Digital Health Records May Increase Identity Theft

President Obama has proposed sweeping reform of the nation's healthcare system and said he believes all medical records should be computerized and standardized within five years. The President hopes this will result in increased quality of care, decreased costs, and creation of thousands of new jobs. Todd Feinman, a published security expert and CEO of Identity Finder , cautions, however, that electronic medical records add higher risk of identity theft unless they are carefully protected. "The HIPAA Privacy rules have only been around for a couple of years; many healthcare providers are still unprepared to protect patients' personally identifiable information (PII), which if stolen could lead to identity fraud." Feinman discusses below the special HIPAA compliance initiative his firm has enacted to ensure electronic patient health information (ePHI) is protected.

In 2006, the Health and Human Services issued final ruling regarding HIPAA enforcement and set civil money penalties for violating HIPAA rules. These regulatory requirements call for organizations to proactively protect patient health information, but still too often PHI ends up unprotected in a spreadsheet on a nurse's computer. "If healthcare providers have a security breach, not only would that be a violation of patients' privacy, but also the associated costs would be dramatically higher than implementing some simple, preventive measures," says Feinman. The upcoming changes by the Obama Administration could make organizations' exposure of PHI even worse.

Feinman's company, Identity Finder, has developed software that searches for and secures PHI, the type of sensitive information specifically referred to by HIPAA privacy legislation. Many healthcare providers and healthcare payers are now cleaning PHI from computers using Identity Finder. Wayne Martin, Information Security Officer at University of Virginia's Health System, had the following to say, "Identity Finder helps us locate patient health information so that we can protect it at the source and educate users on the proper handling of information in accordance with University, State, and Federal policies."

Identity Finder has taken a groundbreaking approach by giving organizations insight into the root cause of the problem. Most organizations don't even know where their PHI is. "Not only do we help organizations find and protect PHI, but we also give them the ability to monitor how much exposure the organization has to unsecured PHI so they can prevent data leakage issues." Feinman's engineers have spent years developing proprietary search algorithms to find confidential personal information quickly and accurately.

The software automatically finds PHI such as social security numbers, medical record numbers, dates of birth, driver licenses, personal addresses, and other private data within files, e-mails, databases, websites, and system areas. Once found, the software makes it simple for users or administrators to permanently shred, scrub, or secure the information. Their recently released management console aggregates the data and provides a report card for organizations to see how their policies are performing.

Identity Finder can be run centrally by administrators or stand-alone on a PC or Mac by data owners. For this reason, Identity Finder is an ideal fit for both smaller and larger healthcare providers and payers, as well as other organizations who want to minimize their risks and prevent confidential data loss.

 

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.