Literature DB >> 29461854

Data breach locations, types, and associated characteristics among US hospitals.

Meghan Hufstader Gabriel1, Alice Noblin, Ashley Rutherford, Amanda Walden, Kendall Cortelyou-Ward.   

Abstract

OBJECTIVES: The objectives of this study were to describe the locations in hospitals where data are breached, the types of breaches that occur most often at hospitals, and hospital characteristics, including health information technology (IT) sophistication and biometric security capabilities, that may be predicting factors of large data breaches that affect 500 or more patients. STUDY
DESIGN: The Office of Civil Rights breach data from healthcare providers regarding breaches that affected 500 or more individuals from 2009 to 2016 were linked with hospital characteristics from the Health Information Management Systems Society and the American Hospital Association Health IT Supplement databases.
METHODS: Descriptive statistics were used to characterize hospitals with and without breaches, data breach type, and location/mode of data breaches in hospitals. Multivariate logistic regression analysis explored hospital characteristics that were predicting factors of a data breach affecting at least 500 patients, including area characteristics, region, health system membership, size, type, biometric security use, health IT sophistication, and ownership.
RESULTS: Of all types of healthcare providers, hospitals accounted for approximately one-third of all data breaches and hospital breaches affected the largest number of individuals. Paper and films were the most frequent location of breached data, occurring in 65 hospitals during the study period, whereas network servers were the least common location but their breaches affected the most patients overall. Adjusted multivariate results showed significant associations among data breach occurrences and some hospital characteristics, including type and size, but not others, including health IT sophistication or biometric use for security.
CONCLUSIONS: Hospitals should conduct routine audits to allow them to see their vulnerabilities before a breach occurs. Additionally, information security systems should be implemented concurrently with health information technologies. Improving access control and prioritizing patient privacy will be important steps in minimizing future breaches.

Entities:  

Mesh:

Year:  2018        PMID: 29461854

Source DB:  PubMed          Journal:  Am J Manag Care        ISSN: 1088-0224            Impact factor:   2.229


  5 in total

1.  Privacy Officers: Who They are and Where They Work.

Authors:  Amanda Walden; Kendall Cortelyou-Ward; Alice Noblin
Journal:  Perspect Health Inf Manag       Date:  2021-03-15

2.  Trends and characteristics of protected health information breaches in the United States.

Authors:  Md Mahbub Hossain; Y Alicia Hong
Journal:  AMIA Annu Symp Proc       Date:  2020-03-04

3.  Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities.

Authors:  Dari Alhuwail; Eiman Al-Jafar; Yousef Abdulsalam; Shaikha AlDuaij
Journal:  Appl Clin Inform       Date:  2021-09-29       Impact factor: 2.762

4.  Data breach remediation efforts and their implications for hospital quality.

Authors:  Sung J Choi; M Eric Johnson; Christoph U Lehmann
Journal:  Health Serv Res       Date:  2019-10       Impact factor: 3.402

5.  Assessment of a Mobile Health iPhone App for Semiautomated Self-management of Chronic Recurrent Medical Conditions Using an N-of-1 Trial Framework: Feasibility Pilot Study.

Authors:  Archana Mande; Susan L Moore; Farnoush Banaei-Kashani; Benjamin Echalier; Sheana Bull; Michael A Rosenberg
Journal:  JMIR Form Res       Date:  2022-04-12
  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.