DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Over 23,000 patients notified in three breaches reported to HHS

Posted on September 21, 2010 by Dissent

In looking at the most recent update to HHS’s web site, I noted three other breaches that we did not know about already from other sources:

The Kent Center
The Kent Center in Rhode Island reported that paper records of 1,361 patients were stolen in July. In a notification linked from the homepage of their web site, they write, in part:

On July 13, 2010, a briefcase was stolen from the car of one of our clinicians. Documents in the briefcase included client names, dates of birth, and for some clients involved in the court system, limited clinical information. This did not affect all of the clients we have ever treated and the individuals it did affect have been sent written notifications. We learned about this incident the same day and it has been reported to the Providence Police Department. The briefcase resembled a laptop carrying case and we have no reason to believe the documents in the briefcase were the target of the theft. Other items in the car were stolen and the police informed our employee that there were several car break-ins on the same night in the area.

No financial information, such as social security numbers, addresses, insurance information, guarantor information, credit or debit card information or bank account numbers were included in the documents contained in the briefcase.

The employee involved received a reprimand.

Curtis R. Bryan, MD
Virginia psychiatrist Curtis R. Bryan, MD reported that a stolen laptop contained PHI on 2,739 patients. The laptop was stolen July 12. A notice prominently placed on the home page of his website states, in part:

A potential breach of unsecured patient personal health information (“PHI”) may have occurred when a computer possibly containing patient PHI was stolen from my private office at Kingsborough Square during a burglary that took place on July 12, 2010. The stolen files may have contained information from my private patients as well as patients I have seen in other locations to include Chesapeake, Norfolk, Portsmouth and Virginia Beach. This data may have included names, dates of birth, other personal identifying data, and/or diagnoses and/or treatment information depending on the location where the services were provided and what type of services were provided To the best of our knowledge, no phone numbers or personal financial information were located or identified in any of these stolen files.

The laptop was stolen from the office:

Though the office was secured by four locks requiring three different keys to gain entrance and the window was locked, the window was not sufficiently fortified to withstand blunt force. To protect against the recurrence of this burglary technique, we have upgraded our security system in direct response to this event to include motion and heat sensors. Although this security upgrade should help us better protect your personal health information, we are taking additional steps to further reduce the likelihood of a future unauthorized disclosure of your PHI.

We have upgraded the password features of our computers. In addition, we are transferring all patient data to encrypted flash drives at the end of each day. These flash drives are Iron Key flash drives that require passwords. This type of flash drive destroys the data on the drive and renders it useless if the user fails to guess the correct password by the eighth attempt. Since we cannot render the office completely safe from this burglary technique due to the extremely brief amount of time required to conduct such a burglary, we are minimizing the ability of an unauthorized third party to access your PHI in the event of future computer theft through encryption and password protection.

Pediatric and Adult Allergy, PC
The Iowa-based center reported that 19,222 patients had PHI on a backup tape that was discovered missing on July 11. A series of FAQs are linked from a prominent place on the center’s website homepage. Any patient who had an account created before July 10, 2010 is affected.   Notifications were sent to patients of   the following doctors:
Dr. George Caudill (retired), Dr. Veljko Zivkovich (retired), Dr. Robert Colman, Dr. Whitney Molis.

According to the FAQs, the backup tape does not include the following patient information:

  • Medical records (the office uses paper charts — not electronic medical records)
  • Credit card information
  • Bank account information (account number, routing number)

The backup tape includes patient account information, which may include some or all of the following data:

  • Name
  • Address
  • Phone number
  • Date of birth
  • Social Security number
  • Patient billing record number
  • Insurance plan information
  • Dates of service
  • Insurance claim information (services and diagnoses)
Category: Health Data

Post navigation

← Update on Town of Essex Youth Commission breach
VA employee hoarded stacks of patient-related info at home →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.