Preview

Breaching the Security of an Internet Patient Portal

Powerful Essays
Open Document
Open Document
1186 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Breaching the Security of an Internet Patient Portal
NI Topic:

Breaching The Security of An Internet Patient Portal

Nur-531

May 18, 2013

Introduction

Kaiser Permanente is a health system which serves over eight million members in nine states and the District of Columbia. In the 1990’s the KP Northern California region created an Internet Patient Portal known as “Kaiser Permanente Online” (KP Online)(Wager, 2009). KP Online provides members access to request appointments and prescription refills, obtain health information, and receive medical advice from staff. In August 2000, a breach occurred when an Operations technician applied patches to servers in support of a new KP Online pharmacy refill application. Subsequently, the outgoing e-mail function of KP Online failed and created a dead letter file of outbound messages with replies to patient inquiries that contained individually identifiable patient information (Collmann & Cooper, 2007). In trying to clear the e-mail file, a flawed computer script was created that concatenated over 800 individual e-mail messages, which contained personal identifiable. At least nineteen of the e-mails reached their intended destination (Collmann & Cooper, 2007). Two members who received the email messages reported the incident to KP. Kaiser considered the breach was a significant incident due to the number of messages sent. As a result, the company created a crisis team to find the cause of the breach. The Kaiser crisis team notified its members and issued a press release three days after the breach.
Major Issues This case study protected sensitive patient information was comprised during the e-mail security breach. The Kaiser Permanente leadership reacted quickly to mitigate the damage of the breach because the company was non-compliant with good information security practice and regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) which established standards for the



References: American Nurses Association. (2012). ANA Ethics Position Statement Privacy and Confidentiality. Silver Springs, MD: Author. Retrieved May 18, 2013 from ANA website. Collmann, J., & Cooper, T. (2007). Breaching The Security Of The Kaiser Permanente Internet Patient Portal: The Organizational Foundations Of Information Security. Journal of the American Medical Informatics Association, 14(2), 239-243. Harrison J., & Booth N. (2003). Applying new thinking from the linked and emerging fields of digital identity and privacy to information governance in health informatics. Informatics in Primary Care Journal, 11(4), 223-8. Retrieved from CINAHL database. HIPAA FAQs. (2002, August 1). Corporate Responsibility Resources For Businesses And Marketers. Retrieved May 18, 2013, from http://www.dmaresponsibility.org/HIPPA/. Rossel, C. L. (2003). HIPAA: An informatics system perspective, Chart, 100(1). Retrieved May 18, 2013 from CINANL database. Saba, V., & McCormick, K. A. (5th Ed.). (2011). Essentials of Nursing Informatics. Trustworthy Systems for Safe and Private Healthcare (pp. 271-277). New York: McGraw-Hill Companies. Wager, K. A., Lee, F. W., & Glaser, J. (2009). Health care information systems: a practical approach for health care management (2nd ed.). San Francisco, CA: Jossey-Bass.

You May Also Find These Documents Helpful

  • Good Essays

    The medical group could face significant penalties due to security breaches of medical information. Physical safeguards should have been implemented to assure that equipment with electronic information systems that contained patient data are safe from unauthorized intrusion. Technical safeguards cover the electronic protected health information and control access to it. Advocate Medical Group has failed to ensure proper HIPAA policies and procedures were implemented in the…

    • 808 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Wager, K. A., Wickham Lee, F., & Glaser, J. P. (2009). Health Care Information Systems: A Practical Approach for Health Care Management (2nd ed.). Retrieved from The University of Phoenix eBook Collection database.…

    • 850 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    In this week’s assignment, you are asked to research HIPAA and how it has provided…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: Sayles, N. (2013). Health Information Management Technology: An Applied Approach. (4th ed., p. 230)…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Administrators at the University of Colorado found a way to comply HIPAA to protect the integrity of electronic patient records. In addition to meeting the Privacy requirement of HIPAA, they needed a system to deal with their staff of medical professionals who move from computer to computer throughout their shifts. To be better equipped to achieve compliance, the hospital chose to use technology via a…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? ... December 12, 2011, 10:24 am / Leon Rodriguez / Former Director, HHS, Health IT Buzz > Privacy and Security of EHRs > Privacy, Security, and Electronic Health…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Hrm/531 Week 1

    • 2047 Words
    • 9 Pages

    Training sessions will be organized for all employees at least once a year to refresh their knowledge of privacy and security in compliance to with Health Insurance Portability and Accountability Act (HIPAA) rules. HIPAA Privacy and Security Rule set a national standard for the security and privacy of electronic protected health information; and the confidentiality provisions of the Patient Safety Rule. The US Department of Health and Human Services (2010) stated, “the Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization” (¶…

