DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they're just finding out more than 3 months later

Posted on October 12, 2011 by Dissent

Tim Tresslar reports:

United Healthcare said Tuesday a hard drive containing information on 582 Ohioans who are members of its Medicare plans has been stolen from a vendor.The Minnetonka, Minn.-based company said it is notifying the affected members by mail. United HealthCare’s commercial health plans are not affected.

The hard drive belonged to Futurity First Insurance Group, a provider of sales and marketing services for the United Healthcare Medicare Advantage, Medicare Part D prescription drug, Evercare and Medicare Supplement plans, a news release states.

Futurity First sent the hard drive to a vendor for repair and it was stolen on or about June 28. The vendor told Futurity about the theft on Aug. 12.

Nearly a month later, on Sept. 14, Futurity told United Healthcare about the stolen hard drive.

The drive included member names, Social Security numbers and, in some cases, the birth dates and private health information, United Healthcare said.

The insurer said it is offering affected members one year with Debix, an identity protection service, for free.

Source: Dayton Daily News

Okay, those delays are too long. The unnamed vendor didn’t report the theft for a month and a half? And then Futurity didn’t report it to UHC for another month? That it took UHC a month to disclose the breach neither surprises nor upsets me, as I don’t think one month is unreasonable, even though some states have much stricter requirements. But the totality of the situation – that personal data that could be used for ID theft were stolen on June 28 and individuals have not yet received notification/warning three and a half months later – that is too much.

What makes this is even more aggravating, in my opinion, is that this drive was not storing information used for treatment – it was for marketing/sales purposes. While marketing is an accepted business operation, that personal data were put at risk for marketing seems a poor data protection decision. Does a company really need Social Security numbers to market?  Why couldn’t other types of IDs been created or used?

And how was the drive stolen from the vendor? Was it left in an employee’s car? Was there a burglary at the repair firm? Did Futurity have a contract with this vendor that required certain security protections – and if so, were those protections implemented?

Business associates are a major source of data security risk in the healthcare sector. I hope that HHS investigates this breach.

Updated October 28: HHS’s breach tool lists additional entities affected by this breach, as I report elsewhere. But I note that they all report the date of loss as July 28 – not June 28 as reported in the media source above. So maybe the delay wasn’t as great as suggested by the media report.

No related posts.

Category: Health Data

Post navigation

← Find2Trade.com User Accounts leaked and a dump of other crap….
Sony attacked again – 93,000 usernames and passwords compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.