DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Texas Children's Hospital and Baylor College of Medicine Report Stolen Laptop

Posted on July 30, 2010 by Dissent

From the Baylor College of Medicine and Texas Children’s Hospital‘s web sites:

On May 13, 2010, a physician from Baylor College of Medicine and affiliated with Texas Children’s Hospital had his password-protected laptop stolen from an office at Texas Children’s Hospital in Houston, Texas. Electronic files on the laptop contained demographic and clinical information of approximately 1600 cardiology patients, including names, medical record numbers, dates of service, diagnoses and dates of birth. No patient or parent financial or insurance information was stored on the laptop. This did not affect all of our patients. Texas Children’s Hospital has mailed notices to the persons affected in accordance with state, federal, and international laws.

Patient confidentiality is a top priority at Texas Children’s Hospital and Baylor College of Medicine. The hospital and medical school assure its patients, and the parents of its patients, that they took immediate steps to investigate and attempt to recover the laptop. There is no evidence to believe that any of the confidential information stored on the computer has been accessed or used for fraudulent purposes. We sent individual letters and are posting this notice as precautionary measures to advise parents and guardians of affected patients of an incident that involved some patient information.

A police report was filed with the Houston Police Department and the hospital and medical school fully cooperated with law enforcement’s investigation. Texas Children’s Hospital in cooperation with the Houston Police Department subsequently apprehended the suspect and charges have been filed. Unfortunately, the laptop has not yet been recovered.

The hospital and medical school have taken many steps to help keep this from happening in the future. Safeguard requirements and policies and procedures for laptops have been reviewed and we are in the process of encrypting patient data to help ensure that patient data is stored and handled in a secure manner. Workforce members have also been re-educated about the importance of laptop and password security.

The hospital and medical school deeply regret that this occurred and we are committed to fully protecting all of the information entrusted to us by parents and patients.

We are providing notification of this matter because we believe that it is important for our patients and their families to know how seriously we take this, the steps we are taking to remedy a breach such as this, and to fulfill requirements under state and federal law. For questions, patient or patient families can call 1-877-631-0440 Monday through Friday between 7 A.M. and 5:00 P.M. and refer to # 2222072910 when prompted.

Category: Health Data

Post navigation

← CT: Three charged with credit card fraud/ID theft ring at local stores
Two computer thefts at Montefiore Medical Center put sensitive data at risk (update 1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.