Categories
Local News

Confidential sources affect privacy, access issues in news media

TRENTON, N.J. — While reporters can build credibility with their sources by agreeing to protect their identities, there is a backlash that not printing names of sources can create distrust and access problems.

For readers, they prefer sourced-information.  They trust a publication more if the names of sources are mentioned.

“…Readers – about one in five – said media outlets should never report information if a source isn’t willing to be named,” writes Ryan Pitts of Poynter.

However, when it comes to being practical, reporters are still reporting information even if they have to use anonymous sources. Most of these reporters make sure their sources are well informed and are totally trustworthy and reliable.

“First and foremost, I have to secure whether or not my source is reliable and informed, “ said Sherrina Navani, reporter at The Trentonian newspaper.

Interview with Sherrina Navani, reporter at The Trentonian.

There are several reasons why a reporter might have to use a confidential source. Sometimes, this is the only source that has the information that they are looking for, but this source’s life or job could be in jeopardy if others know they leaked the information.

Navani said she would also include in her story why the confidential source wishes to be anonymous.

She said, “I refer to the source under anonymity and say why the source wishes to remain anonymous: ‘A source who chose not to be identified for fear of losing her job.’”

When readers, researchers, the courts or investigators try to access information that has missing names, this can also pose a problem. If the source is too private, then there will be gaps in accessing detailed information.

“‘If people are willing to give information, they should be willing to give their name. It is far too easy to hide behind the cloak of anonymity,”’ writes Ryan.

But, sometimes when reporters ask for information, they are denied for several reasons.  One reason is that sources do not want to be identified. So if the reporter has no other alternative, she is willing to get the necessary information without mentioning that source’s name.

Navani said that sometimes when she submits Open Public Records Act (OPRA) or Freedom of Information Act (FOIA) request forms, she has been delayed or denied.

“We submit OPRA requests quite frequently… I’ve had requests postponed, delayed or even denied. I usually try to get around denied requests by asking other sources,” said Navani.

However, if Navani has to use an anonymous source she tries to build trust.

“I tell my editor who my source is because he is also protected by the Shield Law and it creates a sense of trust between me and my editor,” said Navani.

Navani said she has never been subpoenaed or had to legally share who her sources are.

 

Categories
Local News

Violation of HIPAA’s privacy laws could mean prison time

Photo by Michelle Dryden
Stephen Miller is chief compliance officer at Capital Health System Regional Medical Center in Trenton.

TRENTON, N.J. — Nowadays, invasion of one’s privacy is more accessible given the growth of social media and electronic devices everywhere; and this means greater protection for personal information.

Hackers and identity thieves are inquisitive about the sources to personal information that they can find. Employees working at healthcare facilities are also held accountable for protecting the privacy of patients they care for. Patients’ privacy is protected by the Health Insurance Portability and Accountability Act, (HIPAA), that was “born out of a statute in 1996,” said Stephen Miller, chief compliance officer at Capital Health System Regional Medical Center.

Miller said this Act covers several regulations, but only one part of it covers privacy information about patients.  Congress directed The Department of Health and Human Services to create the HIPAA laws. It was a broad piece of legislature that covered various regulations. One part of it had to do with disclosure and privacy, said Miller.

The HIPAA has a set of rules about privacy that, “tell healthcare providers how they can use information about their patients and with whom and under what circumstances they can share information about patients,” he said.

Miller explained that this law created at “floor”. “It created a floor–single set of rules that no matter where you go in the county you know if you see a healthcare provider: if go to a doctor, you go to a hospital, if you go to a nursing facility or a physical therapist, and give them information about yourself, you know there are certain things they are allowed to do with that information. There are certain things they are not allowed to do with that information. And there are certain ways they have to protect that information,” he said.

The reason we call that a floor because the law says you must at least follow these rules. States can pass their own laws and they can make them more protective of patients, but you have to at the minimum follow those rules nationally, Miller continued. “It created best-practice in a way for protecting information about patient,” he said.

Often times, when the HIPAA rules are broken, it has to do with identity theft, said Miller. He told of an incident, where employees were hacking into computers and stealing the identity of their cancer patients who were terminally ill. They wanted to get credit cards in their names.

However, breaching HIPAA privacy laws was not a prison term violation until recently.  Huping Zhou, “former University of California at Los Angeles [UCLA], Healthcare System research assistant, was sentenced to four months in prison after admitting he illegally read private electronic medical records of celebrities and others,” writes Howard Anderson of The Security Scrutinizer.

As Miller points out, it is easier for hackers; HIPAA violators and other identity thieves to leave a building with laptop under their jacket or a thumb drive in their pockets. Some individuals are even using cell phones to invade the privacy of others, by taking photos or recording conversations. Therefore, we need greater protections for information on these electronic devices.