Table 6.
PHI Breached Location.
| Year | EMR | Laptop | Desktop Computer | Other PED | Paper/Films | Network Server | Other | Total | |
|---|---|---|---|---|---|---|---|---|---|
| 2019 | 39 | 23 | 32 | 14 | 58 | 117 | 199 | 45 | 527 |
| 2018 | 26 | 25 | 33 | 20 | 62 | 66 | 115 | 35 | 382 |
| 2017 | 34 | 20 | 38 | 18 | 62 | 82 | 92 | 39 | 385 |
| 2016 | 30 | 25 | 26 | 16 | 73 | 83 | 51 | 30 | 334 |
| 2015 | 27 | 34 | 29 | 19 | 70 | 52 | 32 | 26 | 289 |
| 2014 | 13 | 43 | 24 | 19 | 57 | 49 | 42 | 30 | 277 |
| 2013 | 16 | 70 | 39 | 23 | 57 | 31 | 26 | 32 | 294 |
| 2012 | 5 | 60 | 27 | 20 | 50 | 30 | 8 | 22 | 222 |
| 2011 | 5 | 48 | 32 | 30 | 65 | 21 | 3 | 32 | 236 |
| 2010 | 0 | 49 | 26 | 37 | 21 | 12 | 2 | 60 | 207 |
| Total | 195 | 397 | 306 | 216 | 575 | 543 | 570 | 351 | 3253 |
PHI: Protected Health Information; EMR: Electronic Medical Records; PED: Portable Electronic Devices.