DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

When in doubt, report

Posted on November 24, 2010 by Dissent

Sta-Home Health & Hospice in Mississippi reported a potential security breach to HHS this week.   Because I could find no media coverage or other information on the incident online, I contacted them for additional information.

According to a spokesperson with whom I spoke today, on the evening of September 15, their offices were burglarized by one or more individuals who cut through a metal fence and smashed in a window.  Although the building is alarmed and has surveillance cameras, the cameras did not capture images of the burglars.

One of the items stolen during the burglary was a desktop computer used for processing state medicaid claims.  Information on the stolen computer was encoded using propietary software but because the data were not actually encrypted and because the employee using the computer could not recall when she had last emptied the recycling bin,  the company decided to err on the side of caution and notify all 1,104 individuals who had ever had PHI on that machine.   The  company also issued press releases as substitute notice under HITECH provisions, but none of the media outlets had picked up the release.   The stolen computer has not been recovered.

Information in the files consisted of encoded names and diagnostic codes.  No SSN or financial information were included, nor any Medicaid account numbers.

The incident sounds like it was one of convenience or for the value of the hardware, as other computers in the office that contained PHI were not touched and only the one nearest the window was stolen.

In other words, a small potential breach that is nothing to get particularly excited about, but it does raise one point that covered entities grapple with:   if a covered entity uses proprietary software to encode all sensitive data,  such encoding may not rise to the level of rendering the data unusable, and then they may not be able to avail themselves of safe harbor provisions that would apply to encrypted data.


Related:

  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception? (1)
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: Health Data

Post navigation

← NY: Ex-MCC student Terry Zimmerman says he stole others’ refunds to find HIV cure
Former Sprint-Nextel employee sentenced for improper disclosure of phone records to cocaine dealer →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.