Digital Health Records May Increase Identity Theft

President Obama has proposed sweeping reform of the nation's healthcare system and said he believes all medical records should be computerized and standardized within five years. The President hopes this will result in increased quality of care, decreased costs, and creation of thousands of new jobs. Todd Feinman, a published security expert and CEO of Identity Finder , cautions, however, that electronic medical records add higher risk of identity theft unless they are carefully protected. "The HIPAA Privacy rules have only been around for a couple of years; many healthcare providers are still unprepared to protect patients' personally identifiable information (PII), which if stolen could lead to identity fraud." Feinman discusses below the special HIPAA compliance initiative his firm has enacted to ensure electronic patient health information (ePHI) is protected.

In 2006, the Health and Human Services issued final ruling regarding HIPAA enforcement and set civil money penalties for violating HIPAA rules. These regulatory requirements call for organizations to proactively protect patient health information, but still too often PHI ends up unprotected in a spreadsheet on a nurse's computer. "If healthcare providers have a security breach, not only would that be a violation of patients' privacy, but also the associated costs would be dramatically higher than implementing some simple, preventive measures," says Feinman. The upcoming changes by the Obama Administration could make organizations' exposure of PHI even worse.

Feinman's company, Identity Finder, has developed software that searches for and secures PHI, the type of sensitive information specifically referred to by HIPAA privacy legislation. Many healthcare providers and healthcare payers are now cleaning PHI from computers using Identity Finder. Wayne Martin, Information Security Officer at University of Virginia's Health System, had the following to say, "Identity Finder helps us locate patient health information so that we can protect it at the source and educate users on the proper handling of information in accordance with University, State, and Federal policies."

Identity Finder has taken a groundbreaking approach by giving organizations insight into the root cause of the problem. Most organizations don't even know where their PHI is. "Not only do we help organizations find and protect PHI, but we also give them the ability to monitor how much exposure the organization has to unsecured PHI so they can prevent data leakage issues." Feinman's engineers have spent years developing proprietary search algorithms to find confidential personal information quickly and accurately.

The software automatically finds PHI such as social security numbers, medical record numbers, dates of birth, driver licenses, personal addresses, and other private data within files, e-mails, databases, websites, and system areas. Once found, the software makes it simple for users or administrators to permanently shred, scrub, or secure the information. Their recently released management console aggregates the data and provides a report card for organizations to see how their policies are performing.

Identity Finder can be run centrally by administrators or stand-alone on a PC or Mac by data owners. For this reason, Identity Finder is an ideal fit for both smaller and larger healthcare providers and payers, as well as other organizations who want to minimize their risks and prevent confidential data loss.

 

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.