitals.  // For the Record (Great Valley Publishing Company, Inc.);7/30/2012, Vol. 24 Issue 14, p35 

    The article reports an announcement by Alistair Crighton, Chief executive Officer (CEO) of Choice Hospital Systems on the availability of a cloud-based, certified Electronic Health Record (EHR), specifically designed as a low-cost alternative to legacy systems for small hospital organizations.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics