DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information

Posted on September 9, 2011 by Dissent

WISH reports:

The Indiana University School of Medicine is warning thousands of people that their medical records could have been breeched after someone stole a laptop back in August.

The medical school reports the laptop, stolen Aug. 16, contained records of 3,192 individuals that included name, age, sex, diagnosis, medical record number and in 178 cases, social security numbers.

Read more on WISH.

A notice on the school’s web site, linked from their home page states:

Notice on Possible Patient Record Breach

September 9, 2011

INDIANAPOLIS — On September 2, the Indiana University School of Medicine began sending letters to 3,192 individuals that the theft of a password-protected, computer laptop may have compromised their confidential patient information. The laptop, belonging to a physician in the school’s Department of Surgery, contained information, such as name, age, sex, diagnosis, medical record number, and in 178 instances, the individual’s Social Security number. The information was being used for research purposes.Although the laptop computer was password protected, there is a possibility that the information could be accessed by a computer specialist with enough time and resources.

The disappearance of the laptop, apparently stolen from the physician’s vehicle on Tuesday, August 16, 2011, was immediately reported to law enforcement.

The IU School of Medicine is providing detailed information to those who might be affected by this incident at medicine.iu.edu/research/media-alert-faqs/, including suggestions how affected individuals may protect themselves from the possible unauthorized use of their personal information.

The IU School of Medicine and the IU Department of Surgery deeply regret this incident and are taking steps and security measures to minimize the likelihood of future incidents.

So why wasn’t IU informed of the theft until more than two weeks later?  That’s not good.

According to the FAQ’s on the breach, the laptop held data on some patients going back to 1980, not all of whom may have been directly asked to permit their data to be used for research purposes.  I do not mention this to suggest that IU did anything illegal, but merely to note that some people may never have consented to the researcher having their name and other information.

IU acknowledged that errors were made:

… the computer laptop was password protected and stored behind a locked door – but it should have been stored using “encryption,” a process that makes it extremely difficult for a third person to see and/or the information should have been “de-identified,” a process that removes any way to link it to an individual.

While acknowledging that errors were made, I note that IU did not offer those affected any free credit monitoring services – even, apparently, the 178 individuals whose SSN were involved.

No related posts.

Category: Breach IncidentsEducation SectorHealth DataTheftU.S.

Post navigation

← Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information
TX: Methodist Hospital employee stole cancer patients’ information for payday loan fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.