Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Data privacy lawsuits explode in healthcare, tech sectors

By Ian Cohen
doctor uses computer

Image from Unsplash

November 14, 2022

For all the time cybersecurity leaders have spent protecting data at rest and creating consent processes for the data that websites collect, a recent spate of lawsuits focus attention on an entirely different part of the tech stack — the data that websites collect, and more specifically, how this data is collected from users’ browsers.

Tracking the web trackers has been a blind spot for many companies. Gaining access just to see the full extent of what’s happening between third parties and users’ browsers is hard enough; monitoring and protecting this vastly expanded attack surface requires new tools and a new outlook altogether.

When does this tracking cross the line and become actionable? Three recent lawsuits are helping security executives and privacy experts to answer that question.

In June 2022, Meta was sued for violating patient privacy with its data tracking pixel. Marketers use the pixel to hone and track the effectiveness of ad campaigns, but when this tracker starts inadvertently collecting data about medical symptoms or medications, the stakes are raised. The suit claims the Meta pixel is sharing protected health information (PHI) with Facebook without patient permission, which is a HIPAA violation. A related lawsuit was then filed on July 25, 2022 against the University of California San Francisco Medical Center and Dignity Health, since they served the Meta pixel that shared the information. While it’s likely that these hospitals didn’t know the extent of what the pixel was doing, that’s really the problem. The extent of what third-party trackers can do on a company’s behalf is out of control.

Then a claim against Oracle, a registered data broker, was made claiming the company is tracking and monitoring more than 4.5 billion people. The issue at hand is the use of “proxies” to track sensitive data that advertisers have agreed not to track. Then a month later, several lawsuits emerged related to session recording tools and their violation of a number of state wiretapping and privacy invasion laws. 

Which companies will see lawsuits next?

The common theme in these lawsuits is that third-party trackers have too much access to online users’ data and not enough oversight. Healthcare companies aren’t the only ones who should worry. Financial services, e-commerce and education are all highly-regulated and have consumers that demand privacy, making them likely targets that can learn from these recent actions.

Which other companies are at risk of being sued in similar lawsuits? How best can companies protect themselves from lawsuits and truly protect their users’ personal information online? LOKKER scanned more than 5,000 healthcare and hospital websites and 3,000 financial services websites to determine the extent of these pixels across the internet in these sectors. 


Pixel

Percent of healthcare and hospital websites using

Percent of financial services websites using

Facebook

47%

56%

LinkedIn

20%

34%

Twitter

11%

19%

TikTok

4%

3%

Oracle

12%

13%

 

How to protect users’ personal information

In the short term to avoid a lawsuit, companies need to know exactly what data is being collected from their web visitors and make sure that it’s listed in their privacy policy. The tricky part is that many of these third-party scripts are built using other third-party software themselves, so the oversharing grows exponentially and it’s increasingly difficult to manage. On average, more than 70% of the code loaded into the browser is coming from a third party, rather than from the sites users visit.

A long-term solution to this data privacy issue is to stop focusing on just complying, and instead focus on protecting. Organizations need better tools to use throughout the software development lifecycle. They need tools that provide complete visibility and control over unauthorized data collection as the default state, without impacting the user experience.

Organizations should have an inventory of all the third-party trackers on the website so that they can easily compare it to what’s disclosed in their company’s privacy policy and proactively block data from being shared with apps that have no business getting a copy of user data.

KEYWORDS: compliance cyber security legislation data management data privacy healthcare cybersecurity lawsuit pixel

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ian Cohen is the CEO and Founder of LOKKER.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-protection-freepik1170x658v504.jpg

    Data privacy is a challenge. Tech leaders have the solution

    See More
  • Stethoscope by laptop

    29 Years of HIPAA: What’s Next for Healthcare Data Privacy?

    See More
  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing