Avmed: Forensic Analysis

Improved Essays
In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.

Customers filed lawsuits claiming negligence and breach of contract due to their failure to properly protect the data of customers

Related Documents

  • Improved Essays

    These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members.” The information that was hacked included: names, date of birth, social security numbers, medical ID numbers, street and e-mail addresses, employment and income information. No medical information was stolen, so this case was not ruled by Health Insurance Portability and Accountability Act (HIPAA). The investigation revealed the hackers used the computer…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Telichia Johnson HIMS 417 March 07, 2015 Summary: Redefining HIM Privacy and Security Role In the article “Redefining Health Information Management Privacy and Security Role,” the authors report on the historical role of the Health Information Management (HIM) professional in privacy and security, several evolutionary changes, and the need to extend access to patient information beyond normal patient care. In a period of constantly changing regulations and continual evolutions in technology, the Health Information Management profession’s roles and responsibilities will have to be extended to meet industry demand, and more reliance on Health Information Technology (HIT) to process and manage data and information. A more increased role…

    • 371 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    DEA Forensic Analysis

    • 525 Words
    • 3 Pages

    At times, there are certain cases where investigators run into dead ends or obstacles depending on the circumstances at hand. As in this case of the kidnapping and murder of special agent Enrique Camarena and Captain Alfredo Zavala, the DEA and forensic investigators faced many hurdles. The processing of significant evidence was constantly put to a halt. The DEA and investigators were unable to do things in the way that they wanted to. This put them through many challenges and hurdles in the investigative process.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the use of EHRs, protected health information is portable and accessible to numerous organiztions and providers, which raises questions of ownership and the healthcare provider’s responsibility to prevent security breaches. Additionally, EPs are responsible for informing patients of any data comprises or breaches. There have been instances of EHR vendors selling unidentifiable copies of patient records to pharmaceutical companies, as well as medical device makers and researchers. However, other data sources can be used to render unidentifiable records, identifiable. Ethics questions arise with the buying and selling of patient health information.…

    • 1424 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Problem Statement: Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”.…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A breach is a breach, no matter how insignificant the incident. A myriad of scenarios available by patient data includes identity theft to the sales of patient info for medical and pharmaceutical purposes. Upon further investigation regarding various breaches in data, the numbers are shocking. Moreover, while every individual affected by the breach was not maliciously targeted, the fact remains that the information is/was unsecured in some form or fashion. The table listed below represents the percentage of individuals affected by a breach incident reporting 500 or more in the last 12 months (U.S. Department of Health & Human Services,…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Vulnerable Password Effect on HIPAA Introduction The University of Mississippi Medical Center suffered from multiple HIPAA violations. An unofficial visitor to their campus had stolen one of their laptops, and due to the fact that UMMC’s network was unprotected because they used a universal username and password. The active directory containing 67,000 files was exposed to danger! There was an estimation of 10,000 patients files dating back to 2008 and he optical character recognition affirms that the university failed to disclose the individuals whose ePHI was believed to have been accessed.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HIPAA Compliance Essay

    • 466 Words
    • 2 Pages

    conflicted with certain practices in health care settings; for instance, third party businesses needing access to personal medical records for the purposes of treatment, payment, and operations (Solove, 2013). Another unintended issue that HIPAA’s implementation stirred was the belief that it would bankrupt the industry. Investment in new health information security systems were deemed by government officials along with health care providers as a costly endeavor, and with the stipulation of financial penalties as a consequence for not obtaining such technology, this would ultimately lead to the bankruptcy of the U.S. health care industry (Solove, 2013). An additional unintended outcome of the implementation of HIPAA, was the denial of access of PHI for consumers. Before the modification of the privacy rule, there were instances of patients, caregivers, and others being denied access to their PHI to the justification of abiding by privacy rules (Solove, 2014).…

    • 466 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Health Insurance Probability and Accountability Act (HIPAA) was enacted by Congress in 1996 in response to the infancy of health information technology and the modern flow of health information. The initial focus of the HIPAA was to protect health insurance coverage for workers and their families if they were to lose or change their jobs (Bowers, 2001) but, as technology continued to advance laws were also developed to protect patient information as it passed through a full spectrum of patient care. HIPAA rules was the first effort to standardize the flow of data by, “encouraging electronic transactions as a primary means to conduct business in an effort to also reduce cost and improve efficiency” (Bowers, 2001). HIPAA Privacy Rule…

    • 718 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Patients trust health care professionals and providers protect their medical information. Developments in technology allow for easier utilization and access to health records through electronic portals for patients and physicians. Laws such as the Health Information Accountability Act sets standards that health care providers must follow to ensure patient privacy. The purpose of this paper is to describe the Electronic Health Record (EHR) mandate and discuss how the Cleveland Clinic has implemented the EHR. In addition to explaining how meaningful use and what the Health Information Accountability Act (HIPAA) is and how violating the law can threatens patient confidentiality.…

    • 977 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Fire scenes are different than the regular crime scenes because as for the evidence of a fire scene was most likely destroyed or burned, the person who committed the crime does not usually the crime scene. This makes it a little more difficult to piece together the suspect and convict someone of their crimes. 2. The blast effect is what happens when a rush of gasses from the source of the bomb blows outward.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hi Everyone, This is a great discussion on a very contemporary problem that will continue to be an issue in this information age. Take HIPAA out of the equation for a moment, every person has so much personal information in various computer systems, we don’t even know the extent of it all. For instance, to name a few computer databases a nursing professional’s information resides are the Board of Nursing for every state he/she is licensed in, any professional organization he/she is certified through, and professional/trade association he/she is active in as a board member/committee chair.…

    • 356 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays