DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Up To 75 VA Patient ID Cards Missing

Posted on March 21, 2011 by Dissent

KPTV reports:

Dozens of patients at the Portland Veterans Affairs Medical Center could be at risk for identity theft after their identity cards were lost.

Medical center staff say 50 to 75 patient ID cards were lost in late January.

The cards were being held by the hospital after they had been returned due to wrong mailing addresses.

VA staff say over-the-counter bar code readers can grab a patient’s information from the card, including Social Security numbers and birth dates.

[…]

A press release from the VA, published by The Oregonian adds:

On January 31, 2011, cards of approximately 50 to 75 Veterans that were mailed and then returned between Jan. 1, 2011 and Jan. 27, 2011 were discovered missing from the hospital’s enrollment office. Despite a thorough search and investigation, the missing cards have not been found.

And they’re still using Social Security Numbers for patient identification… why?

Category: Health Data

Post navigation

← Personal information found in dumpster
OR: Up To 75 VA Patient ID Cards Missing →

1 thought on “Up To 75 VA Patient ID Cards Missing”

  1. Anonymous says:
    March 23, 2011 at 4:48 pm

    As a former employee of the VA, they have always used the patient’s SSN as an identifier. That includes checking in for clinic appointments or updating your administrative records in the computer.

    The problem is that what happened to the cards that were returned. They are supposed to routinely ask the patient if their address and phone number information in the system are correct. They should have made sure the addresses were correct. Also did the patients request that their ID card be mailed to them. I have my medications from the VA mailed to me.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.