DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Settlement of yet another lawsuit against WellPoint /Anthem Blue Cross gets preliminary approval

Posted on July 18, 2011 by Dissent

If you feel like you need a scorecard to keep track of lawsuits against WellPoint or settlements involving WellPoint, it’s understandable. WellPoint recently settled a lawsuit by the Indiana Attorney General’s Office over delayed notification following a breach that occurred in 2009 and continued until after a customer notified them twice in 2010.   Then they settled a class action lawsuit over an earlier breach that occurred in 2007 and 2008. Now there’s an announcement of a preliminary approval of a settlement oF a class action lawsuit based on the 2009-210 breach:

The Orange County Superior Court (the “Court”) has preliminarily approved a class action settlement in the case entitled Blue Cross of California Website Security Cases, Case No. JCCP 4647, reached with Anthem Blue Cross of California, Anthem Blue Cross Life and Health Insurance Company, The WellPoint Companies, Inc., WellPoint California Services, Inc. and WellPoint Behavioral Health, Inc. (together called “WellPoint/Anthem Blue Cross” or the “Defendants”) in a lawsuit about the potential accessibility of certain personal and financial information contained on individual health insurance applications.  The Court also approved a notice plan to advise the nationwide class of its legal rights, benefits, and options.

The lawsuit alleges that from approximately October 23, 2009, to March 10, 2010, WellPoint/Anthem Blue Cross improperly stored personal information and electronic versions of individual health insurance applications for over 600,000 customers, enrollees or subscribers on its web-based servers without username, password and encryption protections (the “Breach”). This information included personal identifying information and personal health information, such as Social Security numbers, home and office addresses, telephone numbers, credit card numbers and financial information used for premium payments, and other information people may have provided on their health insurance applications.  The lawsuit alleges that WellPoint/Anthem Blue Cross did not adequately protect this information. WellPoint/Anthem Blue Cross denies the claims in the lawsuit. The class settlement does not mean that WellPoint/Anthem Blue Cross did anything wrong.

People included in the settlement are called a “Class” or “Class Members.”  Those who receive a notice about this settlement in the mail and/or email or received a letter from WellPoint regarding this issue between June and August 2010, have been identified as a Class Member. Specifically, the Class includes everyone in the United States, including Puerto Rico, U.S. Virgin Islands and Guam (1) whose private information was on WellPoint/Anthem Blue Cross’ Affected Servers from August 15, 2008, through March 10, 2010, or (2) who received a notification letter from WellPoint/Anthem Blue Cross regarding the alleged failure of WellPoint/Anthem Blue Cross to secure their confidential personal and private information.

Notices informing Class Members about their legal rights will be mailed and emailed directly to them in the weeks leading up to the Court’s November 14, 2011 hearing, where it will consider whether to grant final approval of the settlement.

The Court has appointed Daniel Robinson, Robinson, Calcagnie & Robinson, of Newport Beach, California as Lead Settlement Class Counsel to represent the Class.

In the settlement, Class Members may be entitled to receive, in addition to other benefits, up to two (2) years of Free Debix Credit Monitoring and Identity Theft Insurance (valued at $238.80) at no cost to them (only one (1) year if a Class Member already elected to receive one (1) year of Debix coverage).  Additionally, if a Class Member is found to be a victim of identity theft or loss stemming from the Breach, such a Class Member would be entitled to receive five (5) additional years of monitoring and insurance (valued at $597.00).  Those affected by this settlement can sign up or submit a claim for certain benefits, if eligible, or they can ask to be excluded from, or object to, the settlement.  The deadline for exclusions and objections is October 24, 2011.  The earliest deadline to file claims is September 28, 2011.

A toll-free number, 1-877-527-2354, has been established in the case, along with a website,www.AnthemBlueCrossSecuritySettlement.com, where notices, claim forms, and the settlement agreement may be obtained.  Those affected may also write to WellPoint/Blue Cross Website Security Settlement Administrator, P.O. Box 6177, Novato, CA94948-6177.

Three settlements so far over two breaches. I really do wonder if WellPoint was using the same vendor as had been involved in the 2007-2008 breach. And I wonder if the Connecticut Attorney General decided not to file its own lawsuit against them for delayed notification like Indiana’s Attorney General had. Connecticut had sent a letter of inquiry, investigating, but I never saw any follow-up one way or the other.


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
Category: Breach IncidentsExposureHealth DataOf NoteU.S.

Post navigation

← Hacker: JLAudio database hacked; users’ information posted online
JLAudio responds to hack; notifies consumers to change their passwords →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.