DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Second SunBridge Healthcare Corp data breach in as many months

Posted on September 13, 2010 by Dissent

SunBridge Healthcare Corporation has experienced another theft involving protected health information.

On August 25, the company posted a press release to its site indicating that a BlackBerry containing unencrypted information about current and former residents and patients from eight Georgia nursing and rehabilitation centers was stolen from an employee’s desk on June 26, 2010. The theft was reported to the local law enforcement authorities and the company’s privacy officer, as well as HHS.

Information on the stolen device reportedly included current and former residents’ names, dates of birth, medical record numbers, dates of service and clinical data. No social security numbers, credit card data or other financial information was stored on the device.

According to its statement, the SunBridge-affiliated centers involved are the Renaissance, Fox Glove Court, Riverdale Place, Etowah Landing, Cartersville Heights, Folkston Park, Fountain City and Hazelhurst Court Care and Rehabilitation centers.

The majority of affected individuals were residents of these centers between December 2009 and June 2010. All told, 1,000 patients were affected.

The theft occurred less than two months after a laptop containing unencrypted data on 3,830 patients was stolen. In the first incident on May 11,  the company did not indicate whether the theft occurred on their premises or off-premises.

No related posts.

Category: Health Data

Post navigation

← Another data breach involving NYU School of Medicine?
KPMG employee loses unencrypted flash drive with patient info on 3,630 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.