Touchstone Medical Imaging to pay $3 million settlement for security breach

Huge Two-Day Clean Sweep Auction July 24-25th. Click Here to Bid!

advertisement
Current Location:
>
> This Story


Log in or Register to rate this News Story
Forward Printable StoryPrint Comment
advertisement

 

advertisement

 

U.S. Healthcare Homepage

Rising workloads and technology are main causes of clinician burnout Called a 'public health crisis' by 92 percent of survey respondents

Providers in need of more specialists, fewer primary care physicians, says report Facing projected shortage in a number of specialties

Claims data will power new research initiative developing predictive models to fight opioid crisis Understanding risk factors and addressing them

Consumer experience is top priority for 69 percent of US hospitals: survey Trend reflects growing patient burden in paying for services

SIIM spotlights gender parity challenges in imaging informatics Leveling the playing field and fighting Imposter Syndrome

Hahnemann hospital ownership files for bankruptcy protection 'Safety net' hospital faces closure that could highly impact lower income patients

Admittance for radiology residencies based on looks, says study Discriminates against obese or unattractive candidates

Office manager for radiology practice sentenced to five years for fraud Arranged kickbacks in exchange for patient referrals

Focusing on safety during labor and delivery drives consumer choice Bringing a competitive advantage to your hospital

Rethinking training and education for the future of medicine at SNMMI Discussing innovations and efforts of SNMMI Technologist Section

Touchstone Medical Imaging to pay $3 million settlement for security breach

by John R. Fischer , Staff Reporter
A medical imaging service provider in Tennessee has agreed to pay $3 million to the Office of Civil Rights (OCR) at the U.S. Department of Health and Human Services as a settlement for a security breach that exposed the protected health information of more than 300,000 patients.

The result of an FTP server providing uncontrolled access to patients’ personal health information, the breach at Touchstone Medical Imaging led to the leaking of names, birth dates, social security numbers, and addresses among other information. The details were accessed and indexed by search engines, and remained on the internet even after the server was taken offline.

Story Continues Below Advertisement

New & Refurbished C-Arm Systems. Call 702.384.0085 Today!

KenQuest provides all major brands of surgical c-arms (new and refurbished) and carries a large inventory for purchase or rent. With over 20 years in the medical equipment business we can help you fulfill your equipment needs



“This information in the wrong hands could lead to identity theft, credit fraud, medical fraud, targeted phishing and a number of other attacks that take advantage of personal information,” Mac McMillan, CEO and president at cybersecurity consulting firm CynergisTek, told HCB News. “Moving forward, improving basic cyber hygiene, testing and monitoring their systems proactively will help to avoid this type of misstep. Improving incident response to include relations with Federal authorities trying to help you will also help mitigate risk.”

Notified by the FBI of the breach in May 2014, as well as OCR, Touchstone initially claimed that no patient PHI was exposed, only to later admit that the information of more than 300,000 patients was breached.

An investigation by OCR found that Touchstone waited several months to investigate after being notified of the breach by both the FBI and OCR, preventing patients from being alerted in a timely manner. It also discovered that the Franklin-based practice failed to conduct accurate and thorough risk analyses for potential risks and vulnerabilities within the confidentiality, integrity and availability of its electronic PHI, and that it did not have business associate agreements set up with its vendors, including its IT support vendor and a third-party data center provider, as required by HIPAA.

“Basically, Touchstone failed in its responsibility to understand its risk from its supply chain partners and their partners, which is not uncommon in healthcare. Simply having a business associate agreement is only the first step,” said McMillan. “Organizations need to articulate security requirements in contract documents, perform pre- and post-security reviews, and require vendors to provide updates when anything changes that could impact the security of their data. That includes downstream subcontractors to their supply chain partner.”
  Pages: 1 - 2 >>

U.S. Healthcare Homepage


You Must Be Logged In To Post A Comment