June 5, 2012
Healthcare Data Breach
In this webinar, learn the critical moments and decisions that can occur in a health organization immediately after a data breach has occurred. We discuss an identity theft scenario from a rogue employee with authorized access to systems containing PHI.
Identity theft and medical identity are typical privacy and security dilemmas for healthcare organizations. We will look at common data breach facts, key players, explore the crisis management activities and address some of the defining moments that potentially impacted the outcome of the events.
Healthcare organizations have unique vulnerabilities to data breaches given the predominance of sensitive data and widespread access to support care-providing functions. Cybercrime schemes prey on these vulnerabilities. Many organizations invest in data breach detection only as an outcome of a breach. This post-breach manual review of audit logs is time-consuming and suspect to error.