Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday May 09 2014, @01:33PM   Printer-friendly
from the first-do-no-harm dept.

An inadvertent data leak that stemmed from a physician's attempt to reconfigure a server cost New York Presbyterian Hospital and Columbia University Medical Center $4.8 million to settle with the U.S. Department of Health and Human Services (HHS). The hospitals and HHS announced the voluntary settlement, which ends an inquiry into the incident, on Wednesday.

From the article:

The breach occurred in 2010 after a physician at Columbia University Medical Center attempted to "deactivate" a personally owned computer from an New York Presbyterian network segment that contained sensitive patient health information, according to the HHS.

In a joint statement, the two hospitals blamed the leakage on an "errantly configured" computer server. The error left patient status, vital signs, laboratory results, medication information, and other sensitive data on about 6,800 individuals accessible to all via the Web.

New York Presbyterian will pay $3.3 million, while Columbia will pay $1.5 million to settle the complaint. The hospitals also agreed to take "substantive" corrective action, including development of a new risk management plan and new policies and procedures for handling patient data. HHS will also be provided with periodic progress updates under the agreement.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by starcraftsicko on Friday May 09 2014, @06:10PM

    by starcraftsicko (2821) on Friday May 09 2014, @06:10PM (#41338) Journal

    In the end, I would think it would have to be a targeted attack against the doctor for the right person to get the information.

    Possible, but not necessary.

    Never attribute to malice that which is adequately explained by stupidity.

    Again, assume that IIS is running unsecured on a windows machine with a disabled firewall located on a public ipv4 IP (like you would have if you plug to a cable modem directly, for example). It is plausible that a crawler/search engine would try to index http://aaa.bbb.ccc.ddd/ [ccc.ddd].

    If directory listing is permitted... then almost anything could be indexed -- patient notes, test reports, images...

    Even if it isn't, if someone created a helpful 404 error page with a relative link back to an appropriate menu or start location, information could be innocently revealed...

    And I haven't seen too many robots.txt files set up for intranet services. Google and it's honest competitors wouldn't even have to be evil to index the site.

    --
    This post was created with recycled electrons.
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by Woods on Friday May 09 2014, @06:43PM

    by Woods (2726) <woods12@gmail.com> on Friday May 09 2014, @06:43PM (#41348) Journal

    Dang son, that is some smart thinking. Whoever you work for needs to give you a raise, and I should be embarrassed for not being able to come up with that.

    I can definitely attest to people just plugging things in wherever they go. Too many times have I seen someone bring in a router from home, plug it in to the network, and bring the company to its knees instantly.