Hospital ER worker fired for allegedly selling patient records

https://www.beckershospitalreview.com/cybersecurity/kings-county-hospital-er-worker-fired-for-allegedly-selling-patient-records.html

Image result for stealing patient records

An employee at Kings County Hospital’s emergency room stole nearly 100 patients’ private information and sold it through an encrypted app on his phone, according to New York Daily News.

Orlando Jemmott, 52, has worked at the city-run Brooklyn hospital for more than 10 years, where he was in charge of charting patient demographic data into the hospital’s computer system. But between December 2014 and April 2015, he allegedly sold patient data to Ron Pruitt, 43, a buyer in Pennsylvania.

FBI agents arrested Mr. Jemmott in February after receiving a tip in June 2017. A tipster told the FBI she had learned two years earlier that Mr. Jemmott was stealing and selling health records.

Hospital officials told the publication that Mr. Jemmott sold the names of 98 patients, and he accessed the private health records of at least 88 of those patients.

Kings County fired Mr. Jemmott in April. He has been negotiating a plea deal with prosecutors since.

“We have zero tolerance for anyone who intentionally violates our patient privacy rules,” Kings County Hospital CEO Sheldon McLeod said in a written statement to the New York Daily News. “The privacy of patient information is an important foundation for the care we provide.”

 

 

THE SCENE OF THE CRIME: WHERE AND HOW HEALTHCARE FRAUD HAPPENS

https://www.healthleadersmedia.com/strategy/scene-crime-where-and-how-healthcare-fraud-happens

Image result for cybersecurity

 

What does cyber fraud look like for a hospital or a healthcare group? Where does it happen, and how can organizations protect themselves? As you assess the security of your organization, here are top trends, emerging threats and things to consider.

1. Don’t forget the basics

As complicated as cyber fraud may seem, don’t forget the basics. The scariest headlines for healthcare executives are about fraudsters using ransomware to shut down a system, as happened to the UK’s National Health Service in 2017. But a breach doesn’t require sophistication. “A lot of cyber fraud continues to be perpetrated via good old-fashioned phishing techniques,” says Charles Alston, Market Executive at Bank of America Merrill Lynch. “Fraudsters send an email that gets them into an organization. Then employees, oftentimes even though thoroughly trained, can make an error in judgment by clicking on a link or responding to a fraudulent email. That one action ends up pulling a thread that creates a system wide problem.”

2. Watch for wire fraud

In addition to straightforward check and ACH fraud, “Healthcare is just as susceptible as any other business to wirefraud,” Alston says. In a wirefraud, the fraudster sends an email to a treasury employee that appears to be from a top-level executive in the organization; often it will be sophisticated enough to mimic the executive’s writing style, or arrive when the exec is at a conference or on vacation, and hard to reach. The message asks the recipient to wire funds to an account—again, presenting it as an emergency or time-sensitive situation. The recipient is reluctant to turn down the request, since it’s coming from management. “People ask, ‘Why would a controller or treasury employee respond to an email like that?’” Alston says. “Well, it appears legitimate, and it’s a rare event; no one has likely seen something like that before.

And once that transfer is executed, the money is gone, because employees hadn’t been trained, or regularly reminded about such types of fraud, and there wasn’t a process in place to handle such situations. These are the situations that training can help avoid.”

3. Monitor for ransomware

Criminals’ use of ransomware is a threat that organizations should consider carefully, and will handle best if well prepared. One of the most effective preparation tools is a tabletop exercise that can walk the organization through a simulated ransomware event.

Doing a simulation can help answer the key questions: Would we be able to identify a situation and stop it? Would we be able to trace where it came from? Do we have all the right disciplines at the table? What kind of communications do we need to let people know what’s happening? Can we get the system back up? Many executives may be tempted to invest in cryptocurrency like Bitcoin, so they’re able to quickly pay in the event of a ransom demand, but should carefully consider whether paying a ransom is the best solution. Lynn Wiatrowski, National Treasury Executive at Bank of America Merrill Lynch suggests that healthcare providers, who often train for emergency medical events and natural disasters, can apply those learnings to handle a cyber fraud event.

