TITLE

Sutter sued over theft of computer with patient data

PUB. DATE
November 2011
SOURCE
Modern Healthcare;11/28/2011, Vol. 41 Issue 48, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on a class-action lawsuit filed in Sacramento Superior court in California against Sutter Health in connection with the October 15, 2011 theft of a desk top computer that allegedly held personally identifiable data of 4.3 million patients.
ACCESSION #
67669325

 

Related Articles

  • Time for an update. Conn, Joe // Modern Healthcare;8/6/2012, Vol. 42 Issue 32, p8 

    The article reports on a testimony by U.S. Government Accountability Office security expert Gregory Wilshusen before a Senate Homeland Security and Governmental Affairs subcommittee hearing which stated an increase in data-security incidents across all government agencies as of September 30,...

  • Addendum. Swiped, Not Hacked: After a Year of Reporting, Theft Remains Main Cause of Breach.  // Journal of AHIMA;Feb2011, Vol. 82 Issue 2, p66 

    The article reports on the most common cause of data breach in healthcare in the U.S. which is theft. It notes that of the 217 large-scale breaches reported to the Department of Health and Human Services by mid-January 2011, 121 involved theft. A federal rule on breach notification is discussed....

  • Theft of thousands of schedules raises alarm for surgery managers.  // Same-Day Surgery;Sep2011, Vol. 35 Issue 9, p89 

    The article reports on paper surgery schedules for about 4,500 patients, which included their names, dates of birth, and Social Security numbers, and which were stolen in 2011 at an Alabama hospital when a woman was visiting a patient.

  • Trends in E-Discovery: Four Cases Provide a Glimpse of Healthcare Litigation's Future. Baldwin-Stried Reich, Kim // Journal of AHIMA;May2012, Vol. 83 Issue 5, p44 

    The article highlights four court cases in the U.S. which provides a glimpse into what the future of healthcare litigation looks like through the new electronic healthcare information infrastructure. The author mentions cases including the use of predictive coding in electronic discovery, the...

  • Privacy HOLES in the 'Hidden Healthcare System'. DuBravec, Daniel A.; Daigle, Matt // Journal of AHIMA;Jun2015, Vol. 86 Issue 6, p41 

    The article focuses on issues related to privacy and security of student medical information in schools. It is noted that concerning areas related to electronic medical information security within K-12 schools have been found in a review of current guidelines and laws. It is mentioned that...

  • Privacy Rights Never Die.  // Journal of AHIMA;May2011, Vol. 82 Issue 5, p80 

    The article presents questions and answers related to privacy protection and right of access to deceased patient records such the need for a spouse to petition a probate court to become the estate executor of a deceased patient and subsequently gain the right to access the patient's medical...

  • Segmenting Data Privacy. Coleman, Johnathan // Journal of AHIMA;Feb2013, Vol. 84 Issue 2, p34 

    The article reflects on the need of data segmentation for additional protection of healthcare information. Data Segmentation for Privacy (DS4P) initiative uses Office of the National Coordinator's (ONC) Standards and Interoperability (S&I) Frameworks methods. Demonstration of pilot testing of...

  • Fire spreads. Evans, Melanie // Modern Healthcare;5/7/2012, Vol. 42 Issue 19, p12 

    The article reports that Accretive Health will undergo a congressional investigation to defend its business practices which were criticized by the Minnesota's attorney general. The April 24, 2012 report of the attorney general stated that Accretive may have violated federal privacy and consumer...

  • Where Privacy Meets Security. KASER, DICK // Information Today;Sep2012, Vol. 29 Issue 8, p3 

    The author reflects on data security, privacy, and cloud computing. He talks about several conventions and conferences in which legal issues concerning cloud computing were discussed and the laws that govern data in cloud computing. He talks about potential cyber security laws in the U.S....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics