DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they’re just finding out more than 3 months later

Posted on October 12, 2011 by Dissent

Tim Tresslar reports:

United Healthcare said Tuesday a hard drive containing information on 582 Ohioans who are members of its Medicare plans has been stolen from a vendor.The Minnetonka, Minn.-based company said it is notifying the affected members by mail. United HealthCare’s commercial health plans are not affected.

The hard drive belonged to Futurity First Insurance Group, a provider of sales and marketing services for the United Healthcare Medicare Advantage, Medicare Part D prescription drug, Evercare and Medicare Supplement plans, a news release states.

Futurity First sent the hard drive to a vendor for repair and it was stolen on or about June 28. The vendor told Futurity about the theft on Aug. 12.

Nearly a month later, on Sept. 14, Futurity told United Healthcare about the stolen hard drive.

The drive included member names, Social Security numbers and, in some cases, the birth dates and private health information, United Healthcare said.

The insurer said it is offering affected members one year with Debix, an identity protection service, for free.

Source: Dayton Daily News

Okay, those delays are too long. The unnamed vendor didn’t report the theft for a month and a half? And then Futurity didn’t report it to UHC for another month? That it took UHC a month to disclose the breach neither surprises nor upsets me, as I don’t think one month is unreasonable, even though some states have much stricter requirements. But the totality of the situation – that personal data that could be used for ID theft were stolen on June 28 and individuals have not yet received notification/warning three and a half months later – that is too much.

What makes this is even more aggravating, in my opinion, is that this drive was not storing information used for treatment – it was for marketing/sales purposes. While marketing is an accepted business operation, that personal data were put at risk for marketing seems a poor data protection decision. Does a company really need Social Security numbers to market?  Why couldn’t other types of IDs been created or used?

And how was the drive stolen from the vendor? Was it left in an employee’s car? Was there a burglary at the repair firm? Did Futurity have a contract with this vendor that required certain security protections – and if so, were those protections implemented?

Business associates are a major source of data security risk in the healthcare sector. I hope that HHS investigates this breach.

Category: Breach IncidentsBusiness SectorHealth DataSubcontractorTheftU.S.

Post navigation

← Sony attacked again – 93,000 usernames and passwords compromised
Hacker attacks against retailers up 43 percent →

1 thought on “Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they’re just finding out more than 3 months later”

  1. JJ says:
    October 12, 2011 at 10:23 am

    UnitedHealthcare is pushed by AARP: https://www.aarpmedicareplans.com/landing/medicare-part-d.html

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.