An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives

نویسندگان

  • Khaled El Emam
  • Emilio Neri
  • Elizabeth Jonker
  • Philip Abdel Malik
  • Prajesh Chhanabhai
چکیده

BACKGROUND The public is concerned about the privacy of their health information, especially as more of it is collected, stored, and exchanged electronically. But we do not know the extent of leakage of personal health information (PHI) from data custodians. One form of data leakage is through computer equipment that is sold, donated, lost, or stolen from health care facilities or individuals who work at these facilities. Previous studies have shown that it is possible to get sensitive personal information (PI) from second-hand disk drives. However, there have been no studies investigating the leakage of PHI in this way. OBJECTIVES The aim of the study was to determine the extent to which PHI can be obtained from second-hand computer disk drives. METHODS A list of Canadian vendors selling second-hand computer equipment was constructed, and we systematically went through the shuffled list and attempted to purchase used disk drives from the vendors. Sixty functional disk drives were purchased and analyzed for data remnants containing PHI using computer forensic tools. RESULTS It was possible to recover PI from 65% (95% CI: 52%-76%) of the drives. In total, 10% (95% CI: 5%-20%) had PHI on people other than the owner(s) of the drive, and 8% (95% CI: 7%-24%) had PHI on the owner(s) of the drive. Some of the PHI included very sensitive mental health information on a large number of people. CONCLUSIONS There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hard-drive Disposal and Identity Fraud

A personal computer is often used to store personal information about the user. This information may be intentionally kept by the user or information maybe automatically stored as the result of the user’s activities. In this paper we investigate whether it is possible for identity fraud to occur as a result of post-disposal access to the residual data stored on a personal computer’s hard drive....

متن کامل

توصیف و تحلیل مهارت‌های مدیریت دانش شخصی: مطالعه موردی

The main objective of this study is to describe and analyze personal knowledge management skills among staff of Ferdowsi University of Mashhad. To achieve this goal, the case study research  was used. The study population included all the staff which is permanent post formed expert, which means all the staff except the faculty staff of Ferdowsi University of Mashhad. Data collection was perform...

متن کامل

Hygienic performance evaluation and effect of training in order to confronting with the Covid-19 virus in the metal industries staff

Background and aims: Recently, the respiratory acute syndrome or Covid-19 disease has been become as one of the most important concerns in the national and global level. Covid-19 disease is caused by the virus SARS-CoV-2 or Covid-19. Covid-19 virus is spreading through saliva drops or nasal discharge when coughing or sneezing. Covid-19 disease not only has significantly negative affect on the g...

متن کامل

Assessing medical residents' usage and perceived needs for personal digital assistants

Health care professionals need information delivery tools for accessing information at the point of patient care. Personal digital assistants (PDAs), or hand-held devices demonstrate great promise as point of care information devices. An earlier study [The Constellation Project: experience and evaluation of personal digital assistants in the clinical environment, in: Proceedings of the 19th Ann...

متن کامل

Master Template

PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003 IEEE ■ IEEE SECURITY & PRIVACY 17 A fundamental goal of information security is to design computer systems that prevent the unauthorized disclosure of confidential information. There are many ways to assure this information privacy. One of the oldest and most common techniques is physical isolation: keeping confidential data on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2007