4. Tighten provider-insurer connections

The connections between healthcare providers and insurance companies can create cracks where cyber fraud can flourish. “The structure of health insurance involves a lot of transactions and a slow process, a complicated architecture. And there is a lot of money fueling the system,” says Roger Boucher, Market Executive at Bank of America Merrill Lynch. “The process of reimbursement creates a back and forth interaction that the patient never sees; it can be weeks or months of submission, denial, resubmission, correction, denial (again), before the bills are processed. That lag creates a vulnerability. With so much data traveling back and forth, and such delays in payment, crooks find a way to insert themselves in the gap.” He says healthcare providers need to assess, and continually re-assess, the reimbursement process to double check that insurance companies are sending payments to the correct entity

5. Protect patient data

Patient data needs to be protected in as many ways as possible. Not only do healthcare providers need to be cognizant of patient privacy and HIPAA rules, they need to continually remind themselves that patient data is currency for criminals. As patient records are migrated from paper to digital forms, organizations need to be vigilant in keeping track of older records and how they are handled, stored or disposed of. Policies need to be in place to ensure safety, for instance, when employees handle patient data while working at home. Similarly, to keep records safe and up to date, providers need to regularly back up the data contained in their computer systems. Organizations will complain that backing up the database for the entire system is too time-consuming, or creates too much downtime. A solution is to break the data into smaller pieces, backing up a department or a piece at a time.

6. Keep tabs on third-parties

Whether it’s insurance companies, labs, doctors’ offices or other partners, an organization is only as protected as the third parties it works with and shares its computer connections and its data with. “A healthcare organization should be asking, ‘Where is all my data going, and who is keeping an eye on it?” Boucher says.

A strong vendor management program should include regularly checking the data protection policies and cybersecurity procedures of vendors, third-party services and strategic partners to make sure everyone is on the same page. “When contracts are reviewed, there should be an opportunity to build on a security element as well as outline liability of loss, if those items do not already exist,” Alston says.

7. Secure new equipment

The industry has been buzzing about how new products in the internet of things and medical devices are offering new entry points into a healthcare system. “When a hospital is introducing the newest, most sophisticated piece of medical equipment, thoughts are on the difference this new technology will make in patients’ lives, rather than considering that the new technology may also be introducing a cyberthreat,” Wiatrowski says. “It is not second nature to think about who is on the other end of those pieces of equipment, and what entry points may be introduced.”

8. Stay alert for new threats

Finally, remember that the threat environment will continue to evolve. Stay updated on the newest forms of cyberattacks by reading trade publications, attending conferences and webinars to share information with your peers, and comparing notes with your own strategic partners about what they are seeing. Says Alston, “There is a lot more ground to protect if you are in a healthcare organization, and a lot more opportunity for fraud to occur. And it’s hard to stop something if you have never seen it before. That’s why ongoing education and training are so important.”

 

 

University Hospital boss talks changes after nurse arrest, says ‘this will not happen again’

http://www.sltrib.com/news/health/2017/09/04/live-university-hospital-officials-discuss-arrest-of-nurse-who-refused-to-draw-blood/

University Hospital boss talks changes after nurse arrest, says ‘this will not happen again’

Administrators at University Hospital said Monday they have already changed policies so nurses, like the one who was arrested earlier this summer for refusing to draw a patient’s blood, no longer interact with police.

At a news conference Monday, Gordon Crabtree, the interim chief executive officer of University Hospital, said the nurse, Alex Wubbels, upheld hospital policy and patient privacy despite her July 26 arrest.

“Her actions are nothing less than exemplary,” Crabtree said. ”She handled the situation with utmost courage and integrity.”

The Labor Day news conference occurred on the same day Wubbels spoke on the ”TODAY Show.” She said while the discussions she’s had with the Salt Lake City Police Department have been progressive, she released the police body camera video Thursday because she felt University Hospital and the campus police force had not appropriately responded to the episode.

