Skip to main content
Iranian Journal of Public Health logoLink to Iranian Journal of Public Health
. 2019 Feb;48(2):278–288.

Massive Health Record Breaches Evidenced by the Office for Civil Rights Data

Waldemar W KOCZKODAJ 1,*, Jolanta MASIAK 2, Mirosław MAZUREK 3, Dominik STRZAŁKA 3, Pavel F ZABRODSKII 4
PMCID: PMC6556182  PMID: 31205882

Abstract

Background:

Using data collected by the Office for Civil Rights, Department of Health and Human Services (HHS), over half of the population in the USA might have been affected by security breaches since Oct 2009. This study provided analysis of the data, presenting the numbers of individuals affected in one breach and the number of breaches.

Methods:

Statistical analysis has been conducted with visualizations. Visualizations include categorized histograms and tables. Histograms are presented as bar charts with categories: location and breach type. Tables show case counts (across top 10 breaches and those with more than one million stolen records) in successive years and covered entity types. All statistics were calculated with the use of package R. Analyzed data were collected from Oct 2009 till Jun 2017.

Results:

This study presents evidence of health data breaches taking place at an unprecedented level. Medical records of at least 173 million of people, gathered since Oct 2009, have been breached and might have adversely influenced over half of the population in the USA.

Conclusion:

Results of this study are expected to motivate public care authorities to develop similar laws and regulations as the USA while striving for better law enforcement. It takes a considerable amount of time to educate public and it takes substantial financial resources to prevent data breaches.

Keywords: Health, Civil rights, Health data breaches

Introduction

The main goal of this study was to send a strong signal to Iran and the neighboring countries to pay more attention to security and privacy issues before it comes to the level of disaster as demonstrated by the reliable statistics below.

Analysis of medical records is an ongoing problem. There has been a steady increase in security breaches of data processing systems reported in some studies (1). However, our study reports a problem of monumental proportions. Medical errors are the third leading cause of death in the USA. The need for patients to protect themselves and their families from harm, and for hospitals to make patient safety a priority is evident. Many hospitals are making headway in addressing errors, accidents, injuries and infections that kill or hurt patients, but overall progress is not impressive (2, 3). For many years there has been a steady increase in the number of security breaches of data processing systems (1, 46). With the rapid development of computer networks, the network is confronting a growing number of threats. Therefore, it is very important to assess the risks to the network information system. Internet application technologies, such as cloud computing and cloud storage, have drastically changed peoples’ lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. Cybercriminals′ attacks focus not only on obtaining medical data, but also on other database, communication and production systems (7). The challenge is to use new methods for fighting terrorism and to detect and prevent security breaches e.g. Data Mining, Semantic Web and Advanced Information Technologies (810). The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators (11).

The security of electronic health records (EHR) is critical (12). The important role of electronic health records should influence the development of essential infrastructures for safety and privacy preservation. The technology used must be accepted by users, inexpensive and simple enough while less vulnerable to changes and data breaches. Increasing healthcare cost due to trends such as demographic and epidemiologic transition and uncontrolled increase in using new technologies in health care is one of the most important threats that the health system will be facing (13). Our empirical study shows that the confidentiality of electronic health records (EHR) is breached at an unprecedented level. As much as half of the US population may have electronic health records compromised and it calls for a social action.

Methods

The methods used in this study were simple statistics driven by the discovery of data collected by the Office for Civil Rights, Department of Health and Human Services (HHS). Discovery is regarded as the act of detecting something previously unrecognized as meaningful. In our case, it was the extent of health data breaches in USA gathered from October 2009 till June 2017 by HHS. Access to the analyzed data is public on the web-site. We also use data taken from the Internet Live Stats (www.internetlivestats.com/), which is a part of the Real Time Statistics Project. The data were stored in one Excel worksheet which was subsequently analyzed by basic statistics of R (a statistical open source system). In addition, two statistical systems: Statistica and Origin were used to extract data, produce presented tables, histograms, and visualizations.

