DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Breaches without details (updated)

Posted on December 9, 2011 by Dissent

When HHS’s breach tool reveals a breach I was not already aware of, I try to investigate or find media sources. Sometimes, despite my efforts, I can find nothing online to clarify a breach report. In some cases, I write to the organizations, who may – or may not – answer. Here are some breaches reported to HHS this year where we have no additional details. Each entry gives the name of the covered entity, the state, the number of patients reportedly affected, the date of the incident, and what the breach involved.

If you have more info on any of these, please let me know or post a link.

Amerigroup Community Care of New Mexico, Inc,NM,,”1,537″, 7/15/2011,Theft,Paper

Stone Oak Urgent Care & Family Practice,TX,,”3,079″, 10/23/2011,Theft/Loss,Computer (see this post)

Conway Regional Medical Center,AR,,”1,472″, 8/24/2011,Loss,Other (CDs)

UCLA Health System,CA,,”2,761″, 9/7/2011,Theft,Other Portable Electronic Device (see update below)

Julie A. Kennedy, D.M.D., P.A.,FL,,”2,900″, 9/30/2011,Theft,Network Server

Knox Community Hospital,OH,, “500”,  10/1/2010,Improper Disposal,Other (X-ray film)

Centro de Ortodancia ,PR,,”2,000″,  5/6/2010,Unauthorized Access/Disclosure,Paper

InStep Foot Clinic, P.A.,MN,,”2,600″, 8/28/2011,Theft,”Laptop, Electronic Medical Record”

Gail Gillespie and Associates, LLC,TX,,”2,334″,6/25/2011,Theft,”Laptop, Computer, Network Server”

Capron Rescue Squad District,IL,, “815”,  2/5/2011,Unauthorized Access/Disclosure,Laptop

Health Care Service Corporation,IL,, “501”,  6/28/2011,Theft,Paper

Silverpop Systems, Inc. Health and Welfare Plan,GA,, “884”, 4/15/2011,Theft,Laptop

Gene S. J. Liaw, MD. PS,WA,,”1,105″, 4/4/2011, Loss,Other Portable Electronic Device

Update:  Found an explanation for the UCLA breach discussed in the Comments section.   Joseph Conn mentioned the discrepancy in an article:

A Nov. 4 public notice on a breach reported by the UCLA Health System states that “some personal information on 16,288 patients” was stolen, but the wall of shame lists the “individuals affected” in the UCLA incident as 2,761.

UCLA spokeswoman Dale Tate said in an e-mail that the nearly six-times-larger number in its notice “represents the number of individuals who had some information on the hard drive,” while the 2,761 figure sent to the OCR “represents the number of people that met the specific criteria” under the federal breach notification rule.

Under the federal rule, Tate says, “the information for these individuals could possibly cause more than a minimal amount of financial, reputational or other harm.” Information on the rest of the individuals, Tate said, did not meet the criteria.

So it was the same incident.

Related posts:

  • UCLA Health discloses network breach potentially affecting 4.5 million patients
  • UCLA Health System notifies 16,288 of stolen hard drive
  • HHS starts to reveal healthcare breaches reported to government
  • UCLA Health notifying patients of stolen laptop containing personal health information; third breach report in as many months?
Category: Health Data

Post navigation

← Missing or stolen Logan County Emergeny Ambulance Service Authority laptop contained data on over 12,000 patients
UK: Patient data-sharing may not take account of anonymisation concerns →

5 thoughts on “Breaches without details (updated)”

  1. Anonymous says:
    December 9, 2011 at 3:54 pm

    Thanks for keeping such good track of this stuff! It would be nice to get some anonymous sources to clarify these… I have no idea how to do that or if it’s wise. Maybe we need more metadata required for the wall of shame? What, at a minimum, would be good to add to the list above?

    1. Anonymous says:
      December 9, 2011 at 4:31 pm

      I find the entries very confusing as to type of breach/what happened. We also need to know whether this is a “purely” medical data breach or if SSN or insurance numbers are involved.

      We *will* get all the information eventually – under FOI. But that takes time and work. If HHS/OCR had more resources and investigated everything more promptly, we could just wait for them to post their summary on their breach tool, but that doesn’t seem to be a timely solution for those who track and analyze breaches.

  2. Anonymous says:
    December 19, 2011 at 6:33 pm

    Am I missing something or isn’t the UCLA Health System breach above (without details) the same one reported on in the LA Times blog http://latimesblogs.latimes.com/lanow/2011/11/ucla-patient-identification-stolen.html which indicated 16,288 records had been compromised?

    1. Anonymous says:
      December 19, 2011 at 7:36 pm

      It might be. The dates are a day apart, but the numbers are so different that I sent UCLA an email asking them what incident the report to HHS was about. They didn’t answer me.

    2. Anonymous says:
      December 22, 2011 at 3:41 pm

      See the update in the post. It *was* the same incident.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.