DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UHW Trustees Working to Address Security Breach (update 1)

Posted on February 27, 2009 by Dissent

Statement of Dave Regan, Trustee of United Healthcare Workers West (UHW), regarding the recent disclosure of a security breach at UHW in July 2007 of 29,500 workers, resulting in credit and identity theft problems for 155 employees of Kaiser Permanente:

Last month, UHW was placed in trusteeship after an outside hearing officer confirmed a number of problems, financial and otherwise, occurring at the local. Upon further investigation, we discovered a pattern of irregularities and breaches of security protocols under the former leadership of the local. Among those breaches includes the July 2007 theft by a former UHW employee of information typically considered to be Kaiser Permanente employee personal data, including employee name, address, phone number, Social Security number and date of birth. No personal health or member related information was included in the breach.

“Upon learning of this incident in January 2009, the Trustees of UHW immediately notified the members that might have been affected by that breach of security. We have worked aggressively with law enforcement and Kaiser Permanente to identify the culprit and protect the members that were exposed.

Read more of the Press Release

The incident is not the first time Kaiser suffered a breach involving employee theft and misuse of data. In 2006, two contract employees were arrested on charges of stealing patient information and using it for fraudulent purposes. A number of cases of “new account” fraud were reported in that incident, too.

Update 1: Kaiser has apparently issued a press release, although I have not yet found the full text of the release. It is quoted in some mainstream California news sources, however. Sandy Kleffman of the Contra Costa Times reports that:

The theft came to light after the arrest of San Ramon resident Mia Garza, 28, on Dec. 23 on suspicion of possession of stolen property and forgery. In a confiscated computer, San Ramon police later found a file with the Kaiser employee data.

Garza was not a Kaiser employee and it is not clear how she obtained the information. No Kaiser-member health data has been compromised.

“We are continuing to work closely with local and federal law enforcement as they investigate potential suspects outside of Kaiser Permanente regarding this data breach,” said Gay Westfall, senior vice president of human resources for Kaiser.

Kaiser has offered to provide one year of free credit monitoring to affected employees.

Stan Oklobdzija of the Sacramento Bee adds that “About 6,000 of the 11,000 workers in Sacramento and Roseville area clinics and hospitals were affected, officials at Kaiser Permanente said.”


Related:

  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
Category: Breach IncidentsBusiness SectorID TheftInsiderTheftU.S.

Post navigation

← UT: Files of personal information discovered by dumpster
UK: Health records of Brown and Salmond ‘hacked’ →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.