Data analysis was conducted by a three-step approach. In the first step, we extracted data only related to health record breaches. The next step was to divide the extracted health data breaches into two main categories: the number of individuals affected (NIA) and the number of breaches (NB). Step three is referred to as the detailed analysis of NIA and NB. Functions included in the R package divided the extracted data into: (i) five main categories of breaches location: Business Associate (BA); Health Plan (HP); Healthcare Clearing House (HCH); Healthcare Provider (HPr), and Uncategorised (UN); (ii) seven categories related to the type of breach: Hacking/IT Incident (A); Improper Disposal (B); Loss (C); Other (D); Theft (E); Unauthorized Access/Disclosure (F); Unknown (G). This extraction was possible thanks to the preliminary data categorization available from original data sources. It was done in order to highlight only those cases, which were important for the analyzed topic. Histograms (related to NIA and NB) were produced and presented as bar charts for categories obtained in step 2.

Results

The general data breaches situation

Let us see how the general (not necessary health care situation) looks like. The disastrous data breaches are nicely visualized in (14). Unfortunately, they rely on public media as the source hence not acceptable for research. The portal presents infographics from well-known sources such as Routers, Consumer News and Business Channel (CNBC), National Broadcasting Company (NBC), New York Times (NYTimes), Cable News Network (CNN), Guardian, and many industry portals PC World, Computer Weekly, etc. The portal’s mission is to distill the world’s data, information and knowledge into impressive and useful graphics and diagrams. They base all graphics and visualisations on facts and data. The top 10 lost records are shown in Table 1. Table 2 and Fig. 1 show the top 10 data of healthcare records stolen.

Table 1:

Top 10 data breaches in the lost records category

Year Entity Records lost Organisation
1 2017 River City Media 1,370,000,000 Web
2 2013 Yahoo 1,000,000,000 Web
3 2014 Yahoo 500,000,000 Web
4 2017 Friend Finder Network 412,000,000 Web
5 2012 Court Ventures 200,000,000 Financial
6 2015 Voter Database 191,000,000 Govermment
7 2016 My Space 164,000,000 Web
8 2012 Massive Amer.bsn hack 160,000,000 Financial
9 2009 Heartland 130,000,000 Financial
10 2012 Linkedln 117,000,000 Web

Table 2:

Top 10 data of healthcare records stolen

Year Entity Number of records stolen Records lost Method of leak Data Information source
1 2016 Anthem 130,000 80,000,000 Hacked Zdnet.com
2 2015 Premera 150,000 11,000,000 Hacked Infoworld.com
3 2014 Twitch.tv 150,000 10,000,000 Web The State, HHS
4 2011 NHS 160,000 8,300,000 Lost/stolen RowStory.com
5 2012 South Carolina Gov. 180,000 6,400,000 Inside job Washingtonpost
6 2014 Health Systems 250,000 4,500,000 Hacked Forbes
7 2011 Sutter Medical Found. 250,000 4,243,434 Lost/stolen Cnet.com
8 2013 Advocate Med. Group 300,000 4,000,000 Lost/stolen KoreaTimes
9 2016 Banner Health 500,000 3,700,000 Hacked Wired.co.uk
10 2011 Health Net - IBM 1,000,000 1,900,000 Lost/stolen Cnet.com

Fig. 1:

Fig. 1:

World’s biggest data breaches filtered by healthcare category

Our privacy is at stake. We have the right to privacy and high expectations that our medical records are protected, but are they really? Our findings have stunned us to the extent that we needed to assess whether or not they could be regarded as credible. However, the reliability of the data source (number of security of data breaches recorded by the US government agency) and its availability (posted for everyone to access and verify our finding) as well as the importance of data ( https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf ) have convinced us that publishing our findings is in the public interest.

The legal term: the number of individuals affected (NIA) is carefully chosen by the governmental agency and it does not reflect a simple fact that it may be you or someone close to you. For sure, it is a human being. His/her life may be ruined or even shortened if he/she has an illness or condition which may not be wise for him/her to disclose.

The total NIA is 173,627,498 (∼173.6 million people) between Oct 2009 and Jun 2017. On average, one data breach takes place every 1.5 day. The total number of individuals affected in 33 data breaches in March 2015 is 91,775,871 (over 91 million). In time series analysis of truncated HHS data we observe a slow upward trend of number of breaches (NB). Table 3 illustrates the total NIA and total NB in years (only 3 months in 2009 and 2017).

