DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they’re just finding out more than 3 months later

Posted on October 12, 2011 by Dissent

Tim Tresslar reports:

United Healthcare said Tuesday a hard drive containing information on 582 Ohioans who are members of its Medicare plans has been stolen from a vendor.The Minnetonka, Minn.-based company said it is notifying the affected members by mail. United HealthCare’s commercial health plans are not affected.

The hard drive belonged to Futurity First Insurance Group, a provider of sales and marketing services for the United Healthcare Medicare Advantage, Medicare Part D prescription drug, Evercare and Medicare Supplement plans, a news release states.

Futurity First sent the hard drive to a vendor for repair and it was stolen on or about June 28. The vendor told Futurity about the theft on Aug. 12.

Nearly a month later, on Sept. 14, Futurity told United Healthcare about the stolen hard drive.

The drive included member names, Social Security numbers and, in some cases, the birth dates and private health information, United Healthcare said.

The insurer said it is offering affected members one year with Debix, an identity protection service, for free.

Source: Dayton Daily News

Okay, those delays are too long. The unnamed vendor didn’t report the theft for a month and a half? And then Futurity didn’t report it to UHC for another month? That it took UHC a month to disclose the breach neither surprises nor upsets me, as I don’t think one month is unreasonable, even though some states have much stricter requirements. But the totality of the situation – that personal data that could be used for ID theft were stolen on June 28 and individuals have not yet received notification/warning three and a half months later – that is too much.

What makes this is even more aggravating, in my opinion, is that this drive was not storing information used for treatment – it was for marketing/sales purposes. While marketing is an accepted business operation, that personal data were put at risk for marketing seems a poor data protection decision. Does a company really need Social Security numbers to market?  Why couldn’t other types of IDs been created or used?

And how was the drive stolen from the vendor? Was it left in an employee’s car? Was there a burglary at the repair firm? Did Futurity have a contract with this vendor that required certain security protections – and if so, were those protections implemented?

Business associates are a major source of data security risk in the healthcare sector. I hope that HHS investigates this breach.


Related:

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • Researchers claim 'largest leak ever' after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
Category: Breach IncidentsBusiness SectorHealth DataSubcontractorTheftU.S.

Post navigation

← Sony attacked again – 93,000 usernames and passwords compromised
Hacker attacks against retailers up 43 percent →

1 thought on “Stolen hard drive could affect 582 Ohioans enrolled in United Healthcare Medicare plans – but they’re just finding out more than 3 months later”

  1. JJ says:
    October 12, 2011 at 10:23 am

    UnitedHealthcare is pushed by AARP: https://www.aarpmedicareplans.com/landing/medicare-part-d.html

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.