DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update to the SAIC/TRICARE breach

Posted on November 18, 2011 by Dissent

From TRICARE:

Letters are being mailed from Science Applications International Corporation (SAIC) to affected military clinic and hospital patients regarding a data breach involving personally identifiable and protected health information (PII/PHI). On Sept. 14, 2011, SAIC reported the loss of backup tapes containing electronic health care records used in the military health system (MHS) to capture patient data from 1992 through Sept. 7, 2011in San Antonio area military treatment facilities (MTFs), including filling pharmacy prescriptions and other patients whose laboratory workups were processed in these same MTFs, even if the patients were receiving treatment elsewhere. The data may include Social Security numbers, addresses and phone numbers, and some personal health data such as clinical notes, laboratory tests and prescriptions. There is no financial data, such as credit card or bank account information, on the backup tapes.

The risk of harm to patients is judged to be low since retrieving the data on the tapes would require knowledge of, and access to, specific hardware and software and knowledge of the system and data structure. As a precaution, the Assistant Secretary of Defense (Health Affairs) determined that SAIC should notify potentially impacted persons or households of this incident by letter.

As directed by TRICARE Management Activity (TMA), SAIC will provide credit monitoring and credit restoration services for one year for patients requesting them. The credit restoration services being provided exceeds current industry standards for responding to a data breach.

Read more on TRICARE.

Thanks to @jslarve for pointing out this update to me.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← UK: London's commercial trash contains lots of confidential data
Hawaii APEC host committee warns birth dates, Social Security numbers could have been stolen →

2 thoughts on “Update to the SAIC/TRICARE breach”

  1. Anonymous says:
    November 24, 2011 at 9:03 pm

    Just a note about the letter mailed to those affected with instructions on how to receive the one year of monitoring service. The instructions for enrolling online do not work. They take you to a website requesting you enter information and press continue. There is no place to enter information, no button to continue, and no instructions on the website to indicate it is anything other than a link to get information about identity theft. This is going to 4-9 million affected people. It only leaves the alternative of mailing their enclosed form.

    1. Anonymous says:
      November 24, 2011 at 9:18 pm

      What’s the link they provided?

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.