Crabtree took time Monday to praise Wubbels and to describe changes that have been implemented. Crabtree also said the University of Utah’s attorneys are considering whether to take action against Salt Lake City police and Jeff Payne, the detective who arrested Wubbels. Crabtree didn’t elaborate.

“His actions were out of line,” Crabtree said of Payne. “There’s absolutely no tolerance for that kind of behavior in our hospital.”

On July 26, Payne wanted Wubbels to draw the blood of 43-year-old William Gray, who was unconscious after being involved in a fiery crash earlier in the day in Logan. Wubbels refused, citing hospital policy against drawing the blood of someone without that person’s consent or without a warrant for arrest.

Thursday, bodycam video was released of Payne shouting at Wubbels and handcuffing and arresting her on suspicion of obstruction of justice. Police released her after about 20 minutes.

The video went viral and was picked up by many national news outlets. It drew nationwide criticism last week.

Payne has been placed on leave pending an internal investigation by Salt Lake City police and the city’s Civilian Review Board. Salt Lake County’s Unified Police Department has opened a criminal investigation at the request of District Attorney Sim Gill.

Crabtree said the hospital staffers are doing everything in their power to support Wubbels in the aftermath of the arrest.

“We have a traumatized nurse and a traumatized team,” Crabtree said referring to the burn unit.

Wubbels returned to the burn unit about a week-and-a-half after the arrest, said Margaret Pearce, chief of nursing. But her schedule is flexible so that she can take as much time as she needs.

“Alex took the time she needed,” Pearce said. “We’ve been playing it by ear with her.”

Nurses will no longer interact with police, Pearce said. That will be left to hospital administrators.

“We have to make sure this never, ever happens again,” Pearce said. “I was appalled at the events of July 26. She was advocating for the rights of her patient. She did this beautifully.”

The new policy, which was implemented in mid-August, will require police to interact with the hospital supervisor. It also will prevent law enforcement officials from entering the emergency room, burn unit or other patient areas in the hospital.

Crabtree and Pearce said the new policy began to be developed within hours of Wubbels’ arrest.

“As the CEO of this hospital, I take this very seriously,” Crabtree said. “We must stand together and make sure this is what it should be, a place for healing and a place for safety.”

Wubbels and her attorney, Karra Porter, said they released the video because police were not taking the event seriously. Porter has said her client does not necessarily want to file a lawsuit, but wants changes from both the Salt Lake City police force and police and security forces at the University of Utah.

University of Utah Police Chief Dale Brophy took an apologetic tone when he said he didn’t understand the gravity of the incident until he saw the body camera video.

“My reaction changed after viewing the video,” he said. “She shouldn’t have been hauled off in handcuffs.”

Apparently following protocol, two university police or security officers stood by during the arrest. Brophy said all of his officers will get training in de-escalation techniques. It remains unclear, however, whether university police will engage Salt Lake City officers differently in the future.

Nonetheless, Crabtree said that when it comes to University Hospital and its new policy, such an incident cannot take place again.

 

Companies want to Disclose Employee Health Data to Shareholders, and It’s a Bad Idea

https://hbr.org/2016/03/companies-want-to-disclose-employee-health-data-to-shareholders-and-its-a-bad-idea?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+harvardbusiness+%28HBR.org%29

mar16-04-98324660

An industry in turmoil: Poor cyberthreat prep puts patients in danger

http://www.fiercehealthit.com/story/industry-turmoil-poor-cyberthreat-prep-puts-patients-danger/2016-02-24

Study: Hospitals plagued by lack of security funding, personnel, training

FBI v Apple: Is medical records privacy at risk?

http://www.healthcaredive.com/news/fbi-v-apple-is-medical-records-privacy-at-risk/414908/

Justice Scalia’s death leaves healthcare cases in limbo

http://www.modernhealthcare.com/article/20160213/NEWS/302139937?utm_source=modernhealthcare&utm_medium=email&utm_content=20160213-NEWS-302139937&utm_campaign=mh-alert

Justice Antonin Scalia2

 

Should Patients be able to Record Their Surgeries?

Should patients be able to record their surgeries?