    • 2047 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    In 1996, Health Insurance Portability and Accountability Act (HIPAA) was signed into legislation. HIPAA provides patients with access to their medical records and gives patients more control over the handling and distribution of their personal health information (PHI). HIPAA regulations are extremely important in ensuring the privacy of PHI and helps reduce any fraudulent activity. By fully following HIPAA regulations, healthcare compliant facilities are more likely to save money by avoiding lawsuits and fines. Facilities covered by HIPAA are required to implement safeguards (both physical and technical) to protect the confidentiality and integrity of the patient’s health information.…

    • 260 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Wager, K.A., Lee, F.W., & Glaser, J.P. (2009). Health Care Information Systems. A Practical Approach for Health Care Management (2nd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx.…

    • 873 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Over the years since the inception of HIPAA, it is hard not to notice the influence it brought on to the patients, the healthcare industry, the health information management and technology, and other entities in securing the confidentiality, security, and privacy of PHI. In addition, the HITECH Act and its HIPAA modification released in January 2013 greatly invigorated the HIPAA of 1996 (Solove, 2013). Definitely, the most important health care changes over the past couple of decades is the growing interest in health information privacy and security (Solove, 2013).…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    On April 14, 2003 the Health Insurance portability and Accountability Act of 1996 (HIPAA) took effect, and these federal regulation have had an impact on the field of healthcare. It affords certain protections to persons covered by health care plans, including continuity of coverage when changing jobs, standards for electronic health care transactions, and primary safeguards for the privacy of individually identifiable patient information. Protecting healthcare information is the key essential in a healthcare organization. In an Internet video, Barclay (2010) states it is imperative that all healthcare providers be knowledgeable about the HIPAA standards and protect the rights of patients and residents. However, patients also have the responsibilities to give accurate information about their condition and to participate in treatment and care. With that being said the doctrine of informed consent allows patients full disclosure to make a knowledgeable decision about their care. Failure of patient confidentiality gives rise to legal liability. Identifying different forms of security breaches and creating measures to safeguards standards, procedure and policies against leaking personal health information (PHI) will maintain and promote growth of an organization.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Prior to the Information Age, medical records were all stored in folders in secure filing cabinets at doctor’s offices, hospitals, or health departments. The information within the folders was confidential, and shared solely amongst the patient and physician. Today these files are fragmented across multiple treatment sites due to the branching out of specialty centers such as urgent care centers, magnetic resonance imaging, outpatient surgical centers, and other diagnostic centers. Today’s ability to store medical records electronically has made it possible to easily send these files from one location to another. However, the same technology which can unify the fragmented pieces of a patient’s medical record has the ability to also create a path for privacy and security breaches. This paper will examine how electronic medical records are used, how they are secured, how security is enforced, and what the consequences of security breaches are.…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Powerful Essays

    Medical records consist of private health information that should remain private unless direct written consent is given by the patient. Information technological advances are coming at a rapid pace and the laws designated to protecting the patient 's right to privacy are being surpassed. It is then the responsibility of the healthcare provider to ensure that he or she is doing whatever necessary to protect the patient. It is the responsibility of the healthcare manager to ensure that all staff members are properly trained to handle the PHI that they have access to. All healthcare organizations should take steps to ensure that their organization is doing all that they can to be compliant with guidelines that are stated within federal and state laws, including using safeguards and implementing a formal information management plan. After all, the patient should be comfortable and able to trust those providing healthcare services to him or her enough to provide all pertinent information to be properly diagnosed and treated.…

    • 1410 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    According to the Medical Device Daily 80% of healthcare organizations surveyed admitted to at least one incident of lost or stolen electronic health information in the past year and 4% had more than five patient data breaches (YOFFEE, LYNN_. Medical Device Daily_, 10/26/2009, Vol. 13 Issue 206, p1-8, 2p).…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Electronic Privacy Information Center (EPIC) was ‘…established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, freedom of expression and constitutional values in the information age.” (EPIC 2003 annual report). EPIC represents the civil liberties of electronic and internet users, individuals whose personal and “Automated health care records” (EPIC 2003 annual report) that are stored and transmitted electronically, and all persons that are affected by the vast electronic information society. The electronic and internet resources that are represented include “data protection, telephone tapping, genetic databases, ID systems and freedom of information laws.” (EPIC 2003 annual report). The primary demographic that EPIC targets are users of the internet and…

    • 1093 Words
    • 5 Pages
    Good Essays