Share This Article:

The Necessity of Information Security in the Vulnerable Pharmaceutical Industry

Abstract Full-Text HTML Download Download as PDF (Size:2526KB) PP. 147-153
DOI: 10.4236/jis.2014.54014    4,755 Downloads   6,120 Views   Citations

ABSTRACT

The pharmaceutical industry produces billions of dollars in sales each year. The industry is evolving and relying on using technology more and more to conduct day-to-day business. The pharmaceutical industry generates enormous amounts of sensitive and private information such as medical records, employee information, financial data and research data. This makes the pharmaceutical industry vulnerable to cybercrime. The pharmaceutical industry has a big responsibility to stakeholders, patients, employees and customers all over the world to ensure this information is secure. It is imperative for organizations to budget adequate amounts of money and resources to have effective Information Security Management. Information Security Management is critical in the pharmaceutical industry and the alternative of not having it would be devastating to a pharmaceutical company. Cyber criminals can tarnish company reputations and the effects can take years to overcome. The main contributions of this paper will be to describe the concerns about the security of information in the pharmaceutical industry, provide examples of organizations that are victims of cybercrime, describe regulations in place to help reduce information security breaches and illustrate why information security is necessary in the pharmaceutical industry.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Roberts, S. (2014) The Necessity of Information Security in the Vulnerable Pharmaceutical Industry. Journal of Information Security, 5, 147-153. doi: 10.4236/jis.2014.54014.

References

[1] Data Breach Category Summary (2014).
http://www.idtheftcenter.org/images/breach/ITRCBreachStatsReportSummary2014.pdf
[2] Kutcher, H. (2014) Cyber Attackers’ Target Healthcare and Pharma Companies’...
http://www.ft.com/cms/s/0/a6b09006-e5c9-11e3-aeef-00144feabc0.html
[3] National Research Council (1997) For the Record: Protecting Electronic Health Information. The National Academies Press, Washington DC.
[4] Totty, M. (2006) Technology (A Special Report); the Dangers Within: The Biggest Threats to Information Security Often Don’t Come from Hackers; They Come from a Company’s Own Employees; Here’s How You Can Stop Them. Wall Street Journal.
http://search.proquest.com.jproxy.lib.ecu.edu/docview/399005031?accountid=0639
[5] Homeland Security News Wire (2011) Japanese Pharmaceutical Crippled by Insider Cyberattack. http://www.homelandsecuritynewswire.com/japanese-pharamceutical-crippled-insider-cyberattack
[6] Horan, A. (2014) Healthcare Records: A Hacker’s Roadmap to Your Life. Electronic Health Reporter. http://electronichealthreporter.com/healthcare-records-hackers-roadmap-life/
[7] International Pharmaceutical Privacy Consortium (IPPC) (2005) Transmission Security Practices of Pharma Sponsors of Clinical Research.
http://www.pharmaprivacy.org/download/Clinical_Research_Transmission_Security.pdf
[8] Vijayan, J. (2007) JPersonal Data on 17,000 Pfiser Employees Exposed; P2P aa Blamed. Computerworld. http://www.computerworld.com/s/article/9024491/Personal_data_on_17_000 _Pfizer_employees_ exposed_P2P_app_blamed
[9] Bensinger, G. and Calia, M. (2014) Corporate News: EBay Is Latest Victim of Cyberattack. Wall Street Journal. http://search.proquest.com.jproxy.lib.ecu.edu/docview/1526643698?accountid10639
[10] Zimmerman, C. (2006) Protecting the Pharmaceutical Supply Channel. Journal of Pharmacy Practice, 19, 236. http://jpp.sagepub.com.jproxy.lib.ecu.edu/content/19/4/196.full.pdf+html
[11] Hauhn, J. (2013) What the Pharmaceutical Industry Can Teach Us about Supply Chain Security Best Practices. http://www.Industryweek.com/supply-chain/what-pharmaceutical-industry-can-teach-us-about-supply-chain-security-best-practices
[12] Efrati, A. and Loftus, P. (2010) Lilly Hit in Massive Pill Heist. Wall Street Journal.
http://search.proquest.com.jproxy.ecu.edu/docview/399142244?accountid=10639
[13] World Health Organization (WHO) (2014) What Are Counterfeit Medicines?
http://www.who.int/medicines/services/counterfeit/faqs/03/en
[14] Mackey, T.K. and Liang, B.A. (2011) The Global Counterfeit Drug Trade: Patient Safety and Public Health Risks. Journal of Pharmaceutical Sciences, 100, 4571-4579.
http://dx.doi.org/10.1002/jps.22679
[15] Kerper, J. (2013) Boosting Security in the Pharmaceutical Supply Chain with Serialization. Healthcare Packaging: News, Trends and Analysis of Pharmaceuticals, Biologics, Medical Devices, and Nutraceuticals. http://www.healthcarepakcaging.com/trends-and-issies/traceability-and-authen tication/boosting-security-pharamceutical-supply-chain
[16] US Food and Drug Administration (2013) Supply Chain Security Act (DSCSA): Title II of the Drug Quality and Security Act of 2013. http://www.fda.gov/Drugs/DrugSafety/DrugIntecrityand SupplyChainSecurity/DrugSupply ChainSecurityAct/

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.