Why Are Health Data Leaking Online? Bad Software, Study Says

Hard-to-use software is behind the leakage of sensitive health data online, according to a study by Dartmouth researchers published in December.

Health documents with sensitive patient information can be found in “peer-to-peer” networks, which people typically use to share music files and the like. The programs used to navigate these networks often locate files on a user’s computer and share them–whether they’re music and videos or things like spreadsheets with health data. The issue can arise when health workers transfer data from firms’ proprietary software to their home computers. If they or someone in their family uses file-sharing software, files can be picked up.

Over a two-week period in 2009, the researchers were able to find more than 200 files that contained identifying information such as name, address, date of birth, social security numbers, insurance numbers and health-related information. It’s not much compared with the vast number of files in these networks, but it presents a big risk–for health companies as well as patients.

Read the rest of this post on the original site

Must-Reads from other Websites

Panos Mourdoukoutas

Why Apple Should Buy China’s Xiaomi

Paul Graham

What I Didn’t Say

Benjamin Bratton

We Need to Talk About TED

Mat Honan

I, Glasshole: My Year With Google Glass

Chris Ware

All Together Now

Corey S. Powell and Laurie Gwen Shapiro

The Sculpture on the Moon

About Voices

Along with original content and posts from across the Dow Jones network, this section of AllThingsD includes Must-Reads From Other Websites — pieces we’ve read, discussions we’ve followed, stuff we like. Six posts from external sites are included here each weekday, but we only run the headlines. We link to the original sites for the rest. These posts are explicitly labeled, so it’s clear that the content comes from other websites, and for clarity’s sake, all outside posts run against a pink background.

We also solicit original full-length posts and accept some unsolicited submissions.

Read more »