DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TN: Centerstone client records swept away in flood waters

Posted on July 14, 2010 by Dissent

On July 2, Centerstone issued the following press release:

Pursuant to Federal Regulations 45CFR464.406 we are providing this notice of a potential breach of Protected Health Information to the media. Centerstone has made every attempt to notify any clients affected by this privacy breach by telephone call and/or first class letter prior to this notification.

During the weekend of April 30, 2010, flood waters broke windows of our Administrative office for School-Based Services located at 915 Rosa Parks Blvd, in Nashville, Tennessee. This office remained under five feet of water for over a week and Metro Police quarantined the area. Centerstone employees were not allowed to inspect premises until May 13. As a result of the unprecedented flooding that occurred, some clinical record information, along with name, Centerstone ID#, Social Security number, and date of birth, may have been removed from the building by the flood waters.

All possible efforts have been made to secure any files, electronic and/or paper, that remained in the building and to determine whether any files containing Protected Health Information (PHI) may have been removed by the flood waters. The contents of the building including file cabinets, desks, lap top computers, phones, and all related equipment and supplies presented as a total loss and unrecoverable. At this time we have no information to suggest that information lost in the flooding has been accessed or used in a manner that will cause harm to any persons, however, because we have been unable to recover the items swept away or damaged by the flood waters, we cannot be sure that this has not nor will not happen. Therefore, we are taking every precaution to notify clients seen in our School-Based Services division.

Centerstone sincerely regrets this possible breach of the privacy and security of protected health information. If you feel you may be impacted and have questions about your privacy or potential risk of identity theft, or would like information about receiving fraud protection, please see our contact Scott Valentine directly at 1-888-460-4001 or by email [email protected]. You may also contact Scott Valentine at Centerstone Health Information Management: PO Box 281107, Nashville, TN 37228-8502.

According to its notification to the U.S. Dept. of Health & Human Services, 1,537 clients were affected by the incident.

Centerstone’s web site describes it as:

the nation’s largest not-for-profit provider of community-based behavioral healthcare, offering a full range of mental health services, substance abuse treatment and related educational services in Indiana and Tennessee. In 2008, we served 64,000 individuals and families at our more than 120 facilities. We seek to prevent and cure mental illness and addiction.


Related:

  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception? (1)
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: Health Data

Post navigation

← SunBridge Healthcare notifies 3,830 residents of stolen laptop
SunBridge Healthcare notifies 3,830 residents of stolen laptop →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.