Project page

Healthcare Data Breach Analysis

Legal, ethical, regulatory, and operational analysis of the Trinity Health incident

Project snapshot

This project examines the Trinity Health breach through confidentiality, integrity, availability, accountability, and patient trust. I focused on how technical weaknesses and operational decisions combine during real incidents, especially when detection and escalation are delayed.

Healthcare incident analysis illustration

IT Support Impact Summary

Analyzed a real-world healthcare data breach to understand how everyday IT decisions such as access control handling, monitoring gaps, and delayed escalation can contribute to major incidents. The analysis highlights the importance of security-aware support practices in regulated environments.

This project examines the Trinity Health breach through confidentiality, integrity, availability, accountability, and patient trust. I focused on how technical weaknesses and operational decisions combine during real incidents, especially when detection and escalation are delayed.

My role

Documented the incident timeline, connected technical gaps to legal and ethical exposure, and developed recommendations around monitoring, access control, and response quality.

IT support relevance

Shows that I understand when routine support decisions have security consequences and when issues need to move beyond normal ticket handling into formal escalation.

Timeline of a healthcare data breach showing intrusion, detection delay, data exfiltration, and reporting phases
Timeline-style summary of the incident progression and the operational delays that increased impact.

Core findings

Incident workflow focus

StageObserved gapOperational lesson
DetectionUnauthorized access remained active too longMonitoring quality directly affects incident size
ResponseEscalation and containment pressure increased over timeSupport teams need clear criteria for when to escalate
CommunicationNotification quality affected trust and accountabilityDocumentation matters during high-impact incidents
RecoveryBroader governance questions remainedTechnical fixes alone are not enough after a breach

Recommendations

What this proves

I think this project shows that I can analyze incidents with both technical and operational judgment. It demonstrates security awareness that is useful in support roles, especially in regulated environments where access handling and escalation decisions matter.