reederm, to ai
@reederm@qoto.org avatar

Does HIPAA Even Exist for Large Corporations? -- PART 2

Today I got my official reply to my HHS Office of Civil Rights complaint of 5/3/24 against CVS for violating HIPAA regulations. The minor and rather impressive miracle here is that I got a signed letter from an attorney in only 17 days with relevant regulations and interpretations attached. Good so far.

The result was that they are not going to pursue a formal complaint -- instead they are going to "resolve this matter informally through the provision of technical assistance to CVS."

HHS OCR points out that "a covered entity must maintain reasonable and appropriate administrative, technical, and physical safeguards to prevent intentional or unintentional use or disclosure of PHI in violation of the Privacy Rule and to limit its incidental use and disclosure pursuant to otherwise permitted or required use or disclosure.... Further, under the Security Rule, with certain exceptions, the use of encryption is addressable; i.e., not mandatory." [red emphasis mine]

HHS further states under Reasonable Safeguards that "It is not expected that a covered entity’s safeguards guarantee the privacy of protected health information from any and all potential risks. Reasonable safeguards will vary from covered entity to covered entity depending on factors, such as the size of the covered entity and the nature of its business."

If HHS OCR actually in fact offers this technical assistance in a meaningful way, that WOULD satisfy my complaint -- not that anyone is asking me. This was almost certainly a stupid screw-up by someone in CVS Info Tech programming the canned computer "after visit summary" process to send out way too much information in unencrypted format to people who received a COVID booster at a CVS. If CVS STOPS doing this, I'm good.

To recap -- I received an after-visit summary not only listing what COVID booster med I received, but also my DOB, home address, and all the answers to my screening questionnaire including my answers to whether or not I have ever had a seizure, a bleeding disorder, am currently pregnant, am immunocompromised (including from cancer), have a history of myocarditis, and many other questions.

I will waste my time writing HHS OCR back to thank them and to remind them that to the best of my knowledge I never signed a release for disclosure (which apparently has no legal bearing here?), and that in this new age of AI every major tech company is incorporating AI into EVERYTHING. If I had a Gmail account, Google would have all my medical information from this CVS after visit summary email and likely would be utilizing AI to monetize it in some way.

I suppose the good news here for small psychotherapy practices is that if this is close to acceptable practice for even a giant company like CVS, then maybe we have little to worry about when it comes to client privacy. Heck -- why not just email client PHI to them without getting releases first? Why have encrypted client portals for communication?

-- Michael

**Does HIPAA Even Exist for Large Corporations? -- PART 1**

I don't care if anyone knows I just got a COVID vaccine. Most people don't care.

However, CVS Pharmacy just sent me an after-visit report across unencrypted Internet to my email address.

The form included such fields as:  
-- My Full Name  
-- **DATE OF BIRTH!**  
-- My Full Home Address  
-- Medication Administered  
-- Date and Time of Appointment  
-- Name of Pharmacist I saw  
-- Name of Doctor at CVS overseeing it all  
-- Name and Address of my Primary Care Doctor

Also:  
-- All the answers to my *screening questionnaire!* including my yes/no answers to multiple medical conditions such as heart problems, immunocompromise, seizures & other brain problems, and pregnancy.  
   
So many things wrong here. This is almost enough information for identity theft (lacking only SSN). It gives away LOTS of my medical information. If I had a Gmail email address, Google would now have all this information. What if I was a pregnant female in the southern USA where Attorney Generals are starting to track state of pregnancy for later prosecution if women go out-of-state for abortions or have a suspicious (to them) miscarriage?

**How does CVS get away with this when smaller medical offices have to be so careful?**

Michael Reeder, LCPC

#AI #EHR #medicalnotes #progressnotes #healthcare #patientportal #HIPAA #dataprotection #infosec @infosec@a.gup.pe #doctors #hospitals #CVS #COVID #sars-cov-2 #longcovid #severecovid#covidisnotover #pharmacy #vaccine
vwbusguy, to infosec
@vwbusguy@mastodon.online avatar

Found by two UC students!

