Healthcare –
An Identity Thief’s SuperStore
Julie Rennecker, PhD, BSN
Third Rock, Inc.
Nov 2017
Healthcare - An Identity Thief's SuperStore
Urban Dictionary
Su-per-store
/’sooper, stor noun
No cameras so it's real easy to steal s***
from there. They enforce no work ethic, and
don't give training to new workers. Probably
the least organized company ever.
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
In 2015:
111,022,154
records
lost/stolen
35% of the U.S.
population
impacted
47% of
healthcare
organizations
experienced a
HIPAA breach
within 2 years
(2015-2016).
Lone Star Circle of Care (FQHC) – 8,700 records
M&M Computer Services (BA) – 4,500 records
Hunt Regional Medical Partners - 3,000 records
Office of Dr Ronald D. Garrett-Roe, MD - 1,600 records
CEMEX, Inc. Health Plan (TX) - 880 records
JACKPOT!
PHI
Worth
$50 to $350 on
black market
Less than $1
on black market
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
✓ Defibrillators
✓ Dialysis machines
✓ CT, PET, and MRI scanners
✓ Medical lasers
✓ Anesthesia machines
✓ Home monitoring devices
✓ Laboratory testing equipment
✓ Ventilators
✓ …
Since 2008/9…
Office-based physician
adoption of EHRs has
more than doubled –
from 42% to 87%.
Hospital adoption has
grown from 12.2% to
96%!
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
Healthcare - An Identity Thief's SuperStore
INQUIRE
How are you
protecting my
child’s health
information?
EDUCATE
INNOVATE
Healthcare - An Identity Thief's SuperStore
The data you protect could be your own.
Thank You!
Julie Rennecker, PhD, BSN
Julie.Rennecker@thirdrock.com
512.310.0020, x113

More Related Content

PDF
HC-CA Infographic REV_05
PPTX
Hipaa Is Heating Up!!
PPT
THCS Workforce HIPAA Training
PDF
Addressing Data Security Issues in Healthcare
PPTX
Data Breach: It Can Happen To You
DOCX
Peer Review FormComplete the form by inserting your answer.docx
DOCX
Five Minute Market Snapshot April 2011
DOCX
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi
HC-CA Infographic REV_05
Hipaa Is Heating Up!!
THCS Workforce HIPAA Training
Addressing Data Security Issues in Healthcare
Data Breach: It Can Happen To You
Peer Review FormComplete the form by inserting your answer.docx
Five Minute Market Snapshot April 2011
PLEASE POST EACH DISCUSSION SEPARATELYEach healthcare organi

Similar to Healthcare - An Identity Thief's SuperStore (20)

PPTX
Protecting yourself and others
PPTX
Universal Unique Patient Information Identifier UUPII
PPTX
Leveraging Data For Results
PPTX
David Cocker big data MDCPartners ta-scan
PPT
The Role of Laboratory Reports in the Adoption of Electronic Medical Records
PDF
FTC Spring Privacy Series: Consumer Generated and Controlled Health Data
DOCX
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
PPT
Transforming Healthcare with Big Data, Social and Mobile
PDF
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
PDF
Data analytics: Are U.S. hospitals late to the party?
DOCX
Page 1 Executive Summary Policy makers are looking.docx
PDF
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
PDF
Cyber Risk in Healthcare Industry- Are you Protected?
PPTX
Aster ibara post approvalsummit final
PPTX
Cite colegio 2012
PPTX
MHA 690-Confidentiality
PPT
Why Healthcare Culture Must Change
PPTX
Patient Privacy and Safety in Healthcare
PDF
Rock Report: Big Data by @Rock_Health
PDF
eBook - Data Analytics in Healthcare
Protecting yourself and others
Universal Unique Patient Information Identifier UUPII
Leveraging Data For Results
David Cocker big data MDCPartners ta-scan
The Role of Laboratory Reports in the Adoption of Electronic Medical Records
FTC Spring Privacy Series: Consumer Generated and Controlled Health Data
· Decoding the Ethics Code, Ch. 81. Assume you have been called .docx
Transforming Healthcare with Big Data, Social and Mobile
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Data analytics: Are U.S. hospitals late to the party?
Page 1 Executive Summary Policy makers are looking.docx
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Cyber Risk in Healthcare Industry- Are you Protected?
Aster ibara post approvalsummit final
Cite colegio 2012
MHA 690-Confidentiality
Why Healthcare Culture Must Change
Patient Privacy and Safety in Healthcare
Rock Report: Big Data by @Rock_Health
eBook - Data Analytics in Healthcare
Ad

More from JoAnna Cheshire (20)

PDF
The Future of Work
PDF
Catching the Next Train
PPTX
The SharePoint Migration Playbook
PDF
Introduction to SharePoint Framework
PPTX
PowerShell + SharePoint Online - An Admin's Guide
PDF
Artificial Intelligence & Machine Learning - A CIOs Perspective
PDF
Modernizing Data Management
PPTX
Microsoft and Enterprise Search
PPTX
Introduction to Microsoft Teams and Office 365 groups
PDF
Cybersecurity crisis management a prep guide
PPTX
Accelerate your business with flow
PPTX
Building applications for your business using power apps and flow
PPTX
The Decomposition Dilemma
PPTX
Not "If" but "When"
PDF
Defending against Ransomware and what you can do about it
PDF
The New Convergence of Data; the Next Strategic Business Advantage
PDF
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
PPT
Define Yourself! Crafting a Wonder Woman's Brand
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
A UX first approach to Office 365 migrations
The Future of Work
Catching the Next Train
The SharePoint Migration Playbook
Introduction to SharePoint Framework
PowerShell + SharePoint Online - An Admin's Guide
Artificial Intelligence & Machine Learning - A CIOs Perspective
Modernizing Data Management
Microsoft and Enterprise Search
Introduction to Microsoft Teams and Office 365 groups
Cybersecurity crisis management a prep guide
Accelerate your business with flow
Building applications for your business using power apps and flow
The Decomposition Dilemma
Not "If" but "When"
Defending against Ransomware and what you can do about it
The New Convergence of Data; the Next Strategic Business Advantage
Microservices Architectural Maturity Matrix, Token Based Authority, API Gatew...
Define Yourself! Crafting a Wonder Woman's Brand
Today's Cyber Challenges: Methodology to Secure Your Business
A UX first approach to Office 365 migrations
Ad

Recently uploaded (20)

PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Decision Optimization - From Theory to Practice
PDF
Human Computer Interaction Miterm Lesson
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
The AI Revolution in Customer Service - 2025
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Build automations faster and more reliably with UiPath ScreenPlay
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Advancing precision in air quality forecasting through machine learning integ...
Data Virtualization in Action: Scaling APIs and Apps with FME
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Decision Optimization - From Theory to Practice
Human Computer Interaction Miterm Lesson
Module 1 Introduction to Web Programming .pptx
Connector Corner: Transform Unstructured Documents with Agentic Automation
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Ensemble model-based arrhythmia classification with local interpretable model...
Auditboard EB SOX Playbook 2023 edition.
The AI Revolution in Customer Service - 2025
Co-training pseudo-labeling for text classification with support vector machi...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...

Healthcare - An Identity Thief's SuperStore