By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Keeping Patient Data Secure in a Digital World
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Medical Records > Keeping Patient Data Secure in a Digital World
Medical RecordsTechnology

Keeping Patient Data Secure in a Digital World

Dennis Hung
Dennis Hung
Share
5 Min Read
SHARE

Americans have been “vulnerable” to the misuse of their own personal records since the birth of our nation. With the advent of computers and data storage via digital media (e.g., floppies, hard drives, cloud drives, etc.), data security has become more and more difficult to maintain because there is a limited ability to place any “lock” on personal information. This demand for increased data security has now bled into the healthcare industry.

The reported number of medical practices that have been hacked has risen over the past decade. Congress initiated efforts at more comprehensive security when it passed the Health Insurance Portability and Accountability Act (aka “HIPAA”) in 1996 with the purpose of bringing some safety to digital records. Even with legislations in place, however, it is up to the individual doctors and private practice owners to ensure their patients’ confidential information remains secure.

Safety of Medical Data

Healthcare providers must store health records digitally, maintain security, and control access to that information (i.e., assure privacy). HIPAA gives consumers access to their medical records, but limits who else may have access. This is extremely significant since social security numbers, credit card information, bank card payment routing, as well as patient records and related history data may reside in those medical records. A consumer may release medical record information to family and related care-givers, but healthcare providers are legally bound to protect consumer privacy from others, including third-party payers. Unfortunately, malware on our personal devices may compromise that access.

More Read

MiHIN
Improving Michigan Healthcare IT Security
“Generic Medical Devices” FDA Approved Doctor Preferred Orthopedic Implants Made in the USA Costing 50% Less
How the Healthcare Industry Can Win in the Age of Digitization
International Student Design Contest for Medical Technology
Best Technology Devices to help Seniors Age in Place

Protecting Patient Confidential Information

Patients have a number of vehicles for protection from identity theft and privacy of their personal data. Healthcare providers also have several things that they may do to secure patient records, e.g., keep software updated to current standards (meet current “Electronic Data Interchange” standards); utilize encrypted web access with the current standard (currently “https”); control access to all storage apparatus (including who may operate keyboards to access data or websites by continually altering passwords for those users); utilize security measures to identify and limit access to malware; etc. Such organizations as Electronic Frontier Foundation, Fight for the Future, Google, Mozilla, etc. make software available to enhance privacy for individuals and businesses.

An Evolving Problem Beyond HIPAA Data

The data security threat continues to morph. No longer is the focus on home computers. The hacker emphasis now appears to be on companies’ data storage libraries stored in the cloud. We have become a society of myriads and myriads of i-phones, tablets, i-watches, and minicomputers capable of accessing information immediately on a highly mobile basis. “Innocent” websites entice users into a labyrinth of “buttons,” “taskbars,” “games,” etc.

What appears innocent may be a vehicle for planting code within the gadget’s operating system that enables the hacker to gain access to account numbers, passwords, data libraries, businesses, etc. residing on the electronic device. It then becomes easy for the hacker to use this information to access accounts and place similar sleeper programs on a corporate entity’s storage system. Aetna in the healthcare universe and Target in the retail marketplace are examples of the result, major compromises of client data.

Avoiding Potential Cybersecurity Threats

There is a time to seek professional security help. Industry specialist and chief technology officer Hugh Thompson notes, according to Blue Coat, that even “as we sleep, exercise, work and shop with our mobile devices, cyber criminals are waiting to take advantage of the data these devices collect, as evidenced by the types of malware and attacks we’re seeing. … The implications of this nefarious activity certainly carry over to corporate IT as organizations rapidly adopt cloud-based, mobile versions of enterprise applications, opening up another avenue for attackers.”

TAGGED:cyber securityEMR
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

a woman walking on the hallway
6 Easy Healthcare Ways to Sit Less and Move More Every Day
Health
September 9, 2025
Clinical Expertise
Healthcare at a Crossroads: Why Leadership Matters More Than Ever
Global Healthcare
September 9, 2025
travel nurse in north carolina
Balancing Speed and Scope: Choosing the Nursing Degree That Fits Your Goals
Nursing
September 1, 2025
intimacy
How to Keep Intimacy Comfortable as You Age
Relationship and Lifestyle Senior Care
September 1, 2025

You Might also Like

icd 10 delay
BusinessFinanceHealth ReformHospital AdministrationMedical RecordsNewsPolicy & Law

ICD-10 Delay: Does ICD-10 Lack Clinical Value?

April 13, 2014

HIPAA Basics For Licensed Health Care Professionals: Privacy, Security, and Breach Notification Rules

November 16, 2015

FDA Approves First Ever Self Sanitizing Keyboard

January 3, 2012
big data security
eHealthMedical RecordsTechnology

Finding the Solutions to Big Data Security Concerns

November 13, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?