{"id":50967,"date":"2025-07-09T08:51:09","date_gmt":"2025-07-09T08:51:09","guid":{"rendered":"https:\/\/www.europesays.com\/us\/50967\/"},"modified":"2025-07-09T08:51:09","modified_gmt":"2025-07-09T08:51:09","slug":"health-care-cybersecurity-policies-are-based-on-a-false-assumption","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/50967\/","title":{"rendered":"Health care cybersecurity policies are based on a false assumption"},"content":{"rendered":"<p>Health care cybersecurity policy rests on a fundamental misunderstanding of what cybercriminals actually want. For years, regulators and providers have assumed that medical records \u2014 diagnoses, lab results, treatment histories \u2014 are the crown jewels hackers are after. This assumption has shaped everything from HIPAA compliance strategies to hospital security budgets.<\/p>\n<p>But it\u2019s wrong.<\/p>\n<p>Cybercriminals targeting health care providers aren\u2019t interested in your cholesterol levels or prescription history. They\u2019re after your Social Security number, your insurance details, and your payment information. This isn\u2019t just an academic distinction \u2014 it\u2019s a policy blind spot that\u2019s making health care both less secure and less collaborative than it needs to be.<\/p>\n<p>In my research on <a href=\"https:\/\/www.acpjournals.org\/doi\/10.7326\/M19-1759\" target=\"_blank\" rel=\"noopener\">health care data breaches<\/a>, my team and I found that the vast majority involved financial and demographic information, not clinical records. When criminals steal data from hospitals or clinics, they\u2019re not looking to embarrass patients or leak sensitive medical histories. They\u2019re seeking information they can immediately monetize: identifiers to commit identity theft, insurance details to submit fraudulent claims, and credit card data to drain accounts.<\/p>\n<p>This makes economic sense. A Social Security number has clear, transferable value on the dark web. A medication list? Not so much. Clinical data depreciates quickly, requires specialized buyers, and has no obvious payoff in most cases.<\/p>\n<p>Yet under current U.S. regulations, all protected health information (PHI) is treated the same. HIPAA offers equal protection to a vaccination history and a billing address. That blanket approach has serious consequences.<\/p>\n<p>By treating all PHI as equally sensitive, current policy discourages legitimate and often life-saving data sharing. Hospitals are reluctant to share clinical records with specialists. Researchers run into hurdles accessing patient outcomes data. Public health agencies face delays in getting the information they need to track disease and target interventions.<\/p>\n<\/p>\n<p>Even when data sharing is technically allowed under HIPAA \u2014 such as for treatment or operational improvement \u2014 fear of regulatory reprisal often leads institutions to err on the side of caution. That includes declining to participate in health information exchanges, limiting collaboration with research networks, or hesitating to share even deidentified data. In California, liability and cybersecurity concerns have slowed participation in the state\u2019s new health data exchange framework, particularly among smaller and unaffiliated providers.<\/p>\n<p>The result is a chilling effect on data sharing \u2014 even in moments of national crisis. During the Covid-19 pandemic, for example, <a href=\"https:\/\/academic.oup.com\/healthaffairsscholar\/article\/2\/1\/qxad080\/7512715\" target=\"_blank\" rel=\"noopener\">only 38% of hospitals surveyed by the American Hospital Association<\/a> agreed that they could electronically receive the patient information they needed from outside providers to effectively treat Covid-19 cases.<\/p>\n<p>This overcaution can be dangerous. If a patient arrives unconscious in an emergency room, providers may not have access to their allergy list, past surgeries, or medication history \u2014 not because the data doesn\u2019t exist, but because it can\u2019t be easily shared. Rather than streamline care, privacy rules have, in many cases, paralyzed it.<\/p>\n<p>The regulatory overreach also stifles innovation. As AI tools become increasingly central to health care \u2014 from diagnosing rare diseases to managing chronic conditions \u2014 they require large, diverse, and detailed datasets to function effectively. But because clinical data is treated with the same sensitivity as financial data, access for model training and validation is heavily restricted, even when all identifying information is removed. While concerns about re-identification are valid, current policies often overcorrect, limiting the potential of these tools to improve care.<\/p>\n<p>Meanwhile, patients are already turning to large language models like ChatGPT for basic medical questions. With better data, these tools could level the playing field \u2014 offering more accurate guidance to underserved populations, improving early detection, and reducing misdiagnosis. But only if we can responsibly train them on real-world health data.<\/p>\n<p>As economist John Cochrane wrote in <a href=\"https:\/\/www.wsj.com\/articles\/imagine-what-we-could-cure-1543176157\" target=\"_blank\" rel=\"noopener\">a 2018 Wall Street Journal commentary<\/a>, the U.S. is squandering a massive opportunity to improve care and lower costs by locking up data that could safely be used for public good. Countries with fewer constraints may leap ahead \u2014 not because they have better technology, but because they allow it to learn.<\/p>\n<p>The fix sounds counterintuitive: Health care providers should flip their security priorities. Treat financial and demographic information as the highest-risk assets requiring maximum protection. Allow more flexibility in sharing clinical data for treatment, coordination, and research.<\/p>\n<p>This doesn\u2019t mean abandoning privacy. Patients still deserve confidentiality for their health information. It\u2019s also true that in rare cases, such as for public figures, medical details can be specifically targeted.<\/p>\n<p>\t\t\t<img decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/07\/AdobeStock_1118287949-768x432.jpeg\" class=\"attachment-article-main-medium-large size-article-main-medium-large wp-post-image\" alt=\"\" loading=\"lazy\"  \/>\t\t<\/p>\n<p>\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.statnews.com\/wp-content\/themes\/stat\/images\/home\/statplus.svg\" width=\"19\" height=\"16\" alt=\"\"\/><br \/>\n\t\t\t\t<a href=\"https:\/\/www.statnews.com\/2025\/03\/17\/hipaa-cybersecurity-medical-data-file-sharing-governance-ai\/\" rel=\"noopener\" target=\"_blank\">HIPAA can\u2019t keep up with health care\u2019s security crisis<\/a><\/p>\n<p>But for most patients, the greater systemic risk is the theft and misuse of financial and demographic data. Hospital security strategy should reflect these different types of threats.<\/p>\n<p>In practical terms, this would mean two key changes:<\/p>\n<p>First, HIPAA should distinguish among types of data. Financial and demographic information should carry stricter access rules, higher encryption standards, and more frequent audits. Clinical data, while still protected, should be easier to share when used for legitimate purposes.<\/p>\n<p>Second, hospitals should restructure their cybersecurity efforts accordingly. Rather than spreading defenses evenly, they should concentrate their strongest protections on billing systems, patient registration databases, and insurance verification platforms \u2014 the systems criminals actually target.<\/p>\n<p>Today\u2019s policy creates a false choice between privacy and progress. By assuming that all data is equally sensitive, we\u2019ve built a system where it\u2019s easier to keep information locked up than to use it to improve care.<\/p>\n<p>But it doesn\u2019t have to be this way. Recognizing that different types of data carry different risks would allow health care providers to collaborate more freely, researchers to innovate more quickly, and patients to benefit from more accurate and efficient care \u2014 all while better protecting the information hackers actually want to steal.<\/p>\n<p>To move forward, we must face a simple truth: Cybersecurity policy built on the wrong assumptions will produce the wrong outcomes. It\u2019s time to stop protecting the wrong things \u2014 and start protecting what truly matters.<\/p>\n<p>John X. Jiang is the Eli Broad endowed professor of accounting and information systems at Michigan State University, with research spanning financial reporting and health care cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"Health care cybersecurity policy rests on a fundamental misunderstanding of what cybercriminals actually want. For years, regulators and&hellip;\n","protected":false},"author":3,"featured_media":50968,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[210,1141,1142,3584,153,67,132,68],"class_list":{"0":"post-50967","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-health-care","8":"tag-health","9":"tag-health-care","10":"tag-healthcare","11":"tag-hospitals","12":"tag-policy","13":"tag-united-states","14":"tag-unitedstates","15":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/114822426416623630","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/50967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=50967"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/50967\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/50968"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=50967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=50967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=50967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}