DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they’re just finding out more than 3 months later

Posted on October 12, 2011 by Dissent

Tim Tresslar reports:

United Healthcare said Tuesday a hard drive containing information on 582 Ohioans who are members of its Medicare plans has been stolen from a vendor.The Minnetonka, Minn.-based company said it is notifying the affected members by mail. United HealthCare’s commercial health plans are not affected.

The hard drive belonged to Futurity First Insurance Group, a provider of sales and marketing services for the United Healthcare Medicare Advantage, Medicare Part D prescription drug, Evercare and Medicare Supplement plans, a news release states.

Futurity First sent the hard drive to a vendor for repair and it was stolen on or about June 28. The vendor told Futurity about the theft on Aug. 12.

Nearly a month later, on Sept. 14, Futurity told United Healthcare about the stolen hard drive.

The drive included member names, Social Security numbers and, in some cases, the birth dates and private health information, United Healthcare said.

The insurer said it is offering affected members one year with Debix, an identity protection service, for free.

Source: Dayton Daily News

Okay, those delays are too long. The unnamed vendor didn’t report the theft for a month and a half? And then Futurity didn’t report it to UHC for another month? That it took UHC a month to disclose the breach neither surprises nor upsets me, as I don’t think one month is unreasonable, even though some states have much stricter requirements. But the totality of the situation – that personal data that could be used for ID theft were stolen on June 28 and individuals have not yet received notification/warning three and a half months later – that is too much.

What makes this is even more aggravating, in my opinion, is that this drive was not storing information used for treatment – it was for marketing/sales purposes. While marketing is an accepted business operation, that personal data were put at risk for marketing seems a poor data protection decision. Does a company really need Social Security numbers to market?  Why couldn’t other types of IDs been created or used?

And how was the drive stolen from the vendor? Was it left in an employee’s car? Was there a burglary at the repair firm? Did Futurity have a contract with this vendor that required certain security protections – and if so, were those protections implemented?

Business associates are a major source of data security risk in the healthcare sector. I hope that HHS investigates this breach.

Category: Breach IncidentsBusiness SectorHealth DataSubcontractorTheftU.S.

Post navigation

← Sony attacked again – 93,000 usernames and passwords compromised
Hacker attacks against retailers up 43 percent →

1 thought on “Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they’re just finding out more than 3 months later”

  1. JJ says:
    October 12, 2011 at 10:23 am

    UnitedHealthcare is pushed by AARP: https://www.aarpmedicareplans.com/landing/medicare-part-d.html

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.