Table 3:

Number of individuals affected and number of breaches years (only last 3 months in 2009 and the first 6 months of 2017 are recorded)

Year Number of individuals affected Number of breaches
1 2009 134,773 18
2 2010 5,932,276 199
3 2011 13,150,298 195
4 2012 2,808,042 201
5 2013 6,939,276 265
6 2014 12,682,073 289
7 2015 113,267,174 267
8 2016 16,655,952 328
9 2017 1,828,956 101
10 total 173,627,498 1,957

The development of the market for stolen data and related hacking skills indicate that the business of perpetrators in the health care sector is growing. Actions of perpetrators are becoming more and more aggressive and it is not uncommon for them to even use online ads and social media for recruiting health care insiders having access to valuable data. Upon stealing a cache of medical records, it is likely perpetrators have to analyze the data, and perhaps cross-reference it with data from other sources before lucrative fraud, theft, extortion, or blackmail opportunities can be identified (15). Financial data, therefore, still present a faster, more attractive return-on-investment opportunity for perpetrators.

An important issue to resolve is the effect of Internet security breach announcements on market value. Any information that leaks into the network poses a major threat to the capital markets, companies and may be a source of speculation on the stock markets.

Security breach data regulations of the Office for Civil Rights, Department of Health and Human Services (HHS) in USA

The security breach data has been collected by the Office for Civil Rights, HHS in the USA. The data collection is involuntary and regulated by Section 13402 of the Health Information Technology for Economic and Clinical Health (HITECH) Act which is a part of the American Recovery and Reinvestment Act of 2009 (ARRA). ARRA was enacted on Feb 17, 2009 by requiring HHS to issue interim final regulations within 180 d. Entities under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and their business associates are required to provide notification in the case of breaches of health data. HHS is requested to update its guidance specifying the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals.

According to (16):

The HITECH Act, Title XIII of Division A and Title IV of Division B of the American Recovery and Reinvestment Act of 2009 (ARRA) (in USA Public Law 111–5), was enacted on Feb17, 2009. Subtitle D of Division A of the HITECH Act (the Act), entitled ”Privacy”, among other provisions, requires the HHS or the Department to issue interim final regulations for breach notification by covered entities subject to the Administrative Simplification provisions of the HIPAA (in USA Public Law 104–191) and their business associates.

Section 13402 of the HITECH Act regulates the breach notification process. It applies to HIPAA covered entities and their business associates that access, maintain, retain, modify, record, store, destroy, or otherwise hold, use, or disclose unsecured protected health information. The Act defines ”covered entity”, ”business associate”, and ”protected health information” used in the HIPAA Administrative Simplification regulations (45 CFR parts 160, 162, and 164; Title 45: Public Welfare in Code of Federal Regulations; parts: 160 - General Administrative Requirements, 162 - Administrative Requirements, 164 - Security and Privacy) at §160.103. Under the HIPAA Rules, a covered entity is:

  • A health plan,

  • Health care clearinghouse,

  • Health care provider that transmits any health information electronically in connection with a covered transaction, such as submitting health care claims to a health plan.

There are 12 top breaches with NIA for entities with ″healthcare″ in their name higher than 1,000,000 (Table 4).

Table 4:

Breaches with NIA 1,000,000+ for entities with “healthcare” in their name

State Covered.Entity.Type Breach.Submission.Date Individuals.Affected
IN Health Plan 03/13/2015 78,800,000
WA Health Plan 03/17/2015 11,000,000
NY Health Plan 09/09/2015 10,000,000
CA Healthcare Provider 07/17/2015 4,500,000
IL Healthcare Provider 08/23/2013 4,029,530
AZ Healthcare Provider 08/03/2016 3,620,000
FL Healthcare Provider 03/04/2016 2,213,597
FL Health Plan 06/03/2010 1,220,000
MD Health Plan 05/20/2015 1,100,000
MT Health Plan 07/07/2014 1,062,509
FL Healthcare Provider 10/07/2011 1,055,489
TN Health Plan 11/01/2010 1,023,209
Total 119,624,334

A business associate, defined by the HIPAA Rules, is a person or service performing functions or activities on behalf of a covered entity. It involves the use or disclosure of individually identifiable health information. Business associates include third party administrators or pharmacy benefit managers involved in health plans, claims processing. Business associated may work in billing companies, transcription companies. They may also provide legal, actuarial, accounting, management, or administrative services for covered entities and who require access to protected health data.

