DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information

Posted on September 9, 2011 by Dissent

WISH reports:

The Indiana University School of Medicine is warning thousands of people that their medical records could have been breeched after someone stole a laptop back in August.

The medical school reports the laptop, stolen Aug. 16, contained records of 3,192 individuals that included name, age, sex, diagnosis, medical record number and in 178 cases, social security numbers.

Read more on WISH.

A notice on the school’s web site, linked from their home page states:

Notice on Possible Patient Record Breach

September 9, 2011

INDIANAPOLIS — On September 2, the Indiana University School of Medicine began sending letters to 3,192 individuals that the theft of a password-protected, computer laptop may have compromised their confidential patient information. The laptop, belonging to a physician in the school’s Department of Surgery, contained information, such as name, age, sex, diagnosis, medical record number, and in 178 instances, the individual’s Social Security number. The information was being used for research purposes.Although the laptop computer was password protected, there is a possibility that the information could be accessed by a computer specialist with enough time and resources.

The disappearance of the laptop, apparently stolen from the physician’s vehicle on Tuesday, August 16, 2011, was immediately reported to law enforcement.

The IU School of Medicine is providing detailed information to those who might be affected by this incident at medicine.iu.edu/research/media-alert-faqs/, including suggestions how affected individuals may protect themselves from the possible unauthorized use of their personal information.

The IU School of Medicine and the IU Department of Surgery deeply regret this incident and are taking steps and security measures to minimize the likelihood of future incidents.

So why wasn’t IU informed of the theft until more than two weeks later?  That’s not good.

According to the FAQ’s on the breach, the laptop held data on some patients going back to 1980, not all of whom may have been directly asked to permit their data to be used for research purposes.  I do not mention this to suggest that IU did anything illegal, but merely to note that some people may never have consented to the researcher having their name and other information.

IU acknowledged that errors were made:

… the computer laptop was password protected and stored behind a locked door – but it should have been stored using “encryption,” a process that makes it extremely difficult for a third person to see and/or the information should have been “de-identified,” a process that removes any way to link it to an individual.

While acknowledging that errors were made, I note that IU did not offer those affected any free credit monitoring services – even, apparently, the 178 individuals whose SSN were involved.

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information
  • UW Medicine notifying 974,000 patients whose information was exposed online in December
  • Pysa shuttered its leak site before it ever dumped data from more than half a dozen schools. Here’s what we know so far.
Category: Breach IncidentsEducation SectorHealth DataTheftU.S.

Post navigation

← Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information
TX: Methodist Hospital employee stole cancer patients’ information for payday loan fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.