{"id":3918,"date":"2015-02-16T15:35:32","date_gmt":"2015-02-16T20:35:32","guid":{"rendered":"http:\/\/www.khpi.org\/blog\/?p=3918"},"modified":"2015-02-16T22:10:28","modified_gmt":"2015-02-17T03:10:28","slug":"breach-of-personal-healthcare-information-at-anthem","status":"publish","type":"post","link":"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/","title":{"rendered":"Breach of Personal Healthcare Information at Anthem."},"content":{"rendered":"<p><span style=\"color: #333333;\"><strong>Healthcare data unchained!<\/strong><\/span><\/p>\n<p>We often hear the aphorism, \u201cAnything put on the internet, stays on the internet.\u201d I suggest a corollary, \u201cAnything put on a computer can be retrieved by a determined inquisitor.\u201d So it is even for the most intimate of personally identifiable information \u2013 healthcare records. Given massive nationwide efforts to digitize our healthcare encounters, and given the frequency with which those digits are shared among insurers, contractors, researchers, public health officials, health information exchanges, pharmaceutical companies, healthcare providers, and the host of other interested parties who claim a legitimate interest, it is inevitable that data will go astray and be misused \u2013 illegally or inappropriately! It is said of computer hard-drives that one does not ask <strong><em>if<\/em><\/strong> a failure will occur, but <strong><em>when<\/em><\/strong>. I maintain that the same dictum holds true of personal health information. If computer-wielding crooks can steal from banks (which we assume use the highest degree of on-line and network protection), how impregnable is the healthcare industry? Apparently not so much.<\/p>\n<p><strong>Big data-hack at Anthem.<\/strong><br \/>\nEarlier this month, health-insurer behemoth Anthem announced that the personal healthcare and credit card information of as many as 80 million of its customers may have been compromised. A secondary wave of attacks is already occurring as scammers send email warnings pretending to be from Anthem or credit-protection companies seeking to extract even more personal information from frightened Anthem customers. The Anthem breach strikes close to home. At last week\u2019s <a title=\"UofL Board of Trustees Addresses Governance and Faculty Practice Plan.\" href=\"http:\/\/www.khpi.org\/blog\/uofl-board-of-trustees-addresses-governance-and-approves-new-faculty-practice-plan\/\">UofL board of Trustees<\/a> meeting, it was announced that some 5700 UofL employees might be on the Anthem list. I may be one of them. Not a good feeling. I feel violated enough when my personal healthcare information is being used to target me with marketing propaganda cloaked as important medical information. Having the same information in the hands of bona fide crooks gives me the willies.<!--more--><\/p>\n<p><strong>Not the first major breach to be disclosed.<\/strong><br \/>\nAlthough noteworthy for the size of the breach, its occurrence is hardly unique. As it happens, first the <a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/index.html\" target=\"_blank\">HITECH Act and then the Affordable Care Act<\/a> requires that the Secretary of U.S. Health &amp; Human Services must \u201cpost a list of breaches of unsecured protected health information affecting 500 or more individuals.\u201d It has been referred to as &#8220;The Wall of Shame.&#8221; \u00a0Even without quibbling over what constitutes a breach or parsing the several exceptions to reporting, that list is long and growing. It surely represents only the tip of the iceberg. The current list of reported breaches includes 1139 instances involving over 41 Million records\u2013 virtually all since 2008. One can only speculate how many smaller breaches have occurred or how many large breaches went unreported or unrecognized. The Anthem breach may almost double the number of compromised records already posted on this government \u201cWall of Shame.\u201d A spreadsheet of the list is <a title=\"Wall of Shame- Healthcare information breach.\" href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\" target=\"_blank\">available online<\/a>, or can be <a title=\"Excel spreadsheet of wall of shame.\" href=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/wall-of-shame-feb2015.xlsx\" target=\"_blank\">downloaded<\/a> here. Some relevant observations I derive from the list include:<\/p>\n<p>\u2022 Breaches have occurred in all states, DC, and Puerto Rico. The more populous the state, the more likely to have had a breach.<\/p>\n<p>\u2022 Healthcare providers were the most frequent entities to have been breached, but business associates and health plans were well represented.<\/p>\n<p><a href=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/covered-entity-type-us.png\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-3923\" src=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/covered-entity-type-us.png\" alt=\"covered-entity-type-us\" width=\"517\" height=\"175\" srcset=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/covered-entity-type-us.png 517w, http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/covered-entity-type-us-150x51.png 150w, http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/covered-entity-type-us-300x102.png 300w, http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/covered-entity-type-us-500x169.png 500w\" sizes=\"(max-width: 517px) 85vw, 517px\" \/><\/a><\/p>\n<p>\u2022 Business associates of the record custodians were responsible for the largest number of individual records breached\u2014 55%<\/p>\n<p>\u2022 Seventy of the entities (6.7%) had more than one breach\u2014 20 had more than 2 breaches.