Preview

Breaching the Security of an Internet Patient Portal

Powerful Essays
Open Document
Open Document
1186 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Breaching the Security of an Internet Patient Portal
NI Topic:

Breaching The Security of An Internet Patient Portal

Nur-531

May 18, 2013

Introduction

Kaiser Permanente is a health system which serves over eight million members in nine states and the District of Columbia. In the 1990’s the KP Northern California region created an Internet Patient Portal known as “Kaiser Permanente Online” (KP Online)(Wager, 2009). KP Online provides members access to request appointments and prescription refills, obtain health information, and receive medical advice from staff. In August 2000, a breach occurred when an Operations technician applied patches to servers in support of a new KP Online pharmacy refill application. Subsequently, the outgoing e-mail function of KP Online failed and created a dead letter file of outbound messages with replies to patient inquiries that contained individually identifiable patient information (Collmann & Cooper, 2007). In trying to clear the e-mail file, a flawed computer script was created that concatenated over 800 individual e-mail messages, which contained personal identifiable. At least nineteen of the e-mails reached their intended destination (Collmann & Cooper, 2007). Two members who received the email messages reported the incident to KP. Kaiser considered the breach was a significant incident due to the number of messages sent. As a result, the company created a crisis team to find the cause of the breach. The Kaiser crisis team notified its members and issued a press release three days after the breach.
Major Issues This case study protected sensitive patient information was comprised during the e-mail security breach. The Kaiser Permanente leadership reacted quickly to mitigate the damage of the breach because the company was non-compliant with good information security practice and regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) which established standards for the



References: American Nurses Association. (2012). ANA Ethics Position Statement Privacy and Confidentiality. Silver Springs, MD: Author. Retrieved May 18, 2013 from ANA website. Collmann, J., & Cooper, T. (2007). Breaching The Security Of The Kaiser Permanente Internet Patient Portal: The Organizational Foundations Of Information Security. Journal of the American Medical Informatics Association, 14(2), 239-243. Harrison J., & Booth N. (2003). Applying new thinking from the linked and emerging fields of digital identity and privacy to information governance in health informatics. Informatics in Primary Care Journal, 11(4), 223-8. Retrieved from CINAHL database. HIPAA FAQs. (2002, August 1). Corporate Responsibility Resources For Businesses And Marketers. Retrieved May 18, 2013, from http://www.dmaresponsibility.org/HIPPA/. Rossel, C. L. (2003). HIPAA: An informatics system perspective, Chart, 100(1). Retrieved May 18, 2013 from CINANL database. Saba, V., & McCormick, K. A. (5th Ed.). (2011). Essentials of Nursing Informatics. Trustworthy Systems for Safe and Private Healthcare (pp. 271-277). New York: McGraw-Hill Companies. Wager, K. A., Lee, F. W., & Glaser, J. (2009). Health care information systems: a practical approach for health care management (2nd ed.). San Francisco, CA: Jossey-Bass.

You May Also Find These Documents Helpful

  • Best Essays

    The Effect of the Health Insurance Portability and Accountability Act on the Privacy of Electronic Medical Records…

    • 3042 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Green, M.A., & Bowie, M.J. (2005). Essentials of health information management: Principles and practices. Clifton Park, NJ: Thomson…

    • 1028 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Prior to the Information Age, medical records were all stored in folders in secure filing cabinets at doctor’s offices, hospitals, or health departments. The information within the folders was confidential, and shared solely amongst the patient and physician. Today these files are fragmented across multiple treatment sites due to the branching out of specialty centers such as urgent care centers, magnetic resonance imaging, outpatient surgical centers, and other diagnostic centers. Today’s ability to store medical records electronically has made it possible to easily send these files from one location to another. However, the same technology which can unify the fragmented pieces of a patient’s medical record has the ability to also create a path for privacy and security breaches. This paper will examine how electronic medical records are used, how they are secured, how security is enforced, and what the consequences of security breaches are.…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Powerful Essays

    McWay, D.C. (2010). Legal and Ethical Aspects of Health Information Management 3rd Edition. Clifton Park, NY: Cengage Learning.…

