DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Three other breaches you may not have known about

Posted on January 29, 2011 by Dissent

In addition to other blog entries posted today, a recent update to HHS’s breach tool indicates three more reports that have not been reported in the media:

Southern Perioperative Services, P.C. in Alabama reported that 2,000 patients had PHI on a device that was stolen on or about November 17.  Their web site is parked and I find no information on the site or in media sources about the breach.

Friendship Center Dental Office in Ocala, Florida reported that 2,200 patients had PHI on a laptop that was stolen on or about December 20.  I cannot find any web site for them or any media coverage of the incident.

Franciscan Medical Group in Washington reported that 1,250 patients had PHI on a computer stolen on or about November 18.  I cannot find any statement on their web site or in the media about the incident and it’s not indicated which of their hospitals or medical facilities was the one whose computer was stolen.

Once again, it seems, the HHS breach tool informs us of breaches we might otherwise not know about.  Of the nine most recent entries, we had only known about three of them.

The HHS tool also provides updates that we may not learn of otherwise.  As one example, the Keystone Mercy Health Plan and AmeriHealth Mercy Health Plan incident, which received wide media attention last year when it seemed that 280,000 people had data on the missing flash drive, was subsequently updated to indicate that 808 patients were affected – not 280,000.   HHS updates also provide us with additional details on the types of information involved.  In a number of cases, the annotated breach reports indicate the Social Security Numbers as well as health information were involved and that those breaches should probably be included in databases maintained by the Identity Theft Resource Center.

If anyone has additional details on the three newly revealed breaches listed above, please use the Comments section to add them.

Category: Health Data

Post navigation

← Benefit Resources notifies 16,200 of lost device with PHI
Data breaches triple in space of a year →

2 thoughts on “Three other breaches you may not have known about”

  1. Anonymous says:
    January 30, 2011 at 1:49 pm

    Hello –
    This may be completely insignificant but how did you find out that Friendship Center Dental Office is in Ocala? I don’t see the city on the HHS’s breach tool.
    A Google map search pulls two different locations in Ocala with one web site. There is no information on that site about any HHS breaches and while that doesn’t mean this isn’t the correct location I wouldn’t want to be liable for some kind of slander. That’s why I was wondering how you got the city?
    Thanks.

    1. Anonymous says:
      January 30, 2011 at 2:39 pm

      My search only shows one street address and that’s in Ocala. I didn’t link to the one dentist’s web site that you found because I have no idea which dentist in the group or at that address had the breach. But I do not see any “Friendship Center Dental Office” in Florida other than the one in Ocala.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.