DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stolen server contains medical info on 40,000 eye patients

Posted on May 17, 2010 by Dissent

OCR added a few more breaches to its list. Two were covered earlier today on PHIprivacy.net, but the third one, added later in the day, affected 40,000 people:

Silicon Valley Eyecare Optometry and Contact Lenses
State: California
Approx. # of Individuals Affected: 40,000
Date of Breach: 4/02/10
Type of Breach: Theft
Location of Breached Information: Network Server

An FAQ on the firm’s web site says, in part:

What happened?
On Friday morning April 2, 2010 at 5:30 a.m., two burglars broke an outside window to the administrative area of our office at 770 Scott Boulevard in Santa Clara, CA. Our security cameras show the intruders coming through the window, confiscating the computer, and pushing the computer and a plasma TV back out the window of entrance, all within 50 seconds. Our cameras recorded the type of vehicle they were driving. The alarm system was activated and the police were notified. A full police report was filed.

What data was stored on the stolen computer server?
The server that was stolen contained our patient data base information. The patient records contain names, addresses, phone numbers, and in some cases social security numbers. E-mail addresses birthdates, family members, medical insurances as well as medical and ocular health information was included. No Optomap retinal images were stored on the system. No credit card information was stored on the system.

Was the information secured?
Yes. There were 3 levels of security in place: physical, technical and administrative. Physical security consisted of locked doors, an alarm system to the police office, and surveillance cameras. For technical security, the data was password protected on two levels: a detailed password to access the server and a second password to access the patient data base. Administrative security was in place allowing no public access to the server.

Is all of my patient data lost?
No. Our patient data base is backed up nightly and an encrypted copy is stored off-site. We were able to restore our data and retrieve our patient records.

On April 23, the firm posted an update to its site indicating that a suspect had been arrested. On May 13, they reported:

We are working with the District Attorney’s office and the California Office of Health Information Integrity (CalOHI). The arrested suspect confessed to the theft. He will not release the name of the co-suspect who supposedly has the server. We have filed a complaint against him with the Cal OHI to enable them to work with the DA on this case. He can face a financial penalty of up to $250,000. It is unknown at this time if the suspects have accessed or were able to access any of the information stored on the computer server.

The firm also intends to upload a copy of the police report.

Thanks to the good folks over at ITRC who dropped me a note to tell me about this latest addition to OCR’s breach list.

Note: I decided to “feature” this post because I am really impressed with the clarity of their FAQ and documentation of the incident. Their FAQ could serve as a positive example of how to deal with a breach.

Related posts:

  • Massive Amount Of breached Chinese Government Servers By @DeadMellox
Category: Breach IncidentsHealth DataOf NoteTheftU.S.

Post navigation

← DIA official says privacy, security different for cloud
Data stolen from NADRA office in Karachi →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people
  • Terrible tales of opsec oversights: How cybercrooks get themselves caught
  • International Criminal Court hit with cyber attack during NATO summit
  • Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”
  • Iran-linked hackers threaten to release emails allegedly stolen from Trump associates
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.