    • 1702 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    In the world of technology today, consumers often purchase items through the internet using their personal information such as name, date of birth and credit card numbers. This information can easily be stolen from someone who seeks to exploit weakness in a computer network. According, to (Gagne, 2012), “data breaches often occur through technical vulnerabilities, malware, compromised user credentials or opportunist attackers”. Healthcare organizations maintain patient medical and personal information through an electronic source called the electronic health record. Healthcare quality and safety requires that the right information be available at the right time to support patient care and health system management decisions. Data breaches in healthcare have become common within the last few years which is a violation of the Health Insurance Portability Accountability Act of 1996 and patient privacy. Data security is a major concern pertaining to consumers choosing a health care organization to fit their needs. Care providers and insurance companies face the increased enforcement of regulatory requirements to ensure patients of their personal information secure. The key steps to achieving data security in healthcare organizations is to following policies and procedure, conduct audit trails, data classification, data protection, encryption and disaster recovery/business continuity.…

    • 1491 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Wager, K. A., Wickham Lee, F., & Glaser, J. P. (2009). Health Care Information Systems: A Practical Approach for Health Care Management (2nd ed.). Retrieved from The University of Phoenix eBook Collection database.…

    • 850 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Wager, K. A., Lee, F. W., & Glaser, J. P. (2009). Health care information systems: A…

    • 1106 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Wager, K. A., Lee, F. W., Glaser, J. P., & Burns, L. R. (2009). Introduction to Health Care Information. In J. Wiley (Ed.), Health Care Information Systems. A Practical Approach for Health Care Management (2nd ed., Ch. 1). Retrieved from University of Phoenix eBook Collection…

    • 837 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hipaa Privacy Rule

    • 1821 Words
    • 8 Pages

    Helwig, A. (2002, May). HIPAA primer: What you need to know now? Mdnetguide. Retrieved August 22, 2003, from http://www.mdnetguide.com…

    • 1821 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The Electronic Privacy Information Center (EPIC) was ‘…established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, freedom of expression and constitutional values in the information age.” (EPIC 2003 annual report). EPIC represents the civil liberties of electronic and internet users, individuals whose personal and “Automated health care records” (EPIC 2003 annual report) that are stored and transmitted electronically, and all persons that are affected by the vast electronic information society. The electronic and internet resources that are represented include “data protection, telephone tapping, genetic databases, ID systems and freedom of information laws.” (EPIC 2003 annual report). The primary demographic that EPIC targets are users of the internet and…

    • 1093 Words
    • 5 Pages
    Good Essays
  • Better Essays

    "Fact Sheet 8a: HIPAA Basics: Medical Privacy in the Electronic Age." HIPAA Basics: Medical Privacy in the Electronic Age. N.p., n.d. Web. 02 Jan. 2013.…

    • 1058 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The security and privacy standards have had a major impact on the collection and distribution of information and will continue in the years to come. One of the purposes is to protect individuals from losing their health insurance when leaving and/ or changing jobs and by providing portability. This will also increase the government’s authority over fraud and abuse while the data is transferred from one facility to another. In addition, patients benefited from the ongoing health care management’s promise to provide high quality of care. This is important because there are many risks of security breaches. Hospital staff is being tempted to sell private information and HIPAA helps set standards and the facilities enforce the consequences of breaking the rules. Another advantage for patients is the privilege of accessing their own…

    • 921 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Workplace Application: Provides student with basic knowledge about HIPAA compliance as they apply them within the medical office environment.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nursing Roles and Values

    • 2907 Words
    • 12 Pages

    Position Statement: Role of the Registered Professional Nurse in Ethical Decision-Making. (2005). Retrieved January 20, 2012, from http://www.nysna.org/practice/positions/position6.htm…

    • 2907 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    U. S. Department of Health and Human Services (2014) Health Information Privacy, Retrieved on 1/8/14 from www.hhs.gov/ocr/privacy/hipaa/understanding/training/index.html…

    • 1863 Words
    • 6 Pages
    Better Essays