DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Texas Children's Hospital and Baylor College of Medicine Report Stolen Laptop

Posted on July 30, 2010 by Dissent

From the Baylor College of Medicine and Texas Children’s Hospital‘s web sites:

On May 13, 2010, a physician from Baylor College of Medicine and affiliated with Texas Children’s Hospital had his password-protected laptop stolen from an office at Texas Children’s Hospital in Houston, Texas. Electronic files on the laptop contained demographic and clinical information of approximately 1600 cardiology patients, including names, medical record numbers, dates of service, diagnoses and dates of birth. No patient or parent financial or insurance information was stored on the laptop. This did not affect all of our patients. Texas Children’s Hospital has mailed notices to the persons affected in accordance with state, federal, and international laws.

Patient confidentiality is a top priority at Texas Children’s Hospital and Baylor College of Medicine. The hospital and medical school assure its patients, and the parents of its patients, that they took immediate steps to investigate and attempt to recover the laptop. There is no evidence to believe that any of the confidential information stored on the computer has been accessed or used for fraudulent purposes. We sent individual letters and are posting this notice as precautionary measures to advise parents and guardians of affected patients of an incident that involved some patient information.

A police report was filed with the Houston Police Department and the hospital and medical school fully cooperated with law enforcement’s investigation. Texas Children’s Hospital in cooperation with the Houston Police Department subsequently apprehended the suspect and charges have been filed. Unfortunately, the laptop has not yet been recovered.

The hospital and medical school have taken many steps to help keep this from happening in the future. Safeguard requirements and policies and procedures for laptops have been reviewed and we are in the process of encrypting patient data to help ensure that patient data is stored and handled in a secure manner. Workforce members have also been re-educated about the importance of laptop and password security.

The hospital and medical school deeply regret that this occurred and we are committed to fully protecting all of the information entrusted to us by parents and patients.

We are providing notification of this matter because we believe that it is important for our patients and their families to know how seriously we take this, the steps we are taking to remedy a breach such as this, and to fulfill requirements under state and federal law. For questions, patient or patient families can call 1-877-631-0440 Monday through Friday between 7 A.M. and 5:00 P.M. and refer to # 2222072910 when prompted.

Category: Health Data

Post navigation

← CT: Three charged with credit card fraud/ID theft ring at local stores
Two computer thefts at Montefiore Medical Center put sensitive data at risk (update 1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.