Breach Notification , Governance & Risk Management , Incident & Breach Response

IT Misconfiguration Leads to 15 Breach Reports

Letters From Texas Health Resources Hospitals Mailed to Wrong Recipients
IT Misconfiguration Leads to 15 Breach Reports
Texas Health Harris Methodist Hospital Fort Worth is one of 15 hospitals reporting the same data breach.

A misconfigured billing system that caused a mailing mishap affecting nearly 83,000 individuals has prompted Texas Health Resources to file 15 breach reports to federal regulators – one for each hospital involved.

See Also: Why Active Directory (AD) Protection Matters

The healthcare system serves more than 7 million patients in North Texas through a physicians group and 26 hospital locations.

In a statement, Texas Health Resources says that on Aug. 23, it learned that a misconfiguration of its billing system “allowed for patient information to be matched with and sent to the incorrect guarantor” from about July 19 through Sept. 4.

”Texas Health immediately took steps to correct the misconfiguration and began an investigation,” the statement says. “The investigation determined that some billing information may have been mailed to someone other than the patient or their guarantor, which included patient name, account number, service date, name of treating physicians, name of health insurer, amount owed, and in some instances a short description of services rendered.”

Texas Health says it has not seen indication so far that any patient’s information has been misused.

The U.S. Department of Health and Human Services’ Office for Civil Rights HIPAA Breach Reporting Tool website shows that on Oct. 22, Texas Health filed a breach report for each of the 15 hospitals impacted by the mishap, describing it as an “unauthorized access/disclosure” breach.

A total of nearly 83,000 individuals were affected by the Texas Health incident, according to the HHS website, which lists health data breaches affecting 500 or more individuals.

Impacted Facilities

The 15 hospitals impacted by the incident are:

  • Texas Health Harris Methodist Hospital Fort Worth, 15,000 individuals affected;
  • Texas Health Presbyterian Hospital Dallas, 12,400;
  • Texas Health Presbyterian Hospital Plano, 9,700;
  • Texas Health Harris Methodist Hospital Southwest Fort Worth, 7,500;
  • Texas Health Presbyterian Hospital Denton, 6,700;
  • Texas Health Arlington Memorial, 6,200;
  • Texas Health Harris Methodist Hospital Hurst-Euless-Bedford, 4,800;
  • Texas Health Presbyterian Hospital Rockwall, 4,800;
  • Texas Health Harris Methodist Hospital Alliance, 3,800;
  • Texas Health Presbyterian Hospital Allen, 3,000;
  • Texas Health Harris Methodist Hospital Cleburne, 2,700;
  • Texas Health Harris Methodist Hospital Kaufman, 2,200;
  • Texas Health Harris Methodist Hospital Azle, 2,100;
  • Texas Health Harris Methodist Hospital Stephenville, 1,300
  • Texas Health Harris Methodist Southlake, 500.

Same Breach, So Many Reports

So why didn’t Texas Health just file one HIPAA breach report representing all its affected hospitals and patients?

”The decision on the number of breach reports to file is likely based on each incident needing to be acknowledged separately, especially if more than one guarantor is involved,” notes Keith Fricke, principal consultant at tw-Security.

Privacy attorney David Holtzman of the security consultancy CynergisTek offers a similar assessment. “It is not unusual for the components of a large health system to report separately a breach that had a common root cause or was the result of an incident at the hands of a business associate,” he says.

“In this case, it appears that each of the facilities affiliated with Texas Health Resources was a covered entity required to submit its own report of an incident that occurred through managed billing services provided by the system's corporate parent.”

Similar Mishaps

Two of the five largest health data breaches added to the HHS HIPAA breach reporting website so far in 2019 have involved misconfigured IT.

In April, Puerto Rico-based clearinghouse and cloud services provider Inmediata Health Group reported a health data breach impacting nearly 1.6 million individuals involving a misconfigured IT setting that left protected health information viewable via internet search engines.

And a misconfigured database at UW Medicine in Washington state that left data on 974,000 patients exposed on the internet for several weeks.

As for mailing mishaps, one of the most scrutinized recent incidents involved insurer Aetna and a 2017 mailing of letters that exposed HIV-related information of 12,000 health plan members through the envelopes’ clear window. That incident has resulted in Aetna settling a number of lawsuits that have cost the insurer more than $20 million.

Avoiding Problems

So how can organizations avoid breaches tied to IT misconfigurations?

”Changes made to technology settings, especially ones that impact processes involving access to or dissemination of patient information, should undergo more rigorous testing to validate the changes have not created any opportunity for unauthorized access,” Fricke says. “Quality control processes should catch these types of misconfigurations.”

Organizations must take precautions when designing the production and merging of patient contact information with a message containing information about the patient’s health status or treatment, Holtzman notes.

”It is a best practice to develop a quality control checklist to help ensure that the development of the document or electronic communication can be produced in way that protects the confidentiality of the PHI,” he says.

Any data processing in the production of the communication should be checked to ensure the output allows for any PHI to be kept confidential, he adds. A final quality assurance check to physically inspect the communication should also be made to confirm that the communication is going to the correct recipient and contains the PHI meant for that individual, Holtzman notes.

Texas Health did not immediately respond to an Information Security Media Group request for comment on the incident.

In its breach notification statement, it notes that to help prevent similar incidents, “we are taking steps to further enhance the organization’s data security procedures.”


About the Author

Marianne Kolbasuk McGee

Marianne Kolbasuk McGee

Executive Editor, HealthcareInfoSecurity, ISMG

McGee is executive editor of Information Security Media Group's HealthcareInfoSecurity.com media site. She has about 30 years of IT journalism experience, with a focus on healthcare information technology issues for more than 15 years. Before joining ISMG in 2012, she was a reporter at InformationWeek magazine and news site and played a lead role in the launch of InformationWeek's healthcare IT media site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.