According to (16):

The HIPAA Rules define ”protected health information” as the individually identifiable health information held or transmitted in any form or medium by these HIPAA covered entities and business associates, subject to certain limited exceptions.

The HITECH Act requires HIPAA covered entities to provide notification to affected individuals and to the Secretary of HHS following the discovery of an unsecured protected health information breach. The unsecured protected health information is the official Act term. In addition, in some cases, the Act requires covered entities to provide notification about breaches to the media. In case of a breach of unsecured protected health information at or by a business associate of a covered entity, the Act requires the business associate to notify the covered entity of the breach. Finally, the Act requires the Secretary to post on an HHS Web site a list of covered entities that experience breaches of unsecured protected health information involving more than 500 individuals.

Section number 13400 (1) of the HITECH Act defines ”breach” to mean, generally, the unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information. The Act provides exceptions to this definition to encompass disclosures where the recipient of the information would not reasonably have been able to retain the information, certain unintentional acquisition, access, or use of information by employees or persons acting under the authority of a covered entity or business associate, as well as certain inadvertent disclosures among persons similarly authorized to access protected health information at a business associate or covered entity.

Further, section number 13402(h) of the HITECH Act defines ”unsecured protected health information” as ”protected health information that is not secured through the use of a technology or methodology specified by the Secretary in guidance” and provides that the guidance specify the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Covered entities and business associates that implement the specified technologies and methodologies with respect to protected health information are not required to provide notifications in the event of a breach of such information -that is, the information is not considered “unsecured” in such cases.

Section number 13407 (f) (3) of the HITECH Act stipulates that “unsecured personal health records” (UPHR) are “identifiable health information” that is not protected through the use of a technology or methodology specified by the Secretary of HHS. Section 13402 of the Act requires breach notification following the discovery of a breach of unsecured protected health information.

Health data security problems, collected data, and methodology

Internet Live Stats (www.internetlivestats.com/) is a part of the Real Time Statistics Project (Worldometers and 7 Billion World). The following global data website Worldometers has been voted as the best on-line reference website by the American Library Association (ALA). Their statistics are referenced in over 400 published books and more than 150 professional journal articles. It allows us to watch the Internet statistics as they change in real time. We also can monitor social media usage: the number of Internet users, websites, blog posts, Facebook, Google+, Twitter, and Pinterest. It also provides other useful information, for example, about hacked websites. This is not only the matter of the Internet’s growth but also a very serious issue, namely, Internet security and, in general, IT systems security (17). O’Connor (2011) wrote: “half of states have no statutes addressing non-disclosure of personally identifiable health information generally held by public health agencies” (18).

The real explosion of Internet use, is on the other hand attributed to two milestones:

  • The initial release of Mosaic (web browser) on Jan 23, 1993,

  • The National Science Foundation (NSF) lifted the ban of commercial use in 1991.

In 1995, the NSF began charging a fee for registering domain names and registered 120,000 domain names. This number grew to over 2 million in three years and the NSF no longer controlled the Internet. Since then, the Internet has become the most convenient, fastest, and cheapest way to access data including health records. Whenever there exists a possibility of having direct or indirect access to some resources (not necessarily protected), there always exists enticement to breach these resources and make use of them for financial benefit.

The analyzed data were grouped for five main categories of location of breaches: Business Associate (BA); Health Plan (HP); Healthcare Clearing House (HCH); Healthcare Provider (HPr), and Uncategorised (UN). Figs. 2 and 3 demonstrate total number of breaches and individuals affected.

Fig. 2:

Fig. 2:

The total number of breaches by the type of breaches location

Fig. 3:

Fig. 3:

The total number of individuals affected by the type of breach location

The average time between health data breaches is approximately 1.5 d (since Oct 2009, the initial date of recording). In one month (Nov 2016), there were 38 data breaches with a total number of 776,797 individuals affected. The monthly average of number of individuals affected (NIA) is 1,907,365 (nearly 2 million individuals).

The bar chart in Fig

Fig. 4 shows the total number of individuals affected (NIA) in one data breach by the type of breach (category): Hacking/IT Incident (A); Improper Disposal (B); Loss (C); Other (D); Theft (E); Unauthorized Access/Disclosure (F); Unknown (G). The official categorization in Fig.

