DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Whistleblower lawsuit against Kaiser (updated)

Posted on August 10, 2009 by Dissent

At a time when concerns about the privacy and security of electronic health records are a hot topic and the issue of private vs. public health insurance is making the front pages, a lawsuit filed by a former Kaiser employee alleges that Kaiser knowingly and repeatedly violated HIPAA, exposed millions of members to identity theft, and ripped members off by not keeping track of deductibles and co-payments.

A whistleblower lawsuit filed by a former employee against Kaiser in Los Angeles County Superior Court names Kaiser Foundation Health Plan (KFHP), KP Program Group, and Robb Munson, Vice-President of Health Plan Service and Administration for KFHP as defendants. The plaintiff is John Denning, a former Senior Enterprise Architect and Director of Claims for Northern California.

[…]

Allegations of HIPAA Violations

Denning’s complaint also alleges two patient privacy breaches that have never been reported in the media:

1. Denning claims that in November 2007, he discovered a security breach involving all Kaiser members in Northern California diagnosed with dementia. According to the complaint, Kaiser’s Dementia Registry had been placed on a “widely accessible public share drive” on Kaiser’s network. Denning claims that he reported the problem to the KPIT help desk, but the problem continued, and he then reported the problem to the KPIT Compliance Officer. According to the complaint:

That officer told Plaintiff that Kaiser leadership did not care and that there was widespread violations of HIPAA throughout the Kaiser network and throughout the organization. He told Plaintiff that the only way he could get the company’s attention would be to send the information anonymously on a disk to George Halverson, Kaiser Foundation Health Plan’s then CEO, at his home with a note telling him that unless this was corrected by a certain date, the next time he would see the information would be in the New York Times.

Denning claims that he did not do that, but instead, reported the breach to the National Compliance Hotline. Again, he reported getting no response.

2. Denning also claims that sometime around April 2008, Kaiser employees in his building

were regularly dumping thousands of unshredded patient health information (“PHI”) paper records that they had printed that included patient names, other identifying records including their social security numbers, banking information, diagnoses, prescriptions, and other sensitive sensitive information into public trash bins which were unlocked, unmanaged, and totally exposed to public scrutiny.

Denning claims that he reported the situation to the Compliance Officer for his department and followed up repeatedly.

Months later, Kaiser management claimed to have done an “investigation” of Plaintiff’s report and denied that any HIPAA violations had been or were taking place, despite the fact that Plaintiff and at least five other Kaiser employees confirmed that they had witnessed the on-going illegal dumping of patient records.

According to the complaint, he reported the alleged HIPAA violations to the U.S. Department of Health and Human Services (“HHS”) on at least three occasions…

Read more on PHIprivacy.net

Update: The original article on phiprivacy.net has been updated to include a response from Kaiser to the allegations.

Category: Breach IncidentsBreach TypesExposureHealth DataOf NotePaper

Post navigation

← Amuse reports leak, possible hack
Chinese hackers detained →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.