Theft of thousands of schedules raises alarm for surgery managers

September 2011
Same-Day Surgery;Sep2011, Vol. 35 Issue 9, p89
Academic Journal
The article reports on paper surgery schedules for about 4,500 patients, which included their names, dates of birth, and Social Security numbers, and which were stolen in 2011 at an Alabama hospital when a woman was visiting a patient.


Related Articles

  • ID theft -- Should you spend more on security?  // Same-Day Surgery;Jul2011, Vol. 35 Issue 7, p73 

    The article reports on an annual survey which is conducted by the Healthcare Information and Management Systems Society and investigates medical identity theft at health care facilities.

  • Private Matters. Perkins, Susan K. // Marketing Health Services;Fall2004, Vol. 24 Issue 3, p14 

    This article discusses the implications and ramifications of the Privacy Rule, a provision of the Health Insurance Portability and Accountability Act of 1996. The article defines the Privacy Rule, which limits the use and disclosure of certain health information for certain purposes. The article...

  • No Change in Physician Dictation Patterns When Visit Notes Are Made Available Online for Patients. Kind, Elizabeth A.; Fowles, Jinnet B.; Craft, Cheryl E.; Kind, Allan C.; Richter, Sara A. // Mayo Clinic Proceedings;May2011, Vol. 86 Issue 5, p397 

    OBJECTIVE: To determine whether physicians document office visits differently when they know their patients have easy, online access to visit notes. PATIENTS AND METHODS: We conducted a natural experiment with a pre-post design and a nonrandomized control group. The setting was a multispecialty...

  • Strengthening the Voice of Those with Mental Health Issues: A Community Approach to Developing a Mental Health Identification System. Quinn, Andrew; Otteson, Mary // Social Work;Jul2019, Vol. 64 Issue 3, p216 

    This article describes how an action research approach was used to involve a community of individuals with mental health issues and their support systems in the development and adoption of a mental health identification (ID) card. The intent of the card was to provide individuals with mental...

  • Web privacy laws revisited.  // Marketing Health Services;Fall2002, Vol. 22 Issue 3, p8 

    This article looks at the Internet privacy bill introduced by Senator Ernest Hollings which concerns the collection, use, and disclosure of identifiable information by Internet service providers and commercial Web site operators in the U.S. The bill regulates identifiable health information,...

  • Red Flags Rule Clarification in Effect.  // Journal of AHIMA;Feb2011, Vol. 82 Issue 2, p14 

    The article reports on the U.S. President Barack Obama who signed a law called the Red Flag Program Clarification Act of 2010 in the U.S.

  • Why It's Safe To Toss Old Fax Machine, But Not Fax Capability. Adams, Steve // Credit Union Journal;9/13/2010, Vol. 14 Issue 37, p7 

    In this article the author discusses the features of fax technology which will make faxing an active technology in the future despite the advent of various technological applications of the same function. He cited the U.S. Health Information Portability and Accountability Act (HIPAA), which...

  • New Technology.  // Healthcare Purchasing News;Apr2011, Vol. 34 Issue 4, p48 

    The article presents information on health care including information on a tool from the Premier health care alliance which was developed to help hospitals and health systems assess the potential impact of value-based purchasing and information on a decision which the U.S. Department of Health...

  • Sutter sued over theft of computer with patient data.  // Modern Healthcare;11/28/2011, Vol. 41 Issue 48, p4 

    The article offers information on a class-action lawsuit filed in Sacramento Superior court in California against Sutter Health in connection with the October 15, 2011 theft of a desk top computer that allegedly held personally identifiable data of 4.3 million patients.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics