NIH told patients about security breach weeks after incident

The National Heart, Lung and Blood Institute, part of the National Institutes of Health, informed patients on March 20 that a laptop computer containing their unencrypted personal data was stolen from a researcher's car on Feb. 29 -- nearly three weeks after the incident occurred.

Dr. Elizabeth Nabel, NHLBI director said in a statement that the computer contained information on about 2,500 patients enrolled in a cardiac magnetic resonance imaging study conducted on the NIH campus and Suburban Hospital, both located in Bethesda, Md.

Nabel said the information on the stolen laptop included patients' names, birth dates, hospital medical record numbers, and data such as measurements and diagnoses that were contained in MRI reports. The computer did not contain any other medical information.

The laptop was turned off and password-protected, but the data had not been encrypted -- an apparent violation of a June 2006 policy memo from the Office of Management and Budget directing federal agencies to encrypt all personally identifiable information stored on all mobile devices.

OMB developed that policy after a laptop and external hard drive containing records on 26.5 million veterans were stolen from the Maryland home of a Veterans Affairs Department analyst. OMB reported earlier this month that the number of security breaches in agencies' information systems -- which includes unauthorized access to federal networks -- jumped from 5,146 in fiscal 2006 to 12,986 in fiscal 2007.

Nabel said the NIH Center for Information Technology determined that the theft appeared random and "the incident poses a low likelihood of identify theft or financial implications." She said NHLBI will work to ensure that all its laptops comply with the OMB encryption policy. In addition, NIH information technology staff will inspect them to confirm that appropriate software has been installed and enforce computer security training for all agency personnel.

Alan Paller, director of research at the SANS Institute, a nonprofit cybersecurity research organization in Bethesda, Md., said any agency breaching the OMB encryption policy was "thumbing their nose at the White House and deserves to be skewered." Paller said the cost of encrypting laptops should not be an issue, because in June 2007, the General Services Administration awarded 10 contracts for data encryption software available to all federal agencies. Those contracts, Paller said, provide "phenenomal deals" that cut the cost of encryption software by up to 80 percent.

The loss of the NIH laptop shows that "people are still way too casual when it comes to protecting sensitive health information, and researchers are the most casual," said Dr. Deborah Peel, founder of Patient Privacy Rights, an Austin, Texas-based nonprofit group that works to ensure individuals have control over access to their health records.

Peel added that the incident would make people leery of using electronic health records by adding to the perception that they are easy to penetrate. She said she would never put her patients' health or personally identifiable information on a laptop.

VA learned its lesson from last summer's laptop theft, said Charlie De Sanno, executive director of VA's Office of Enterprise Infrastructure Engineering, at a conference last month in McLean, Va., last month. "Security is our number one priority," DeSanno said. The department mandates encryption of laptop hard drives as well as thumb drives.

Robert Howard, VA's assistant secretary for information and technology, told the same conference that ensuring secure personal data requires not only adherence to OMB guidelines but an institutional "culture of responsibility" to prevent future breaches.

Study participants whose information was contained on the stolen NIH laptop should contact NHLBI by phone at 301-594-2111, or by e-mail at to share any concerns related to the theft. The agency has said it will respond to all such inquiries within two business days.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.