DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Palmetto General Hospital employee and accomplice sentenced for stealing patient records

Posted on October 31, 2009 by Dissent

Jacquettia L. Brown, 29, and Tear Renee Barbary, 25, both residents of Miami-Dade County, were both sentenced this week following their conviction on offenses relating to the theft of patient records from Palmetto General Hospital to further a fraud scheme.

U.S. District Court Judge K. Michael Moore sentenced Brown to two years and five days of imprisonment, to be followed by three years of supervised release. Barbary was sentenced to eleven months of imprisonment, to be followed by three years of supervised release. Both Brown and Barbary were prohibited from working in the health care industry while on supervised release.

Brown and Barbary had previously been convicted of conspiracy to commit access device fraud, in violation of Title 18, United States Code, Section 1029(b)(2), and criminal violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Title 42, United States Code, Sections 1320d-6(a)(2), (a)(3), and (b)(3). In addition, Brown was convicted of aggravated identity theft, in violation of Title 18, United States Code, Section 1028A(a)(1).

According to documents filed in the case and statements made in court, Brown stole patient profile records while she was working as a medical records employee of Palmetto General Hospital. The records contained individually identifiable health information of Palmetto General Hospital patients, including patients’ names, birthdates, addresses, Social Security numbers, diagnoses, and next of kin contacts, among other information.

Brown and Barbary then used the stolen personal information to further a credit card fraud conspiracy. Brown used the stolen identifying information to obtain patients’ credit card account numbers. She gave patient profile records and credit card account numbers to Barbary, who used the information to make unauthorized credit card purchases. When law enforcement officials disrupted the scheme in May 2009, Brown was in possession of 41 patient profile records and Barbary was in possession of six patient profile records. Brown admitted to stealing patient information from her employer since September 2008.

The confidentiality of patient information is strictly protected by HIPAA. HIPAA precludes the unauthorized release of information that is created or received by a health care provider and relates to the past, present, or future physical or mental condition of an individual, the provision of health care to the individual, or the past, present, or future payment for the provision of health care to an individual, and that either identifies the individual or includes information that could be used to identify the individual.

Jeffrey H. Sloman, Acting United States Attorney for the Southern District of Florida, commended the efforts of agents and investigators from the Identity Theft and Economic Crimes Task Force, U.S. Postal Inspection Service, and the Miami Dade Police Department for their work on this case. Sloman also thanked Tenet Healthcare Corporation, parent company of Palmetto General Hospital, for its cooperation in the investigation of this matter. This case was prosecuted by Assistant U.S. Attorney Christopher J. Hunter.

Source: U.S. Attorney’s Office

Category: Breach IncidentsHealth DataID TheftInsiderOf NoteU.S.

Post navigation

← Database bug at Woot leaves reader wary of ordering
Garden Grove man gets 11 years prison for ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
  • HHS OCR Settles HIPAA Security Rule Investigation of BayCare Health System for $800k and Corrective Action Plan
  • UK: Two NHS trusts hit by cyberattack that exploited Ivanti flaw
  • Update: ALN Medical Management’s Data Breach Total Soars to More than 1.8 Million Patients Affected
  • Russian-linked hackers target UK Defense Ministry while posing as journalists
  • Banks Want SEC to Rescind Cyberattack Disclosure Requirements
  • MathWorks, Creator of MATLAB, Confirms Ransomware Attack
  • Russian hospital programmer gets 14 years for leaking soldier data to Ukraine
  • MSCS board renews contract with PowerSchool while suing them

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.