DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VA and other new breach reports on OCR's breach list (updated)

Posted on May 20, 2010 by Dissent

OCR has updated its web site of reported breaches to now include the VA breach being reported in the news this week, as well as other breaches. Breaches not previously reported in the media or on this site are tagged with  asterisks, below:

Veterans Health Administration
State: District of Columbia
Business Associate Involved: Heritage Health Solutions
Approx. # of Individuals Affected: 656
Date of Breach: 4/22/10
Type of Breach: Theft
Location of Breached Information: Laptop

Note: Although OCR’s web site lists D.C. as the state, media reports on Congressional hearings report that the incident occurred in Texas.  HHS’s web site was subsequently updated to indicate:

A laptop was stolen from an employee of the business associate.  The computer contained the protected health information (PHI) of 656 individuals.  The PHI involved in the breach included names, social security numbers, dates of birth, and medication information.  In response to this incident, the covered entity took steps to enforce the requirements of its business associate agreement with Heritage Health.  The business associate installed encryption software on all employee computers, strengthened access controls including passwords, reviewed and updated security policies and procedures, and made improvements to the physical security of the building.  In addition, the responsible employee was counseled, and all employees received additional security training.

** Private Practice Heriberto Rodriguez-Ayala, M.D.
City and State: McAllen, Texas
Approx. # of Individuals Affected: 4,200
Date of Breach: 4/03/10
Type of Breach: Theft
Location of Breached Information: Laptop

HHS’s web site was subsequently updated to include the doctor’s name and a description of the incident:

An unencrypted laptop computer was stolen from a personal vehicle. The laptop computer contained the protected health information of approximately 4,200 individuals. The protected health information involved in the breach included names, addresses, phone numbers, dates of birth, Social Security numbers, treatment histories, and some drivers’ license numbers. The covered entity notified the affected individuals and the media. Following the breach, the covered entity implemented new policies and procedures, retrained staff, and installed encryption software on all workstations.

** Georgetown University Hospital

State: District of Columbia
Approx. # of Individuals Affected: 2,416
Date of Breach: 3/26/10
Type of Breach: Theft, Other
Location of Breached Information: E-mail, Portable Electronic Device

Note: I could not find any notice of this breach linked from GUH’s home page or in their news releases.

State of New Mexico Human Services Department, Medical Assistance Division
State: New Mexico
Business Associate Involved: DentaQuest
Approx. # of Individuals Affected: 9,600
Date of Breach: 3/20/10
Type of Breach: Theft
Location of Breached Information: Laptop

** Rockbridge Area Community Services
State: Virginia
Approx. # of Individuals Affected: 500
Date of Breach: 3/12/10
Type of Breach: Theft
Location of Breached Information: Laptop, Desktop Computer

Note: RACS posted a copy of their notification letter to clients on their web site, here.  The letter indicates that computers stolen from a fire-damaged building contained unencrypted names, Social Security Numbers, and other confidential information.  RACS provides mental health, substance abuse, and prevention services.

Updated 1-29-11 to add name and incident details on two breaches.

Category: Health Data

Post navigation

← New report on recent VA breaches identifies one contractor
PlainsCapital, former customer settle cyber fraud dispute →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.