DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Five months after its vendor is notified of data loss, Concordia Plan Services notifies those affected

Posted on October 22, 2011 by Dissent

The recent TRICARE/SAIC breach involved the theft of tapes that were en route to being converted/encrypted.  Here’s another case where older-formatted files sent out for conversion have been involved in data loss, although in this case, the data were not stolen from an employee’s car but were lost by a delivery service. And while the SAIC data went back to the early 1990’s, these data go back to the 1960’s!  From the press release:

On August 23, 2011, Concordia Plan Services (CPS), formerly known as Worker Benefit Plans—the plan administrator, was informed that a box of microfilm containing plan enrollment information from the 1960s and 1970s had been lost by a delivery service. On February 3, 2011, CPS had hand-delivered these records to a vendor hired to convert the microfilm to an electronic format. The loss occurred when the records were being transferred between the company assisting the vendor with the conversion process and the vendor. In May 2011, the delivery service had notified the vendor that the microfilm was lost.

The records contained some participants’ personal information, including names, addresses from the 1960s and 1970s, and dates of birth. In some cases, Social Security numbers also were on the microfilm, and in other cases, limited medical information for some participants was included. In response to this loss, CPS is:

  • Notifying all affected individuals in writing.
  • Taking all reasonable measures to locate the microfilm and working with legal and security vulnerability experts to assist us with our investigation and to help identify and implement any appropriate additional safeguards.
  • Offering credit monitoring, identity theft restoration, and fraud insurance to eligible individuals at no cost for one year.

CPS has no knowledge of misuse or attempted misuse of the information contained on the microfilm.

The safety and security of plan member information is important to CPS. If you have any questions related to this incident, CPS is providing a privacy hotline that is staffed with representatives specially trained to help in these situations. Please do not hesitate to call the hotline toll-free at 888-414-8021 between 7 a.m. and 5 p.m. CST, Monday through Friday.

SOURCE Nelson Levin de Luca & Horst, LLC

That’s an unacceptably long delay in notifying CPS of the loss.  When did the unnamed vendor first send the microfilm to their subcontractor?  Did they send it in February and first learn of its non-delivery in May?  Or were they notified promptly after the non-delivery/loss?  In any event, if they learned of the loss in May, why their 3-month delay in notifying in CPS?

According to their web site, Concordia Plan Services supports the The Lutheran Church—Missouri Synod and provides health, disability, and retirement benefits to church workers and their families:

Today, Concordia Plan Services is the LCMS benefits provider of choice for over 6,000 LCMS congregations, schools, universities, seminaries, and other organizations in the United States and in mission fields world wide. Through these participating organizations, over 31,000 active workers, along with 54,000 dependents are covered by the various benefits Concordia Plan Services provides.

The press release does not indicate how many workers or dependents had data on the missing microfilm.

The delay in notification is somewhat disturbing. If this breach had occurred in California, the entities could predict that they would receive some huge fines for the delay in notification.  But what will HHS do with this one?  CPS’s press release itself appears to exceed HITECH’s 60 calendar day notice requirement, but the bigger issue is that their vendor/business associate did not notify them for 2-3 months following discovery of the data loss, which also exceeds HITECH’s 60 calendar day requirement.  So what, if anything, will HHS do?

And did CPS really need to retain 50 year-old data to meet their current obligations?  It seems so difficult for entities to purge data, but the more data you retain, the greater the risk of it being involved in a data breach or loss.  Perhaps CPS had a valid reason to retain all the data. I do not know.  But I expect that that is a question that they have also considered in light of this incident.

Update: When this breach appeared on HHS’s breach tool, the vendor was identified as HITS Scanning Solutions. The breach was reported as affecting 7,059. The date of loss was indicated as March 17, 2011.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← Mills-Peninsula Medical Center employee who took records home to be charged with embezzlement and forgery
1000+ accounts dumped from One Hit Play by Diablo →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.