The Verge: Two students find security bug that could let millions do laundry for free
https://www.theverge.com/2024/5/19/24160383/students-security-bug-laundry-machines-csc-serviceworks

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

Live now on Twitch with Upcoming Plans | Tiktok Update | Cybersecurity and Chill | Gaming on Linux | Helldivers 2. Join in: https://twitch.tv/chiefgyk3d

tech, to tech
@tech@unfufadoo.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
dethos, to security
@dethos@s.ovalerio.net avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

SSH backdoor has infected 400,000 Linux servers over 15 years and keeps on spreading https://arstechnica.com/?p=2024591&utm_source=dlvr.it&utm_medium=mastodon

north, to infosec
@north@xn--8r9a.com avatar

An unspecified vulnerability was discovered in an unspecified platform from an unspecified vendor. The vulnerability allowed an attacker to do something.

Yeah, fuck that.

I am never working with Synack / ResponsibleDisclosure.com ever again.

It's been beyond my control, for other reasons, but I'll likely be publishing this tomorrow.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
tripleo, to random
@tripleo@fosstodon.org avatar

All you nutcases still using #Perl, what's actually wrong with it?

aka What are the sharp edges?

mjgardner,
@mjgardner@social.sdf.org avatar

@tripleo You’re thinking of #Perl’s “taint mode” (stop your teenage giggling), where outside data is untrusted unless it’s the extracted subpattern match in a #RegularExpression.

It’s only enabled under certain conditions. Read about it in the perlsec manual page: https://perldoc.perl.org/perlsec#Taint-mode

#programming #security #InfoSec #CyberSecurity #RegEx #RegExp

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
maxleibman, to infosec
@maxleibman@mastodon.social avatar

One of my computers is 100% secure. Totally unhackable. Beyond your reach, that of any hacker you’ve ever known, even any state actor.

It’s my childhood Commodore VIC-20.

Which has no permanent data storage, is broken, and is buried under 30 years of landfill.

#infosec

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about https://securityintelligence.com/articles/overheard-at-rsa/?utm_source=dlvr.it&utm_medium=mastodon #cybersecurity #infosec

tulpa, to infosec
@tulpa@fosstodon.org avatar

In #infosec people like to talk about "defense in depth". In other kinds of (non-computer) security, I never hear about that philosophy.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
pseudonym, to tesla
@pseudonym@mastodon.online avatar

Riding in passenger seat in the car, looking at my phone, and some nearby car (a ) tried to Bluetooth pair with me.

It nominally had the owners's name in the pairing request. That's a and problem.

I denied the request, of course, but was really tempted to accept, then play "Baby Shark" out their speakers.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
kravietz, to infosec
@kravietz@agora.echelon.pl avatar

Going through this excellent book by Shaun Pinner, much recommended! There’s many lessons to learn from this book but from my angle there are a few. Firstly, always keep an off-line maps app on your phone (I use OsmAnd). As a test — switch on airplane mode and try to survive for a day. Can you still navigate from point A to point B? Secondly, keep your social media profiles friends-only access. Thirdly, don’t keep any passwords in memory - it’s a bad practice from security point of view anyway, but I never thought about the interrogation angle. A password manager locked with biometrics and PIN and random passwords everywhere will prevent you from finding yourself in situation where you’ll be begging your interrogators to check another password because you might have remembered wrong.

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
rhys, to security
@rhys@rhys.wtf avatar

Holy shit, I've been hacked!

(Not really.)

percepticon, to Cybersecurity
@percepticon@ioc.exchange avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • magazineikmin
  • modclub
  • Durango
  • Youngstown
  • rosin
  • khanakhh
  • slotface
  • ngwrru68w68
  • mdbf
  • thenastyranch
  • kavyap
  • DreamBathrooms
  • megavids
  • tester
  • everett
  • normalnudes
  • GTA5RPClips
  • osvaldo12
  • ethstaker
  • cisconetworking
  • tacticalgear
  • anitta
  • provamag3
  • cubers
  • Leos
  • lostlight
  • All magazines