Skip to main content
Update Required: We noticed you are using an older version of Internet Explorer. To ensure full functionality of this site, please contact your system administrator to upgrade to the newest version of Internet Explorer or try accessing the site in Chrome.
HIROC
  • Home
  • Services
    • Risk Management
      Learn how our risk management solutions help you increase safety
    • Insurance
      Learn about our coverage offerings and how the HIROC advantage can work for you
    • Claims
      Learn about the claims process and the support HIROC provides
  • Resources
  • News & Events
    • Annual Conference
      Learn how the HIROC Annual Conference brings Subscribers, partners, and healthcare professionals together to drive patient safety forward
    • News
      News from HIROC and our subscribers about what’s trending in healthcare
    • Podcasts
      Podcasts from HIROC about healthcare
      • Healthcare Change Makers Podcast
      • Share Scale Repeat Podcast
    • Webinars and Events
      View our schedule of upcoming webinars and access the archives
  • About Us
    • Board of Directors
      Learn about our Board – made up of HIROC subscribers – and access the current list of Directors
    • Leadership Team
      A message from HIROC's CEO, Catherine Gaulton
    • Careers
      Want to join a team of innovators and leaders? Check out our current opportunities
    • Our Story, Our Art of Safety Strategy
      How HIROC and its Subscribers are working to create the safest healthcare system
    • Risk Management Residency Program (RMRP)
      Learn about the RMRP
    • Safety Grants Program
      Learn about the HIROC Foundation and the Safety Grants Program
  • Contact Us
Log in Register
HIROC
Log in Register
  1. Home
  2. Resources
  3. Information Management / Technology – Breach / Loss of Information

Related Resources

Risk Watch (October '25)

Download PDF

Members Only

Webinars

Documentation: Answers to Frequently Asked Questions

Care

Risk Case Studies

Patient/Client Falls

Download PDF

Information Management / Technology – Breach / Loss of Information

Category
Information Management/Technology
Topic
Privacy
Type
Risk Profiles
  • Download PDF
  • LinkedIn

Intentional or unintentional breach or loss of information can expose organizations to loss of patient trust, potential fines, prosecutions, litigation, and reputational damage. Breach or loss of information may result from inadequate technical controls, inadequate administrative practices, information security awareness and cyber-attacks such as hacking, malware or ransom-ware attacks. This document contains information entered by HIROC subscriber healthcare organizations (acute and non-acute) in the Risk Register application to help you in your assessment of this risk.

Ranking / Ratings

  • Likelihood – average score 2.75
  • Impact – average score 3.80

The Risk Register allows for risks to be assessed on a five-point likelihood and impact scale, with five being the highest.

Key controls/mitigation strategies

  • Information Technology (I.T.) controls
    • User authentication (e.g. multifactor authentication)
    • Unique user IDs, strong passwords
    • Role-based access controls for network, applications and processes within applications
    • Application installations restricted to administrator level only
    • Encryption of all external hard drives, USB keys, laptops and mobile phones
    • VPN with dual authentication
    • Intrusion detection and notification solutions
    • Firewall protection
    • Autoblock downloads
    • End point protection such as advanced threat detection and response and Data Leakage Prevention (DLP)
    • Email spam protection
    • Routine vulnerability scanning of the network and services
    • Network traffic analyzer and bandwidth utilization
    • Enhanced internet filtering protection
    • Penetration tests
    • Antivirus and antimalware solutions systems
    • Web and e-mail proxy servers to protect against malware and viruses
    • Timely application of security patches and software upgrades
    • I.T. documentation is electronic and stored off-site
    • Regular backups of data. Back-ups are archived to tape and moved to diverse physical locations to prevent
      loss due to catastrophic event (tapes moved offsite)
    • Secure records destruction
  • Administrative, compliance and management practices
    • Regular audit (manual and system generated)
    • Assessments on new and existing critical information systems (privacy impact assessment, threat risk assessment, vulnerability assessment) with quarterly reports to internal and EHR collaboration related committees as well as annual security review.
    • Formal privacy and information security policies and procedures with regular review (e.g. “lockbox”, breach protocols, acceptable use, mobile devices, social media, research, e-mail access and usage, etc.)
    • Ongoing mandatory training, education and communication for all staff, volunteers, contractors and independent practitioners (e.g. education on phishing attacks, viruses, security and reporting, Cyber Security Awareness Month)
    • Senior management accountability
    • Regular review of the scope of cyber insurance coverage
    • Privacy Officer and designated security lead roles to monitor and oversee organizational privacy and security activities
    • Disaster recovery or Continuity of Operations Plan (COOP)
    • Employee attestation of the organization’s privacy, confidentiality, code of conduct and security policies
    • Human resource management for inappropriate access, use or disclosure
    • Physical security of the building/organization
    • Privacy Committee
    • Regular reporting schedule to Senior Management Team and Board Committee on privacy program maturity
  • Vendor management (e.g. contracts, due diligence)
    • Strong privacy and information management/security clauses in contracts
    • Vendor management practices for new systems always reviewed by IT
    • Centralized vendor management process
    • Assessment of vendor organization’s privacy and information security protocols
    • Vendor’s commitment to adherence to industry information security standards
    • Breach notification process
    • Vendor background checks
    • Clinical access agreements
    • Service level agreements with all vendors

