Preview

Health Data Security Breach Case Study

Better Essays
Open Document
Open Document
1109 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Health Data Security Breach Case Study
Utah Department of Health Data Security Breach

September 12, 2013
Accounting Information Systems

Utah Department of Health Data Security Breach
Introduction
On March 10, 2012, thousands of people fell victim to having their social security numbers, birthdays, names, addresses, and even their medical diagnosis stolen by computer hackers. On April 2, 2012, the breach was realized and 780,000 people learned that their identities were stolen and would now need to monitor their credit. Computer and internet fraud is defined by the federal law as “the use of a computer to create a dishonest misrepresentation of fact as an attempt to induce another to do or refrain from doing something which causes loss” (www.law.cornell.edu).
…show more content…
A technician had placed the server online and neglected to change the factory password which was “password1,” the most common default password on the internet. Some of the victims whose identities were stolen were Medicaid recipients, but some were also privately insured, uninsured, and retirees whose information was sent to the Medicaid program in hopes of receiving their benefits. This case fits the profile of computer and internet fraud cases all over the world. Hackers gain access to databases that contain social security numbers and credit card or bank account numbers and then will most likely turn around and sell them to people who will ultimately use them for monetary gain. One way these hackers differ from other hackers is that they attacked already low-income individuals whereas most hackers will target wealthy individuals, large corporations, or small businesses. Wealthy people are targeted because they may not notice money missing right away or they will have other people controlling their accounts which makes it more difficult to notice missing information. In the Utah Department of Health data security breach, the hackers were able to steal information over a three day period before it was noticed and then the server was shut down. This is one of the many reasons that cyber-crime has become increasingly popular; because so much …show more content…
They are: perceived financial need, perceived opportunity, and rationalization. Together, these elements allow someone to commit, conceal, and convert fraud. In the data breach we’ve been discussing, the hackers had all three elements; they had a need or a reason to steal the private information, they had the opportunity to hack into the system when the technician neglected to change the default password, and they were able to rationalize it by saying that the state would have to protect all of the victims since it was their system that was compromised and it was their fault they didn’t change the password. Most of the time, if all three of these elements are not present, it is very difficult for someone to commit the fraud. For example, there may be the opportunity, but there is no reason to do it. Or, there is a reason to do it, but there is no

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Au2 Question 4 Assignment 4

    • 5257 Words
    • 22 Pages

    The three conditions of fraud referred to as the “fraud triangle” are (1) Incentives/Pressures; (2) Opportunities; and (3) Attitudes/Rationalization. Incentives/Pressures are incentives of management or other employees to commit fraud. Opportunities are circumstances that allow management or employees to commit fraud. Attitudes/Rationalization are indications that an attitude, character, or set of ethical values exist that allow management or employees to commit a dishonest act or they are in an environment that imposes sufficient pressure that causes them to rationalize committing a dishonest act.…

    • 5257 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    To date this is no evidence of any abuse of information from the stolen hard drives as indicated by BCBST. The organizations’ reaction incorporated the encryption of all of its information and additional examinations. Tena Roberson, security officer for BlueCross stated in an announcement, “since the burglary, we have worked industriously to restore the trust of our partners by showing that we are restricting the dangers from this wrong doing and making critical ventures to guarantee that their data is protected at all times,” this was announced to HC…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    This case study protected sensitive patient information was comprised during the e-mail security breach. The Kaiser Permanente leadership reacted quickly to mitigate the damage of the breach because the company was non-compliant with good information security practice and regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) which established standards for the…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The Target data breach is a very good example of the risks of using single level/layer defense strategies for information security in an organization. In fact, it taught us and the organizations in the information security industry a very valuable lesson as to how important is it to employ strategies like Defense in Depth, Critical Controls etc., Below is a brief summary of steps that can be taken to avoid such attacks. I've included the chain of different events that led to the Target Data breach and the Countermeasures/controls that could be put in place to counter and/or avoid such events/attacks.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Sharing healthcare data from one institution to another has been a complex task due to privacy concerns and fear that sharing information will give others a competitive advantage. Today’s electronic medical records (EMRs) have varying data standards that inhibit interoperability since records are not compatible between systems. Inconsistent rules and permissions prohibit health organizations from accessing real-time patient data.…

    • 1146 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The responsibility of Dr. Bob first and foremost is to save the life of the patient, which is Sally. Doctor Bob must also be aware of his legal responsibility. Among the Doctor Bob’s legal obligations in the case of operating on a minor is the issue of informed consent. Sally being a minor, Dr. Bob must seek her parents’ consent before he starts her surgery. In order for Sally’s parents’ to give informed consent, Dr. Bob is legally obligated to discuss the operation and also go over the risks and benefits. If after hearing what Dr. Bob discusses and agrees to the operation, they have given their “informed consent”. If Sally’s parents were unavailable to give informed consent, Dr. Bob should give whatever treatment is necessary to save her life according to the Hippocratic Oath.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Health record breach violations are an ethical issue facing healthcare. In the article from the Journal of AHIMA titled “Reports Pour in under CA’s New Privacy Laws,” the writer Chris Dimick discusses record breach violations. Reports have been pouring into the California Department of Public Health since the state began requiring healthcare entities to report all incidents of unauthorized record access.( Journal of AHIMA, 2009/07). According to the article the law took effect January 1, 2009, that requires the healthcare entities in California to report all incidents of unauthorized record access. According to the California Law unauthorized access of patient’s records are to be…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identity theft is an important crime in society today and it needs to be heavily enforced and prosecuted. According to Transunion.com, As of 2015, 9.9 million Americans are victims of identity theft, with an incident happening on average every 19 seconds. This proves just how important of a crime identity theft is and that it should be better protected and have harsher consequences. The legal definition of identity theft according to Dakota Family Bank and Foundations of Computer Society is “the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.” Identity theft is in relation to the crime of stealing as if someone is committing Identity Theft, then they are taking the name of someone…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    Identity theft is a serious problem that has been happening for a very long period of time. In America there are over 9 million victims of identity theft that takes place every year. Research shows Nine out of ten American homeowners have concerns about becoming victims of identity theft. This is the most rapid growing type of fraud in the country, yet virtually two-thirds are hesitant whether their insurance policy is able to protect them financially if this crime were to occur. A vast proportion of 83 percent believe the government should seize action to help prevent identity theft. (WWW.SSA.GOV, 2009)…

    • 2587 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Morton, Heather "Identity Thieves: Let 's Catch Them If We Can." State Legislatures (2004). Academic Search Premier. EBSCO. Web. 21 Sept.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays