DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Texas Children’s Hospital and Baylor College of Medicine Report Stolen Laptop

Posted on July 30, 2010 by Dissent

From the Baylor College of Medicine and Texas Children’s Hospital‘s web sites:

On May 13, 2010, a physician from Baylor College of Medicine and affiliated with Texas Children’s Hospital had his password-protected laptop stolen from an office at Texas Children’s Hospital in Houston, Texas. Electronic files on the laptop contained demographic and clinical information of approximately 1600 cardiology patients, including names, medical record numbers, dates of service, diagnoses and dates of birth. No patient or parent financial or insurance information was stored on the laptop. This did not affect all of our patients. Texas Children’s Hospital has mailed notices to the persons affected in accordance with state, federal, and international laws.

Patient confidentiality is a top priority at Texas Children’s Hospital and Baylor College of Medicine. The hospital and medical school assure its patients, and the parents of its patients, that they took immediate steps to investigate and attempt to recover the laptop. There is no evidence to believe that any of the confidential information stored on the computer has been accessed or used for fraudulent purposes. We sent individual letters and are posting this notice as precautionary measures to advise parents and guardians of affected patients of an incident that involved some patient information.

A police report was filed with the Houston Police Department and the hospital and medical school fully cooperated with law enforcement’s investigation. Texas Children’s Hospital in cooperation with the Houston Police Department subsequently apprehended the suspect and charges have been filed. Unfortunately, the laptop has not yet been recovered.

The hospital and medical school have taken many steps to help keep this from happening in the future. Safeguard requirements and policies and procedures for laptops have been reviewed and we are in the process of encrypting patient data to help ensure that patient data is stored and handled in a secure manner. Workforce members have also been re-educated about the importance of laptop and password security.

The hospital and medical school deeply regret that this occurred and we are committed to fully protecting all of the information entrusted to us by parents and patients.

We are providing notification of this matter because we believe that it is important for our patients and their families to know how seriously we take this, the steps we are taking to remedy a breach such as this, and to fulfill requirements under state and federal law. For questions, patient or patient families can call 1-877-631-0440 Monday through Friday between 7 A.M. and 5:00 P.M. and refer to # 2222072910 when prompted.


Related:

  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • SEC Voluntarily Dismisses SolarWinds Litigation
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident' impacting city's IT systems
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • Large medical lab in South Africa suffers multiple data breaches
Category: Breach IncidentsEducation SectorHealth DataTheftU.S.

Post navigation

← Two computer thefts at Montefiore Medical Center put sensitive data at risk (update 1)
TX: Child support fraud sweep nets two more (update 1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Google and Apple roll out emergency security updates after zero-day attacks
  • Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data
  • Virginia Urology Silent on Possible Data Breach as Purported Patient Data Begins to Leak
  • Village of Golf Manor considering paying ransom amid cyberattack (1)
  • Teen who allegedly stole millions of personal data records arrested in Spain
  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief
  • Justice Department Announces Actions to Combat Two Russian State-Sponsored Hacking Groups
  • Should entities be required to disclose the name of a vendor if the breach was at the vendor’s?

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Tool allows stealthy tracking of Signal and WhatsApp users through delivery receipts
  • Oh Great, Smart Glasses That Record Everything You Say
  • CBP Agents Held This U.S. Citizen for Hours Until He Agreed To Let Them Search His Electronic Devices
  • U.S. Plans to Scrutinize Foreign Tourists’ Social Media History
  • ANNOUNCEMENT: EFF Launches Age Verification Hub as Resource Against Misguided Laws

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.