VA doctors' foray into cloud causes potential breach

Yahoo calendar held patient names, surgeries

The Veterans Affairs Department has ordered an immediate shutdown of a cloud application on the Yahoo website that VA doctors were using to store patients’ medical information without appropriate data security controls, officials said.

Notifications of a possible security breach will be sent to 878 patients, according to VA’s "Monthly Report to Congress on Data Incidents" for November, released by the department Dec. 22.

The breach, which is referred to as a mishandling of electronic information, came to the attention of VA's information security authorities on Nov. 23 when they discovered that physicians and employees in a VA hospital orthopedics department were maintaining a calendar of patient medical data on a Yahoo.com cloud application.


Related stories:

Unencrypted thumb drive causes breach at VA

VA data breach reports available online


The calendar has existed since 2007 and was protected by a single password shared by a number of people. The password had not been changed in the three years of operation.

The calendar contained full names, dates and types of surgery, and the last four digits of Social Security numbers for nearly 900 patients, the report states.

VA’s National Security Operations Center ordered the calendar to be closed Nov. 24. All entries were deleted, and the patients are to be notified of the possible breach.

Roger Baker, VA's assistant secretary for information and technology, said Dec. 22 the incident was an example of the need for better and more secure IT tools for VA employees, including cloud-based tools.

The report notes that all VA doctors have access to a secure VA network to store patient information and a Microsoft Excel application to schedule appointments and surgeries.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.

Featured

  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from Shutterstock.com

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Sat, Oct 1, 2011 GBOGH Annandale, VA

No wonder doctors where using a cloud based calendar. Why is Microsoft Excel being used at the VA for scheduling appointments and surguries? $3.2 billion a year in discretionary IT budget should allow for building or buying a better patient scheduling application.

Fri, Jan 21, 2011 Tom Boston

So when are the monetary fines and punishments promised by HIPAA going to kick in and actually penalize the staff for flagrant violations of compliance??? HIPAA has raised the cost of healthcare, ostensibly for the public good, why not start collecting? Now.

Tue, Jan 4, 2011

Seriously? Of course IT is a pain with their security requirements, governments and businesses require us to be that way. That doesn't give the right for providers to do reckless things that their HIPAA training told them not to do.
Imagine if your bank issued everyone the same pin number for each debit card they issued, and then shared all kinds of account information with anyone who might happen to have the pin.
How about throwing your payroll, dob, ssn, and other personal data out on a Yahoo account and play share the password. What is more appalling is that people that pull these kinds of stunts usually use passwords like 12345. Hmmm wonder how many hackers have seen the data?

Wed, Dec 29, 2010

I'm sure there are lots of such things going on. Perhaps that "IT dept. is a pain with their security requirements" syndrome.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group