DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Baptist Health alerts patients to ID theft

Posted on July 2, 2008 by Dissent

This is a different Baptist hospital than the story reported just previous to this one.

Toby Manthey reports in the Arkansas Democrat-Gazette:

Baptist Health has sent letters warning about 1, 800 patients that the hospital system’s records may have been breached, the Arkansas Democrat-Gazette has learned.

The notification came after the arrest of a Baptist Health employee at a Wal-Mart store on 25 counts of financial identity fraud.

The letters, mailed last week, follow the firing of the woman in early June. North Little Rock police say Tamara Hill, 30, of that city worked at Baptist Health Medical Center-North Little Rock in the emergency department.

Hill, an admissions clerk, was arrested May 30 at the Wal-Mart at 12001 Maumelle Blvd. in North Little Rock by North Little Rock police.

Ebony Flowers, 25, also of North Little Rock, was arrested at the store the same day on three counts of identity fraud, police reports say. Flowers was listed in a police report as a janitor for the North Little Rock School District.

Police reports say the women used a victim’s personal information to obtain temporary Wal-Mart “account authorization numbers” — credit cards, essentially — used to buy Wal-Mart gift cards.

The victim reported to police that he had not authorized the transactions, the reports show.

When contacted by the Democrat-Gazette, the same victim confirmed he was a Baptist Health patient. He expressed appreciation of the handling of the case by the system and by the North Little Rock police.

Among the items found during a search connected with the arrest of Hill was personal information for 24 other people, including “screen shots” — printouts showing the exact appearance of the images on a computer screen — that showed victims’ personal information. Also found were four Wal-Mart gift cards and $ 1, 490 in cash, police reports show.

[…]

The June 24 letter from Baptist Health to patients stated: “Due to a breach of our information systems security policies, there is a possibility that some personal information, such as your name, address, date of birth, Social Security number, and reason for coming to Baptist Health, was accessed by an unauthorized person.” No information in the patient’s “medical records” and no information about the patient’s diagnosis or prognosis was accessed, the letter said.

But while no “medical record” information was accessed, the letter mentioned the patient’s “reason for coming” to the system possibly was accessed. Lowman said a reason stated by a patient using the system isn’t considered medical information because the reason is a layman’s explanation, not one from a medical professional.

He said the breach wouldn’t violate the Health Insurance Portability and Accountability Act, or HIPAA.

But Pam Dixon, executive director of the San Diego-based World Privacy Forum, a privacy advocacy group, thinks all the information mentioned in the letter falls under HIPAA.

“It doesn’t matter that [it’s not ] a prognosis or diagnosis,” she said.

Dixon found the system’s letter lacking in several respects, such as clarifying the exact meaning of a “reason for coming to Baptist Health.” The letter also should have mentioned when and for how long the breach occurred, she said.

“Almost all breach letters have that,” Dixon added.

Several weeks passed before patients were notified by the letter. Baptist Health sent the letter after it learned more of the scope of the police investigation and audited what Hill had access to, according to Lowman.

Dixon said Baptist Health should have offered in the letter to set up free credit monitoring for victims. Nothing made clear late Tuesday whether Baptist Health is offering such a free service or for how many people.

[…]

Comment: I agree with Pam Dixon in her comments that the reason for accessing the system falls under HIPAA as protected health information, but then, I am not a lawyer or with HHS. It will be interesting to see what others think about that.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← Hospital: Forgers defrauded patients
UK: Health worker loses patient files →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.