DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Social Security Numbers of 20,000 Swedish Med. Ctr. employees exposed on the web for 9 weeks

Posted on July 20, 2011 by Dissent

Carol M. Ostrom reports:

Swedish Medical Center is alerting nearly 20,000 current and former employees that their personal information — including Social Security numbers — was accidentally made accessible on the Internet for a nine-week period.

Read more on Seattle Times.

A notice to employees, on an internal page of the medical center’s web site reads:

July 20, 2011
Notice: Accidental Disclosure of Employee Data

SEATTLE, July 20, 2011 – Swedish today announced that it has begun notifying 19,799 current and former employees that some of their personal information was inadvertently made accessible from the Internet for a nine-week period between mid-April 2011 and June 17, 2011. The disclosed information included first and last names and Social Security numbers.

Affected individuals include some, but not all, employees who worked at Swedish during all or part of the following years: 1994, 1995, 2002, 2003, 2004 and 2006. It does not affect employees who worked for Swedish Physician Division during that time period.

There is no evidence that any data has been used for identity theft or other illicit purposes. In addition, the information is no longer accessible online, as it was immediately removed upon learning of the accidental disclosure. Swedish is taking measures to support the affected individuals, including engaging an experienced firm specializing in personal data security to assist the individuals at no charge.

Swedish has contracted with Kroll, Inc., the world’s leading risk consulting company, to provide affected individuals free access to its ID TheftSmart™ service via packets mailed to them. Swedish leaders are encouraging the affected individuals to be vigilant and to contact Kroll if they notice any unusual activity.

“We take our responsibility to protect employee information very seriously,” emphasizes Joanne Suffis, Swedish vice president of Human Resources. “This incident was highly unusual, and we sincerely apologize for any concern or inconvenience it may cause current and former staff members and their families.”

Swedish has not used Social Security numbers as the employee ID since 2004 and has policies on employee use of Swedish information systems and remote access. Additional staff education is being conducted and further measures are being deployed to help prevent future occurrences.

“While it may be impossible for any large organization to completely eliminate mistakes like this, we are taking all necessary steps to review and strengthen internal procedures to ensure Swedish provides the highest level of employee data security,” says Suffis.

Estimated delivery date of letters to affected individuals is between Friday, July 22 and Monday, July 25. Swedish has established a phone line through Kroll. Anyone with questions is welcome to call 1-855-294-2544. Thank you for your patience.

Category: Breach IncidentsExposureHealth DataU.S.

Post navigation

← (Follow-up) Doctor named and blamed for patient files found in Regina dumpster; Dickson recommends prosecution
(Update) Yellowstone County website hack did expose personal information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.