DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Nine more breaches newly revealed on HHS's web site

Posted on October 11, 2010 by Dissent

Thanks to Adam Shostack, I realized that although HHS provides two formats for their breach report database, the two databases do not necessarily contain the same number of breach reports on any given day.  While he was analyzing data based on the .xml version containing 181 breach reports, I had been using the .csv version, which only reflected  166 breaches. On further inspection, it appears that the .csv file hasn’t been updated as recently as the .xml file.

So here are the 15 entries not included in the .csv file that I had been relying upon in my statistical analyses.  For the convenience of those compiling breaches for their databases, entries that appear with an asterisk have never been reported on this blog before or in any media source I’ve seen, although you may not be able to add some of them to your sites in the absence of additional information as to what kinds of information or data were involved.     Entries below are arranged in ascending order based on number of patients reportedly affected:

* Lorenzo Brown, MD, Inc.
State: CA
Date of Incident: 8/17/2010
Type of Incident: Theft
Location of Data: Desktop Computer
Date Reported: 10/7/2010
Number of Patients Affected: 928
Note: as of today’s date, there is no notice on his web site.

* St. James Hospital and Health Centers
State: IL
Date of Incident: 8/10/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/1/2010
Number of Patients Affected: 967
Note: as of today’s date, there is no notice on their web site.

St. Vincent Hospital and Health Care Center, Inc.
State: IN
Date of Incident: 7/25/2010
Type of Incident: Theft
Location of Data: Laptop
Date Reported: 10/1/2010
Number of Patients Affected: 1199
Note: they had posted a notice on their web site on Sept. 30, prominently linked from their home page.

* Matthew H. Conrad, MD, PA
State: KS
Date of Incident: 8/20/2010
Type of Incident: Theft
Location of Data: Laptop, Paper Records
Date Reported: 10/1/2010
Number of Patients Affected: 1200
Note: as of today’s date, there is no notice on his web site.

* UnitedHealth Group
Business Associate: CareCore National
State: MN
Date of Incident: 7/8/2010
Type of Incident: Unauthorized Access
Location of Data: Paper Records
Date Reported: 10/7/2010
Number of Patients Affected: 1270
Note: as of today’s date, there is no notice on either entity’s web site.

* Alliance HealthCare Services, Inc.
Business Associate: Eden Medical Center
Business Associate: Oroville Hospital
State: CA
Date of Incident: 8/5/2010 (Eden)
Date of Incident: 7/31/2010 (Oroville)
Type of Incident: Loss
Location of Data: Portable Electronic Device, Other
Date Reported: 10/7/2010
Number of Patients Affected: 1474 (Eden)
Number of Patients Affected: 1474 (Oroville)
*This was entered as two entries in the database, perhaps double-counting the number of patients. More significantly, I have a question about the CE/BA relationship and am waiting to hear from a hospital spokesperson as to whether Alliance lost the hospital’s data or vice versa. As reported by HHS, the hospitals lost Alliance’s data.
Note: as of today’s date, there is no notice on any of the three entities’ web sites.

State of Alaska, Department of Health and Social Services
Business Associate: Alaskan AIDS Assistance Association
State: AK
Date of Incident: 9/7/2010
Type of Incident: Theft
Location of Data: Portable Electronic Device, Other
Date Reported: 10/1/2010
Number of Patients Affected: 2000
Note: Alaskan AIDS Assistance Association posted a notice on their web site sometime on or after September 23, as it was not their on the 23rd when I last checked their site.

* Wright Patterson Air Force Base
State: OH
Date of Incident: 7/29/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/7/2010
Number of Patients Affected: 2123
Note: I do not see this incident in the VA’s monthly report to Congress for either July or August. It may appear in a subsequent report. I do not see any notice on their web site at this time.

New York Presbyterian Hospital and Columbia University Medical Center
State: NY
Date of Incident: 7/1/2010
Type of Incident: Hacking/IT Incident
Location of Data: Network Server
Date Reported: 10/1/2010
Number of Patients Affected: 6800
Note: their notice was previously discussed in the blog entry on the breach.

* Counseling and Psychotherapy of Throggs Neck
State: NY
Date of Incident: 9/6/2010
Type of Incident: Theft
Location of Data: Desktop Computer
Date Reported: 10/1/2010
Number of Patients Affected: 9000
Note: I cannot find any web site for them.

Milton Pathology Associates, P.C.
Business Associate: Goldthwait Associates
State: MA
Date of Incident: 7/26/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/5/2010
Number of Patients Affected: 11,000
Note:I cannot find any web site for this practice.

* University of Oklahoma-Tulsa, Neurology Clinic
State: OK
Date of Incident: 7/25/2010
Type of Incident: Hacking/IT Incident
Location of Data: Desktop Computer
Date Reported: 10/1/2010
Number of Patients Affected: 19,264
Note: The clinic posted a notice on October 5, prominently linked from its home page. Although the HHS log reflects a “hacking/IT incident,” the notice makes clear that this was a case of malware:

The University of Oklahoma’s Tulsa Neurology practice recently became aware that one of its clinic computers had been compromised by a virus. The Clinic is notifying individuals whose records were maintained on the computer of the discovery. Patients of Dr. John Cattaneo and of Neurology, LLC, a Tulsa practice where Dr. Cattaneo formerly practiced are being notified this week by letter.

The letters advise the patients that an intensive investigation determined that a virus capable of retrieving data from documents located on the computer had been discovered. Although it is not possible at this time to determine what documents on the computer, if any, were accessed by this virus, in an abundance of caution, the Clinic is notifying those individuals whose information and documents were stored there. Many of these documents included some or all of the following: patient name, telephone number, address, birth date, Social Security Number, medical record and insurance numbers, procedure billing codes, diagnosis codes, lab reports, office notes, radiology reports, and service dates. In some records, guarantor information was also included. The virus was detected on or about July 28, and its properties were determined during the investigation.

Milford Regional Medical Center
Business Associate: [Goldthwait Associates] – not noted on HHS, but in all media coverage.
State: MA
Date of Incident: 7/26/2010
Type of Incident: Improper Disposal
Location of Data: Paper Records
Date Reported: 10/1/2010
Number of Patients Reported Affected: 19,750
Note: The hospital’s notice is prominently linked from the home page on their web site.

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
Category: Health Data

Post navigation

← Oracle database admins acknowledge security gaps
University of Oklahoma Neurology Clinic notifies almost 20,000 of security breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.