DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Laptop stolen from VA contractor contains veterans' personal data

Posted on May 14, 2010 by Dissent

I posted this yesterday to DataBreaches.net, but am posting it here, too, because even though the coverage so far doesn’t specifically mention that veterans’ health data were involved, it is a distinct possibility. Also, in updates to this story, it seems that the April 22 laptop theft affected 616 veterans, not 644 as originally reported:

Bob Brewin reports on a breach that I don’t think we knew about here:

A laptop belonging to a contractor working for the Veterans Affairs Department was stolen earlier this year and the personal data on hundreds of veterans stored on the computer was not encrypted, a violation of a VA information technology policy, said the top-ranking Republican on the House Veterans Affairs Committee.

The VA reported the theft of the laptop from an unidentified contractor to the committee on April 28 and informed members the computer contained personally identifiable information on 644 veterans, including data from some VA medical centers’ records, according to a letter Rep. Steve Buyer, R-Ind., sent to VA Secretary Eric Shenseki.

The VA declined to identify the contractor:

The laptop was stolen from a contractor employee’s car on April 22, and she notified local police within 10 minutes, said Roger Baker, chief information officer at VA, in an interview. Although the vendor had certified to VA that it had encrypted laptops that stored department data, Baker confirmed the data on the stolen laptop was unencrypted.

The vendor, who Baker declined to identify because he said it would make it more difficult for contractors to report future data breaches if they knew their name would be made public, reported the theft to VA on April 23.

So contractors for entities covered by HIPAA/HITECH have their names made public by HHS but the VA decides it can withhold the contractor’s identity? If that laptop contained any unprotected health information on the veterans (and the laptop had access to medical center data), then the contractor *will* be publicly identified on OCR’s site (unless it’s a “private practice” contractor), as over 500 individuals were affected. In any event, I firmly believe that all contractors who leave laptops with unencrypted PII or PHI in a vehicle for stealing should be publicly named, at the very least.

But the news is even worse:

After learning about the unencrypted laptop, Buyer investigated how many VA contractors might not be complying with the encryption requirement and learned that 578 vendors had refused to sign new contract clauses that required them to encrypt veteran data on their computers, an apparent violation of rules.

Buyer told Shinseki that the vendor had 69 contracts in more than half of the department’s 21 regional medical networks operated by the Veterans Health Administration, and 25 of those contracts, more than a third, did not have a clause that required data be encrypted.

Note that it’s not totally clear to me whether the vendor with 69 contracts is the same contractor that had the laptop stolen with 644 veterans’ info on it. Representative Buyer’s letter indicates that there were two breaches in Texas in the past two weeks and he prefaces the comments about the vendor with 69 contracts saying, “The most current breach involved a service disabled veteran owned business that had an unencrypted laptop stolen.” Was this the same laptop theft or the second one? It may be the second one alluded to. It really would help if they would name the vendors!

Read the full news coverage on Nextgov.

Category: Health Data

Post navigation

← Los Angeles Firemen’s CU Has Data Breach
Court rejects Qchex’s appeal →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Former Hilliard treatment center employee accused of selling patient data on dark web
  • Trump Rewrites Cybersecurity Policy in Executive Order
  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.