<\/p>\n<p>\u2022 The list contains some of the most respected names in healthcare providers, hospitals, or insurers.<\/p>\n<p>\u2022 Of the 1139 listed breaches, 206 had an additional note providing more details about the nature of the violation. In 1% of those, the data was being used for \u201cresearch.\u201d<\/p>\n<p>\u2022 Multiple <a href=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/type-location-breach-feb2105.pdf\" target=\"_blank\">types\u00a0of breach<\/a> in a single episode often occurred, but roughly in descending order: Theft, Loss, Hacking\/IT Incident, Improper Disposal, and Unauthorized Access\/Disclosure were most common. The mode of breach was categorized as \u201cOther\u201d or \u201cUnknown\u201d in 99 instances (8.9%).<\/p>\n<p>\u2022 By far, the most <a href=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/type-location-breach-feb2105.pdf\" target=\"_blank\">common source of compromised information<\/a> was on desk- or laptop-computers, other physical electronic devices, electronic medical records, and network servers. Old-fashioned theft of paper or film records was also common.<\/p>\n<p><strong>How about in Kentucky?<\/strong><br \/>\nKentucky has not been spared from appearing on this list of major breaches. Attached is the <a title=\"Major breaches of health information in Kentucky\" href=\"http:\/\/www.khpi.org\/blog\/wp-content\/uploads\/2015\/02\/ky-breaches-feb2015-grid.pdf\" target=\"_blank\">list of 26 Kentucky entities <\/a>extracted from the master list. That number seems compatible with our size. \u00a0Compared to the rest of the country, we are over-represented for Healthcare Providers as the covered entity and Theft. We are underrepresented on Health Plans and Business Associates or on Hacking\/IT Incident. We too have a few repeaters.<\/p>\n<p><strong>Is this the price of doing business?<\/strong><br \/>\nOur healthcare system\/industry is so fragmented, and its relevant functional components so widely distributed that information must correspondingly be broadly shared. Just getting various electronic medical record systems, billing systems, prescribing systems, or administrative systems able to talk to each other has proven impossible so far. To complicate matters, detailed health records can be accessed in a wide variety of ways including on provider\u2019s cell phones or iPads \u2013 at home, in the office or hospital, or on the road. Detailed patient-specific information is routinely required by governmental entities, health plan operations, and (hopefully) in the past, even by employers. When the HIPPA medical privacy law was written, many exceptions to the privacy of patients were built in, including the ability of drug companies and researchers to peek at personal health records. In my opinion, our privacy structures more resemble a glass house than a bank vault.<\/p>\n<p><strong>Why do hackers want Anthem\u2019s data?<\/strong><br \/>\nNo doubt there is more information in Anthem\u2019s archives than just medical diagnoses. Items of great use to identity thieves form the core of medical information, including names, addresses, and phone numbers linked to social security numbers, credit card information, employers, family members, and all the other items we freely enter when we sign up at the front desk of our providers or in applications for insurance. Much more can be imputed such as socioeconomic status or family income. I suspect that the credit card and financial information will be of greatest immediate use to data thieves, but there will most probably be some attempt at blackmail over one medical diagnosis or another. More sophisticated misuse will occur as data thieves assemble contact lists of groups of patients to be sold to unscrupulous purveyors of quackery or worse.<\/p>\n<p><strong>How long will we tolerate our loss of privacy? Should we care<\/strong>?<br \/>\nAs such breaches become more widely recognized, and as the skill of the thieves develops, eventually some major changes in the way we do our business will be demanded. If such changes require less fragmentation of our healthcare system, all the better. As we work our way through that process, I believe we need to also consider what are current legal, but in my opinion inappropriate uses of personal medical information. Drug companies and researchers should need my permission to peruse my medical records. Hospitals should be much limited in their use of third parties to cross-market things they want to sell. For example, I should not have received a letter from my hospital marketing a multi-item panel of screening tests that all reputable health professional organizations deem to be wasteful if not harmful. I should not have to wonder why I am getting mailings or emails trying to sell me things that apply to my personal health situation. Health Information Exchanges in which we are encouraged to enroll should not be allowed to package and sell my pharmaceutical history to drug companies for the personal profit of individuals claiming to represent the public health. As my readers might surmise, I am almost more offended by some of the \u201clegal\u201d misuses of my personal health information than I am by its possible theft! You can add many more of your own concerns to these lists, and I encourage you to do so. Remember, it is not <em>if<\/em> you will be injured by misuse of your personal information, but <em>when<\/em>.