Hostname: page-component-68945f75b7-76l5x Total loading time: 0 Render date: 2024-08-06T05:29:30.475Z Has data issue: false hasContentIssue false

Investigation of a Computer Virus Outbreak in the Pharmacy of a Tertiary Care Teaching Hospital

Published online by Cambridge University Press:  21 June 2016

Thomas C. Bailey
Affiliation:
Division of Infectious Diseases, Department of Medicine, Washington University School of Medicine, St. Louis, Missouri
Richard M. Reichley
Affiliation:
Pharmacy Department, The Jewish Hospital of St. Louis, St. Louis, Missouri

Abstract

Objective:

A computer virus outbreak was recognized, verified, defined, investigated, and controlled using an infection control approach. The pathogenesis and epidemiology of computer virus infection are reviewed.

Design:

Case-control study.

Setting:

Pharmacy of a tertiary care teaching institution.

Results:

On October 28, 1991, 2 personal computers in the drug information center manifested symptoms consistent with the “Jerusalem” virus infection. The same day, a departmental personal computer began playing ‘Yankee Doodle,” a sign of “Doodle” virus infection. An investigation of all departmental personal computers identified the “Stoned” virus in an additional personal computer. Controls were functioning virus-free personal computers within the department. Cases were associated with users who brought diskettes from outside the department (5/5 cases versus 5/13 controls, p = .04) and with College of Pharmacy student users (3/5 cases versus 0/13 controls, p = .012). The detection of a virus-infected diskette or personal computer was associated with the number of 5 1/4-inch diskettes in the files of personal computers, a surrogate for rate of media exchange (mean= 17.4 versus 152.5, p = .018, Wilcoxon rank sum test). After education of departmental personal computer users regarding appropriate computer hygiene and installation of virus protection software, no further spread of personal computer viruses occurred, although 2 additional Stoned-infected and 1 Jerusalem-infected diskettes were detected.

Conclusions:

We recommend that virus detection software be installed on personal computers where the interchange of diskettes among computers is necessary, that write-protect tabs be placed on all program master diskettes and data diskettes where data are being read and not written, that in the event of a computer virus outbreak, all available diskettes be quarantined and scanned by virus detection software, and to facilitate quarantine and scanning in an outbreak, that diskettes be stored in organized files.

Type
Brief Report
Copyright
Copyright © The Society for Healthcare Epidemiology of America 1992 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1. Sturek, JK. Point-of-service computer system and drug-use evaluation: implications for pharmacy practice in ambulatory care. Am J Hosp Pham. 1989;46:S17S20.Google ScholarPubMed
2. Ishimoto, K, Ishimitsu, T, Koshiro, A, Hirose, S. Computer simulation of optimum personnel assignment in a hospital pharmacy using a work-sampling method. Med Inf (Lond). 1990;15:343354.Google Scholar
3. Schlicht, JR, Fowler, TJ. Use of a personal computer to monitor adverse drug reactions. Hosp Pharm. 1991;26:2326 Google ScholarPubMed
4. Juni, JE. Computer-virus infection of a medical diagnostic computer. N Engl J Med. 1989;320:811812. Letter.Google ScholarPubMed
5. Harkin, P. Computer viruses. Br Med J. 1988;297:688. Letter.CrossRefGoogle ScholarPubMed
6. Croall, J. Computer viruses. Br Med J. 1988;297:981982. Letter.CrossRefGoogle ScholarPubMed
7. Nanjundiah, V. Computer viruses. Br Med J. 1988;297:1332. Letter.CrossRefGoogle ScholarPubMed
8. Ritchie, LD, Taylor, MW, Milne, R, Duncan, R. Computer virus infection. Lancet. 1991;338:1598. Letter.CrossRefGoogle ScholarPubMed
9. Denning, PJ. Computer viruses. In: Denning, PJ, ed. Computers Under Attack: Intruders, Worms and Viruses. New York, NY: ACM Press; 1990:285292.Google Scholar
10. Goretsky, A. VTRUSCAN Version 7.9V84 Documentation. Santa Clara, Calif: McAfee Associates; 1991.Google Scholar
11. McAfee, JD. Managingthe virus threat. Computerworld. 1989;2:89.Google Scholar
12. Spafford, EH, Heaphy, KA, Ferbrache, DJ. A computer virus primer. In: Denning, PJ, ed. Computers Under Attack: Intruders, Worms and Viruses. New York, NY: ACM Press: 1990:316355.Google Scholar
13. Skulason, F. FPROT Version 2.02D. Reykjavik, Iceland: Frisk Software International; 1992.Google Scholar
14. Murray, WH. The application of epidemiology to computer viruses. Computers and Security. 1988:7:139145.CrossRefGoogle Scholar
15. Ellison, C. On guard: 20 utilities that battle the virus threat. personal computer Magazine. 1991;10:199280.Google Scholar
16. Heim, J. Antivirus and security products. personal computer World. l991;9:245249.Google Scholar