DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information

Posted on September 9, 2011 by Dissent

WISH reports:

The Indiana University School of Medicine is warning thousands of people that their medical records could have been breeched after someone stole a laptop back in August.

The medical school reports the laptop, stolen Aug. 16, contained records of 3,192 individuals that included name, age, sex, diagnosis, medical record number and in 178 cases, social security numbers.

Read more on WISH.

A notice on the school’s web site, linked from their home page states:

Notice on Possible Patient Record Breach

September 9, 2011

INDIANAPOLIS — On September 2, the Indiana University School of Medicine began sending letters to 3,192 individuals that the theft of a password-protected, computer laptop may have compromised their confidential patient information. The laptop, belonging to a physician in the school’s Department of Surgery, contained information, such as name, age, sex, diagnosis, medical record number, and in 178 instances, the individual’s Social Security number. The information was being used for research purposes.Although the laptop computer was password protected, there is a possibility that the information could be accessed by a computer specialist with enough time and resources.

The disappearance of the laptop, apparently stolen from the physician’s vehicle on Tuesday, August 16, 2011, was immediately reported to law enforcement.

The IU School of Medicine is providing detailed information to those who might be affected by this incident at medicine.iu.edu/research/media-alert-faqs/, including suggestions how affected individuals may protect themselves from the possible unauthorized use of their personal information.

The IU School of Medicine and the IU Department of Surgery deeply regret this incident and are taking steps and security measures to minimize the likelihood of future incidents.

So why wasn’t IU informed of the theft until more than two weeks later?  That’s not good.

According to the FAQ’s on the breach, the laptop held data on some patients going back to 1980, not all of whom may have been directly asked to permit their data to be used for research purposes.  I do not mention this to suggest that IU did anything illegal, but merely to note that some people may never have consented to the researcher having their name and other information.

IU acknowledged that errors were made:

… the computer laptop was password protected and stored behind a locked door – but it should have been stored using “encryption,” a process that makes it extremely difficult for a third person to see and/or the information should have been “de-identified,” a process that removes any way to link it to an individual.

While acknowledging that errors were made, I note that IU did not offer those affected any free credit monitoring services – even, apparently, the 178 individuals whose SSN were involved.


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Breach IncidentsEducation SectorHealth DataTheftU.S.

Post navigation

← Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information
TX: Methodist Hospital employee stole cancer patients’ information for payday loan fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.