<\/p>\n<p>Peter Hasselbacher, MD<br \/>\nPresident, KHPI<br \/>\nEmeritus Professor of Medicine, UofL<br \/>\nFeb 16, 2015<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Share this:<\/h3><div class=\"sd-content\"><ul><li><a href=\"#\" class=\"sharing-anchor sd-button share-more\"><span>Share<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><div class=\"sharing-hidden\"><div class=\"inner\" style=\"display: none;\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-3918\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=facebook\" target=\"_blank\" title=\"Click to share on Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-3918\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=linkedin\" target=\"_blank\" title=\"Click to share on LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-3918\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=twitter\" target=\"_blank\" title=\"Click to share on Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BShared%20Post%5D%20Breach%20of%20Personal%20Healthcare%20Information%20at%20Anthem.&body=http%3A%2F%2Fwww.khpi.org%2Fblog%2Fbreach-of-personal-healthcare-information-at-anthem%2F&share=email\" target=\"_blank\" title=\"Click to email a link to a friend\" data-email-share-error-title=\"Do you have email set up?\" data-email-share-error-text=\"If you&#039;re having problems sharing via email, you might not have email set up for your browser. You may need to create a new email yourself.\" data-email-share-nonce=\"c1bc5459c7\" data-email-share-track-url=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=email\"><span>Email<\/span><\/a><\/li><li class=\"share-end\"><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Healthcare data unchained! We often hear the aphorism, \u201cAnything put on the internet, stays on the internet.\u201d I suggest a corollary, \u201cAnything put on a computer can be retrieved by a determined inquisitor.\u201d So it is even for the most intimate of personally identifiable information \u2013 healthcare records. Given massive nationwide efforts to digitize our &hellip; <a href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Breach of Personal Healthcare Information at Anthem.&#8221;<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Share this:<\/h3><div class=\"sd-content\"><ul><li><a href=\"#\" class=\"sharing-anchor sd-button share-more\"><span>Share<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><div class=\"sharing-hidden\"><div class=\"inner\" style=\"display: none;\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-3918\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=facebook\" target=\"_blank\" title=\"Click to share on Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-3918\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=linkedin\" target=\"_blank\" title=\"Click to share on LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-3918\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=twitter\" target=\"_blank\" title=\"Click to share on Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BShared%20Post%5D%20Breach%20of%20Personal%20Healthcare%20Information%20at%20Anthem.&body=http%3A%2F%2Fwww.khpi.org%2Fblog%2Fbreach-of-personal-healthcare-information-at-anthem%2F&share=email\" target=\"_blank\" title=\"Click to email a link to a friend\" data-email-share-error-title=\"Do you have email set up?\" data-email-share-error-text=\"If you&#039;re having problems sharing via email, you might not have email set up for your browser. You may need to create a new email yourself.\" data-email-share-nonce=\"c1bc5459c7\" data-email-share-track-url=\"http:\/\/www.khpi.org\/blog\/breach-of-personal-healthcare-information-at-anthem\/?share=email\"><span>Email<\/span><\/a><\/li><li class=\"share-end\"><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div><\/div><\/div>","protected":false},"author":21,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[3,7,16],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5mRQe-11c","_links":{"self":[{"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/posts\/3918"}],"collection":[{"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/comments?post=3918"}],"version-history":[{"count":4,"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/posts\/3918\/revisions"}],"predecessor-version":[{"id":3929,"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/posts\/3918\/revisions\/3929"}],"wp:attachment":[{"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/media?parent=3918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/categories?post=3918"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.khpi.org\/blog\/wp-json\/wp\/v2\/tags?post=3918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}