DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Breaches without details (updated)

Posted on December 9, 2011 by Dissent

When HHS’s breach tool reveals a breach I was not already aware of, I try to investigate or find media sources. Sometimes, despite my efforts, I can find nothing online to clarify a breach report. In some cases, I write to the organizations, who may – or may not – answer. Here are some breaches reported to HHS this year where we have no additional details. Each entry gives the name of the covered entity, the state, the number of patients reportedly affected, the date of the incident, and what the breach involved.

If you have more info on any of these, please let me know or post a link.

Amerigroup Community Care of New Mexico, Inc,NM,,”1,537″, 7/15/2011,Theft,Paper

Stone Oak Urgent Care & Family Practice,TX,,”3,079″, 10/23/2011,Theft/Loss,Computer (see this post)

Conway Regional Medical Center,AR,,”1,472″, 8/24/2011,Loss,Other (CDs)

UCLA Health System,CA,,”2,761″, 9/7/2011,Theft,Other Portable Electronic Device (see update below)

Julie A. Kennedy, D.M.D., P.A.,FL,,”2,900″, 9/30/2011,Theft,Network Server

Knox Community Hospital,OH,, “500”,  10/1/2010,Improper Disposal,Other (X-ray film)

Centro de Ortodancia ,PR,,”2,000″,  5/6/2010,Unauthorized Access/Disclosure,Paper

InStep Foot Clinic, P.A.,MN,,”2,600″, 8/28/2011,Theft,”Laptop, Electronic Medical Record”

Gail Gillespie and Associates, LLC,TX,,”2,334″,6/25/2011,Theft,”Laptop, Computer, Network Server”

Capron Rescue Squad District,IL,, “815”,  2/5/2011,Unauthorized Access/Disclosure,Laptop

Health Care Service Corporation,IL,, “501”,  6/28/2011,Theft,Paper

Silverpop Systems, Inc. Health and Welfare Plan,GA,, “884”, 4/15/2011,Theft,Laptop

Gene S. J. Liaw, MD. PS,WA,,”1,105″, 4/4/2011, Loss,Other Portable Electronic Device

Update:  Found an explanation for the UCLA breach discussed in the Comments section.   Joseph Conn mentioned the discrepancy in an article:

A Nov. 4 public notice on a breach reported by the UCLA Health System states that “some personal information on 16,288 patients” was stolen, but the wall of shame lists the “individuals affected” in the UCLA incident as 2,761.

UCLA spokeswoman Dale Tate said in an e-mail that the nearly six-times-larger number in its notice “represents the number of individuals who had some information on the hard drive,” while the 2,761 figure sent to the OCR “represents the number of people that met the specific criteria” under the federal breach notification rule.

Under the federal rule, Tate says, “the information for these individuals could possibly cause more than a minimal amount of financial, reputational or other harm.” Information on the rest of the individuals, Tate said, did not meet the criteria.

So it was the same incident.

Related posts:

  • Operation Anti Security Breakdown and targets, the full time line
  • UCLA Health discloses network breach potentially affecting 4.5 million patients
  • UCLA Health System notifies 16,288 of stolen hard drive
Category: Health Data

Post navigation

← Missing or stolen Logan County Emergeny Ambulance Service Authority laptop contained data on over 12,000 patients
UK: Patient data-sharing may not take account of anonymisation concerns →

5 thoughts on “Breaches without details (updated)”

  1. Anonymous says:
    December 9, 2011 at 3:54 pm

    Thanks for keeping such good track of this stuff! It would be nice to get some anonymous sources to clarify these… I have no idea how to do that or if it’s wise. Maybe we need more metadata required for the wall of shame? What, at a minimum, would be good to add to the list above?

    1. Anonymous says:
      December 9, 2011 at 4:31 pm

      I find the entries very confusing as to type of breach/what happened. We also need to know whether this is a “purely” medical data breach or if SSN or insurance numbers are involved.

      We *will* get all the information eventually – under FOI. But that takes time and work. If HHS/OCR had more resources and investigated everything more promptly, we could just wait for them to post their summary on their breach tool, but that doesn’t seem to be a timely solution for those who track and analyze breaches.

  2. Anonymous says:
    December 19, 2011 at 6:33 pm

    Am I missing something or isn’t the UCLA Health System breach above (without details) the same one reported on in the LA Times blog http://latimesblogs.latimes.com/lanow/2011/11/ucla-patient-identification-stolen.html which indicated 16,288 records had been compromised?

    1. Anonymous says:
      December 19, 2011 at 7:36 pm

      It might be. The dates are a day apart, but the numbers are so different that I sent UCLA an email asking them what incident the report to HHS was about. They didn’t answer me.

    2. Anonymous says:
      December 22, 2011 at 3:41 pm

      See the update in the post. It *was* the same incident.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.