Monitoring / Indicators

  • System audits, password audits, high profile patient audits
  • Network and server monitoring (e.g. daily morning, afternoon checks of servers)
  • Auditing of PHI repositories
  • Security audit conducted by external agency
  • Regular review of logs (intrusion detection, firewall, e-mail, spam filter, active directory), active scanning and firewall monitoring
  • Measure the maturity of the Information Security program annually
  • Monitoring of real time global threats
  • Incidents involving the following are monitored and reported:
    • Unplanned system downtime
    • Virus infection incidents
    • Breaches or unauthorized access
    • Complaints of privacy breach (including complaints to privacy commissioner’s office)
    • Lost USB keys, external hard drives, phones, etc. (with or without encryption)
    • Inappropriate use of internet
  • Multi-disciplinary representation in information security teams
  • Staff training (frequency, attendance)
  • Gaps identified from various assessments and progress over time (e.g. PIA, TRA)
  • Dashboards for threat levels
  • Bi-annual phishing campaigns results to assess employee awareness of phishing attacks
  • Account file auditing
  • Testing of recovery procedures
  • Monitoring of back-ups
  • Quarterly review of 3rd party (vendor) access to systems
  • Building access logs
  • Regular communications to enhance staff awareness is deployed and tracked

Note: Information presented in this document has been taken from the shared repository of risks captured by HIROC subscribers participating in the Integrated Risk Management program. 

Date last reviewed: January 2020
This is a resource for quality assurance and risk management purposes only, and is not intended to provide or replace legal or medical advice or reflect standards of care and/or standards of practice of a regulatory body. The information contained in this resource was deemed accurate at the time of publication, however, practices may change without notice.

Related Resources

Risk Watch (October '25)

Download PDF

Members Only

Webinars

Documentation: Answers to Frequently Asked Questions

Care

Risk Case Studies

Patient/Client Falls

Download PDF

Partnering to create the safest healthcare system

HIROC is not just a not-for-profit, we are a reciprocal. This means we are governed by our Subscribers – a group of over 800 diverse healthcare organizations across Canada. Together we share learnings and find ways to adapt to the changing nature of the industry.
Learn More
HIROC staff members
HIROC
Join our newsletter to stay up to date with the latest news.
By subscribing you agree with our Privacy Policy and provide consent to receive updates from HIROC.

About Us

  • Careers
  • Contact Us
  • Our Story, Our Art of Safety Strategy
  • Risk Management Residency Program (RMRP)
  • Safety Grants Program

Quicklinks

  • Claims
  • Insurance
  • Risk Management

Important information

  • Privacy Policy
  • Cookie Policy
  • Terms and Conditions
  • AODA

©2026 HIROC All rights reserved.

  • Linkedin
  • Instagram
  • Youtube