DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Nine more breaches newly revealed on HHS's web site

Posted on October 11, 2010 by Dissent

Thanks to Adam Shostack, I realized that although HHS provides two formats for their breach report database, the two databases do not necessarily contain the same number of breach reports on any given day.  While he was analyzing data based on the .xml version containing 181 breach reports, I had been using the .csv version, which only reflected  166 breaches. On further inspection, it appears that the .csv file hasn’t been updated as recently as the .xml file.

So here are the 15 entries not included in the .csv file that I had been relying upon in my statistical analyses.  For the convenience of those compiling breaches for their databases, entries that appear with an asterisk have never been reported on this blog before or in any media source I’ve seen, although you may not be able to add some of them to your sites in the absence of additional information as to what kinds of information or data were involved.     Entries below are arranged in ascending order based on number of patients reportedly affected:

* Lorenzo Brown, MD, Inc.
State: CA
Date of Incident: 8/17/2010
Type of Incident: Theft
Location of Data: Desktop Computer
Date Reported: 10/7/2010
Number of Patients Affected: 928
Note: as of today’s date, there is no notice on his web site.

* St. James Hospital and Health Centers
State: IL
Date of Incident: 8/10/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/1/2010
Number of Patients Affected: 967
Note: as of today’s date, there is no notice on their web site.

St. Vincent Hospital and Health Care Center, Inc.
State: IN
Date of Incident: 7/25/2010
Type of Incident: Theft
Location of Data: Laptop
Date Reported: 10/1/2010
Number of Patients Affected: 1199
Note: they had posted a notice on their web site on Sept. 30, prominently linked from their home page.

* Matthew H. Conrad, MD, PA
State: KS
Date of Incident: 8/20/2010
Type of Incident: Theft
Location of Data: Laptop, Paper Records
Date Reported: 10/1/2010
Number of Patients Affected: 1200
Note: as of today’s date, there is no notice on his web site.

* UnitedHealth Group
Business Associate: CareCore National
State: MN
Date of Incident: 7/8/2010
Type of Incident: Unauthorized Access
Location of Data: Paper Records
Date Reported: 10/7/2010
Number of Patients Affected: 1270
Note: as of today’s date, there is no notice on either entity’s web site.

* Alliance HealthCare Services, Inc.
Business Associate: Eden Medical Center
Business Associate: Oroville Hospital
State: CA
Date of Incident: 8/5/2010 (Eden)
Date of Incident: 7/31/2010 (Oroville)
Type of Incident: Loss
Location of Data: Portable Electronic Device, Other
Date Reported: 10/7/2010
Number of Patients Affected: 1474 (Eden)
Number of Patients Affected: 1474 (Oroville)
*This was entered as two entries in the database, perhaps double-counting the number of patients. More significantly, I have a question about the CE/BA relationship and am waiting to hear from a hospital spokesperson as to whether Alliance lost the hospital’s data or vice versa. As reported by HHS, the hospitals lost Alliance’s data.
Note: as of today’s date, there is no notice on any of the three entities’ web sites.

State of Alaska, Department of Health and Social Services
Business Associate: Alaskan AIDS Assistance Association
State: AK
Date of Incident: 9/7/2010
Type of Incident: Theft
Location of Data: Portable Electronic Device, Other
Date Reported: 10/1/2010
Number of Patients Affected: 2000
Note: Alaskan AIDS Assistance Association posted a notice on their web site sometime on or after September 23, as it was not their on the 23rd when I last checked their site.

* Wright Patterson Air Force Base
State: OH
Date of Incident: 7/29/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/7/2010
Number of Patients Affected: 2123
Note: I do not see this incident in the VA’s monthly report to Congress for either July or August. It may appear in a subsequent report. I do not see any notice on their web site at this time.

New York Presbyterian Hospital and Columbia University Medical Center
State: NY
Date of Incident: 7/1/2010
Type of Incident: Hacking/IT Incident
Location of Data: Network Server
Date Reported: 10/1/2010
Number of Patients Affected: 6800
Note: their notice was previously discussed in the blog entry on the breach.

* Counseling and Psychotherapy of Throggs Neck
State: NY
Date of Incident: 9/6/2010
Type of Incident: Theft
Location of Data: Desktop Computer
Date Reported: 10/1/2010
Number of Patients Affected: 9000
Note: I cannot find any web site for them.

Milton Pathology Associates, P.C.
Business Associate: Goldthwait Associates
State: MA
Date of Incident: 7/26/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/5/2010
Number of Patients Affected: 11,000
Note:I cannot find any web site for this practice.

* University of Oklahoma-Tulsa, Neurology Clinic
State: OK
Date of Incident: 7/25/2010
Type of Incident: Hacking/IT Incident
Location of Data: Desktop Computer
Date Reported: 10/1/2010
Number of Patients Affected: 19,264
Note: The clinic posted a notice on October 5, prominently linked from its home page. Although the HHS log reflects a “hacking/IT incident,” the notice makes clear that this was a case of malware:

The University of Oklahoma’s Tulsa Neurology practice recently became aware that one of its clinic computers had been compromised by a virus. The Clinic is notifying individuals whose records were maintained on the computer of the discovery. Patients of Dr. John Cattaneo and of Neurology, LLC, a Tulsa practice where Dr. Cattaneo formerly practiced are being notified this week by letter.

The letters advise the patients that an intensive investigation determined that a virus capable of retrieving data from documents located on the computer had been discovered. Although it is not possible at this time to determine what documents on the computer, if any, were accessed by this virus, in an abundance of caution, the Clinic is notifying those individuals whose information and documents were stored there. Many of these documents included some or all of the following: patient name, telephone number, address, birth date, Social Security Number, medical record and insurance numbers, procedure billing codes, diagnosis codes, lab reports, office notes, radiology reports, and service dates. In some records, guarantor information was also included. The virus was detected on or about July 28, and its properties were determined during the investigation.

Milford Regional Medical Center
Business Associate: [Goldthwait Associates] – not noted on HHS, but in all media coverage.
State: MA
Date of Incident: 7/26/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/1/2010
Number of Patients Reported Affected: 19,750
Note: The hospital’s notice is prominently linked from the home page on their web site.

Category: Health Data

Post navigation

← Oracle database admins acknowledge security gaps
University of Oklahoma Neurology Clinic notifies almost 20,000 of security breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.