According to the 2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey, sponsored by Intel and supported by the Medical Group Management Association, 33 percent of medical practices said they did not conduct a security risk analysis of their electronic health records, compared with only 14 percent of hospitals. Overall, 75 percent of all respondents did conduct a security risk analysis of their organizations. The survey also found 17 percent of medical practices outsourced their information security function; none of the hospitals outsourced information security. Only 40 percent of medical practices used multiple types of controls to manage data access, compared to more than half of the hospitals surveyed. Medical practices were less likely to report that an instance of medical identity theft had occurred within their organization (17 percent), compared to those working for a hospital (38 percent). Overall, 33 percent of respondents said their organization had at least one known case of medical identity theft. The survey polled 272 healthcare IT and security professionals, with one-quarter of them working for medical practices and the rest working in hospitals.
In unrelated news, An Informatica sponsored study conducted by the Ponemon Institute surveyed 437 senior IT professionals in the financial services industry whose firms have been engaged in application testing and development in order to better understand if the risk of using real data in development is being addressed. An overlooked privacy risk is the vulnerability of personal and business information used for testing and application development. During the test and development phase of new software, real data — including financial records, transactional records, and other personally identifiable information (PII) — is being used by as many as 80 percent of organizations. Further, test environments are less secure because data is exposed to a variety of unauthorized sources, including in-house testing staff, consultants, partners and offshore development personnel. The study found security decision-making may be motivated more by achieving business objectives than by addressing data security risks. Given the potential for heavy fines and penalties, customer churn, reputation damage, and overall costs associated with a data breach, financial services firms should proceed with great caution before outsourcing to third parties. This should include a vigorous evaluation of prospective partners’ security policies and procedures, and implementation of detailed contractual provisions.Comments? Email firstname.lastname@example.org