Fig. 4:

Fig. 4:

The total number of individuals affected by the type of breaches

Fig. 4 has fundamental flaws. It indicates nearly 2,000,000 NIA as unknown. ∼6,900,000 NIA are categorized as ”unauthorized” implying that approx. 130,000,000” hacking/IT incidents” may be authorized. Although it may be taken for a case of black humor, it serves as an evidence that even basic breach terminology has not been developed yet. The bar chart in Fig.

Fig. 5 shows the total number of breaches (NB) by type of breach: by type of breach. The largest numbers of individuals affected (NIA) belong in the theft category, which represents 40.5% of all number of breaches. The lowest numbers of breaches are in the Unknown category and reached only 2.75%.

Fig. 5:

Fig. 5:

The total number of breaches by the type of breaches

Discussion

The HHS posted data contain information about NIA in one breach and the total NB. Since Oct of 2009, the total NIA is 173,627,498. The total NB is 1,957. NB is not rapidly growing but the amount of stolen data is growing. It is an ongoing struggle. Hopefully, it may be won, but at high cost since the practice of subcontracting low paid consulting offices may not be an acceptable solution for processing highly sensitive medical records. Selling personal information such as social insurance numbers, telephone number, address, and birth date is so frequently practiced that the law enforcement is practically powerless since perpetrators usually operate outside jurisdictions or use ”darknet” and are virtually untraceable. One may wonder who needs a million of medical records. Unfortunately perpetrators do not post their clients on the Internet but, in all likeliness, big corporations (especially live insurance industry) may benefit from it. Perpetrators focus not only on obtaining medical data, but also on other database, communication and production systems.

The development of the market for stolen data and related hacking skills indicate that the business of cybercrime in the healthcare sector is growing. The researchers also observed brazen efforts by cybercriminals, through online ads and social media, to recruit into their ranks healthcare industry insiders with access to valuable information. The findings suggest financial account data continues to be easier to monetize than personal medical data, which could require an investment that financial payment data does not require. Upon stealing a cache of medical records, it is likely cybercriminals have to analyze the data, and perhaps cross-reference it with data from other sources before lucrative fraud, theft, extortion, or blackmail opportunities can be identified. Financial data, therefore, still presents a faster, more attractive return-on-investment opportunity for cybercriminals (1921). An important issue to solve is the effect of internet security breach announcements on market value (22). Any information that leaks into the network poses a major threat to the capital markets, companies and may be a source of speculation on the stock markets. Capital markets react very quickly to breached firms and internet security developers. In today’s world applying correct security policies and tools is necessary.

Stolen medical records are sold in bulk on the black market for as little as $10 per person. Social insurance numbers (needed to identity the theft) of individuals may ”go” for hundreds of dollars on the black market. Selling personal information such as telephone number, address, and birth date is so frequently practiced that the law enforcement is practically powerless since perpetrators usually operate outside jurisdictions or use ”darknet” and are virtually untraceable. One may wonder who needs a million of medical records. Unfortunately perpetrators do not post their clients on the Internet but, in all likeliness, big corporations (especially live insurance industry) may benefit from it. Criminal attacks focus not only on obtaining medical data, but also on other database, communication and production systems. It is important to improve the awareness of public about the seriousness of the problem. More financial resources should be allocated for development of new methods. Stricter laws should be passed.

Conclusion

Thanks to data collected by the Office for Civil Rights, Department of Health and Human Services (HHS), it was possible to present the credible evidence about health data breaches which accounts for over half the population in the USA. This study presents evidence of health data breaches taking place at an unprecedented level. This study will motivate other countries to develop similar laws and regulations as the USA while striving for with a better law enforcement.

We hope to bring to the attention of Iran and the neighboring countries that potential privacy issues should be regarded as a major concern. It takes considerable time to educate public and it takes substantial financial resources to prevent data breaches.

Ethical considerations

Ethical issues (Including plagiarism, informed consent, misconduct, data fabrication and/or falsification, double publication and/or submission, redundancy, etc.) have been completely observed by the authors.

Acknowledgements

We thank Grant O. Duncan, Team Lead, Business Intelligence, Integration and Development, Health Sciences North, Sudbury, Ontario, Canada and Martha O’Kennon from Albion College for reading the first draft.

