JIS  Vol.5 No.4 , October 2014
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry
Abstract: The pharmaceutical industry produces billions of dollars in sales each year. The industry is evolving and relying on using technology more and more to conduct day-to-day business. The pharmaceutical industry generates enormous amounts of sensitive and private information such as medical records, employee information, financial data and research data. This makes the pharmaceutical industry vulnerable to cybercrime. The pharmaceutical industry has a big responsibility to stakeholders, patients, employees and customers all over the world to ensure this information is secure. It is imperative for organizations to budget adequate amounts of money and resources to have effective Information Security Management. Information Security Management is critical in the pharmaceutical industry and the alternative of not having it would be devastating to a pharmaceutical company. Cyber criminals can tarnish company reputations and the effects can take years to overcome. The main contributions of this paper will be to describe the concerns about the security of information in the pharmaceutical industry, provide examples of organizations that are victims of cybercrime, describe regulations in place to help reduce information security breaches and illustrate why information security is necessary in the pharmaceutical industry.
Cite this paper: Roberts, S. (2014) The Necessity of Information Security in the Vulnerable Pharmaceutical Industry. Journal of Information Security, 5, 147-153. doi: 10.4236/jis.2014.54014.

[1]   Data Breach Category Summary (2014).

[2]   Kutcher, H. (2014) Cyber Attackers’ Target Healthcare and Pharma Companies’...

[3]   National Research Council (1997) For the Record: Protecting Electronic Health Information. The National Academies Press, Washington DC.

[4]   Totty, M. (2006) Technology (A Special Report); the Dangers Within: The Biggest Threats to Information Security Often Don’t Come from Hackers; They Come from a Company’s Own Employees; Here’s How You Can Stop Them. Wall Street Journal.

[5]   Homeland Security News Wire (2011) Japanese Pharmaceutical Crippled by Insider Cyberattack.

[6]   Horan, A. (2014) Healthcare Records: A Hacker’s Roadmap to Your Life. Electronic Health Reporter.

[7]   International Pharmaceutical Privacy Consortium (IPPC) (2005) Transmission Security Practices of Pharma Sponsors of Clinical Research.

[8]   Vijayan, J. (2007) JPersonal Data on 17,000 Pfiser Employees Exposed; P2P aa Blamed. Computerworld. _Pfizer_employees_ exposed_P2P_app_blamed

[9]   Bensinger, G. and Calia, M. (2014) Corporate News: EBay Is Latest Victim of Cyberattack. Wall Street Journal.

[10]   Zimmerman, C. (2006) Protecting the Pharmaceutical Supply Channel. Journal of Pharmacy Practice, 19, 236.

[11]   Hauhn, J. (2013) What the Pharmaceutical Industry Can Teach Us about Supply Chain Security Best Practices.

[12]   Efrati, A. and Loftus, P. (2010) Lilly Hit in Massive Pill Heist. Wall Street Journal.

[13]   World Health Organization (WHO) (2014) What Are Counterfeit Medicines?

[14]   Mackey, T.K. and Liang, B.A. (2011) The Global Counterfeit Drug Trade: Patient Safety and Public Health Risks. Journal of Pharmaceutical Sciences, 100, 4571-4579.

[15]   Kerper, J. (2013) Boosting Security in the Pharmaceutical Supply Chain with Serialization. Healthcare Packaging: News, Trends and Analysis of Pharmaceuticals, Biologics, Medical Devices, and Nutraceuticals. tication/boosting-security-pharamceutical-supply-chain

[16]   US Food and Drug Administration (2013) Supply Chain Security Act (DSCSA): Title II of the Drug Quality and Security Act of 2013. SupplyChainSecurity/DrugSupply ChainSecurityAct/