In 2015, Hillsides issued a press release alerting the public it became aware of a HIPAA violation caused by one of its employees.
The employee in question had been using their work email to send protected health information to their personal email address.
On at least five occasions between October 2014 and October 2015, the employee sent unencrypted email attachments to their personal email account containing:
- Employee Names
- Social Security Numbers
- Home addresses
- Phone numbers
- Medical identification numbers
- Therapists’ names
- Patient names
This included 468 staff and 502 clients of Hillside.
To make matters worse, Hillsides was unable to recover the data from the employee’s personal email account. They were also unable to verify if the files were deleted in the first place. As you can imagine, the employee was terminated for violation of company policy.
Why Would an Employee Email PHI to Their Personal Account?
When healthcare data is emailed in such volume to a personal email account, the negligent employee usually does so with nefarious motives. These include:
- Using the information for personal gain when they change employer.
- Selling the data to identity thieves.
- Committing fraud or identity theft.
Due to the vast amount of personally identifiable information that was stolen in this case, committing fraud or identity theft would unfortunately be fairly straight-forward.
How Can Paubox Suite Premium Help?
In the case of Hillsdale, a good email DLP solution would have detected when that employee included things like Social Security Numbers in an email attachment to a personal account.
In the case of Paubox Suite Premium, we would:
- Quarantine the outbound email.
- Send an email alert to the DLP administrator.
- Optionally send an email alert to the sender notifying them their email got quarantined.
Hillsides is a child welfare agency based in Pasadena, CA. They are dedicated to improving the overall well-being and functioning of vulnerable children, youth, and their families.