Footnotes

Conflict of interest

The authors declare that there is no conflict of interests.

References

  • 1.Brennan TA, Leape LL, Laird NM, et al. (1991). Incidence of adverse events and negligence in hospitalized patients. Results of the Harvard Medical Practice Study I. N Engl J Med, 324(6): 370–6. [DOI] [PubMed] [Google Scholar]
  • 2.Leape LL, Brennan TA, Laird N, et al. (1991). The nature of adverse events in hospitalized patients. Results of the Harvard Medical Practice Study II. N Engl J Med, 324(6):377–84. [DOI] [PubMed] [Google Scholar]
  • 3.Amante DJ, Hogan TP, Pagoto SL. (2015). Access to care and use of the internet to search for health information: Results from the USs National Health Interview Survey. J Med Internet Res, 17(4): e106. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Vos T, Flaxman AD, Naghavi M, et al. (2012). Years lived with disability (YLDs) for 1160 sequelae of 289 diseases and injuries 1990–2010: a systematic analysis for the Global Burden of Disease Study 2010. Lancet, 380(9859): 2163–2196. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 5.Quantin C, Bouzelat H, Allaert FA, et al. (1998). How to ensure data security of an epidemio-logical follow-up: quality assessment of an anonymous record linkage procedure. Int J Med Inform, 49(1): 117–122. [DOI] [PubMed] [Google Scholar]
  • 6.Mercuri RT. (2004). The HIPAA-potamus in health care data security. Commun ACM, 47(7): 25–28. [Google Scholar]
  • 7.Kowal B, Dymora P, Mazurek M. (2016). Selected attacks on database systems. Rzeszow University of Technology Scientific Letters, 35(2): 67–77 (in Polish) [Google Scholar]
  • 8.Ahsan S, Ahah A. (2008). Data Mining, Semantic Web and Advanced Information Technologies for fighting terrorism. International Symposium on Biometrics and Security Technologies, 71–75. [Google Scholar]
  • 9.Weimann G. (2016). Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3): 40–44 [Google Scholar]
  • 10.Sachan A. (2012). Countering Terrorism through Dark Web Analysis. Third International Conference on Computing Communication & Networking Technologies. [Google Scholar]
  • 11.Cho YC, Pan JY. (2015). Design and Implementation of Website Information Disclosure Assessment System. PLoS One, 10(3):e0117180. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 12.Bastani P, Abolhasani N, Shaarbafchizadeh N. (2014). Electronic Health in Perspective of Healthcare Managers: A Qualitative Study in South of Iran. Iran J Public Health, 43(6):809–20. [PMC free article] [PubMed] [Google Scholar]
  • 13.Rajabi F, Esmailzadeh H, Rostamigooran N, et al. (2013). Future of Health Care Delivery in Iran, Opportunities and Threats. Iran J Public Health, 42(Supple1): 23–30. [PMC free article] [PubMed] [Google Scholar]
  • 14. https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 15.Nigrin DJ. (2014). When ‘hacktivists’ target your hospital. N Engl J Med, 371(5): 393–5. [DOI] [PubMed] [Google Scholar]
  • 16.Health information technology, 2009, https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/understanding/coveredentities/hitechact.pdf
  • 17.Crotty BH, Mostaghimi A. (2014). Confidentiality in the digital age. BMJ, 348:g2943. [DOI] [PubMed] [Google Scholar]
  • 18.O’Connor J. (2011). Informational privacy, public health, and state laws. Am J Public Health, 101(10): 1845–1850. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19.Redlich RM, Nemzow MA. (2006). Data security system and method responsive to electronic attacks. US Patent 7,146,644.
  • 20.Juan T. (2016). Risk Assessment of Computer Network Security in Banks. IJSIA, 10(4): 1–10. [Google Scholar]
  • 21.Smith A, Greenbaum D, Douglas SM, et al. (2005). Network security and data integrity in academia: an assessment and a proposal for large-scale archiving. Genome Biol, 6(9): 119. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 22.Cavusoglu H, Mishra B, Raghunathan S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. Int J Electron Comm, 9(1): 70–104. [Google Scholar]

Articles from Iranian Journal of Public Health are provided here courtesy of Tehran University of Medical Sciences

RESOURCES