DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Breaches without details (updated)

Posted on December 9, 2011 by Dissent

When HHS’s breach tool reveals a breach I was not already aware of, I try to investigate or find media sources. Sometimes, despite my efforts, I can find nothing online to clarify a breach report. In some cases, I write to the organizations, who may – or may not – answer. Here are some breaches reported to HHS this year where we have no additional details. Each entry gives the name of the covered entity, the state, the number of patients reportedly affected, the date of the incident, and what the breach involved.

If you have more info on any of these, please let me know or post a link.

Amerigroup Community Care of New Mexico, Inc,NM,,”1,537″, 7/15/2011,Theft,Paper

Stone Oak Urgent Care & Family Practice,TX,,”3,079″, 10/23/2011,Theft/Loss,Computer (see this post)

Conway Regional Medical Center,AR,,”1,472″, 8/24/2011,Loss,Other (CDs)

UCLA Health System,CA,,”2,761″, 9/7/2011,Theft,Other Portable Electronic Device (see update below)

Julie A. Kennedy, D.M.D., P.A.,FL,,”2,900″, 9/30/2011,Theft,Network Server

Knox Community Hospital,OH,, “500”,  10/1/2010,Improper Disposal,Other (X-ray film)

Centro de Ortodancia ,PR,,”2,000″,  5/6/2010,Unauthorized Access/Disclosure,Paper

InStep Foot Clinic, P.A.,MN,,”2,600″, 8/28/2011,Theft,”Laptop, Electronic Medical Record”

Gail Gillespie and Associates, LLC,TX,,”2,334″,6/25/2011,Theft,”Laptop, Computer, Network Server”

Capron Rescue Squad District,IL,, “815”,  2/5/2011,Unauthorized Access/Disclosure,Laptop

Health Care Service Corporation,IL,, “501”,  6/28/2011,Theft,Paper

Silverpop Systems, Inc. Health and Welfare Plan,GA,, “884”, 4/15/2011,Theft,Laptop

Gene S. J. Liaw, MD. PS,WA,,”1,105″, 4/4/2011, Loss,Other Portable Electronic Device

Update:  Found an explanation for the UCLA breach discussed in the Comments section.   Joseph Conn mentioned the discrepancy in an article:

A Nov. 4 public notice on a breach reported by the UCLA Health System states that “some personal information on 16,288 patients” was stolen, but the wall of shame lists the “individuals affected” in the UCLA incident as 2,761.

UCLA spokeswoman Dale Tate said in an e-mail that the nearly six-times-larger number in its notice “represents the number of individuals who had some information on the hard drive,” while the 2,761 figure sent to the OCR “represents the number of people that met the specific criteria” under the federal breach notification rule.

Under the federal rule, Tate says, “the information for these individuals could possibly cause more than a minimal amount of financial, reputational or other harm.” Information on the rest of the individuals, Tate said, did not meet the criteria.

So it was the same incident.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← Missing or stolen Logan County Emergeny Ambulance Service Authority laptop contained data on over 12,000 patients
UK: Patient data-sharing may not take account of anonymisation concerns →

5 thoughts on “Breaches without details (updated)”

  1. Anonymous says:
    December 9, 2011 at 3:54 pm

    Thanks for keeping such good track of this stuff! It would be nice to get some anonymous sources to clarify these… I have no idea how to do that or if it’s wise. Maybe we need more metadata required for the wall of shame? What, at a minimum, would be good to add to the list above?

    1. Anonymous says:
      December 9, 2011 at 4:31 pm

      I find the entries very confusing as to type of breach/what happened. We also need to know whether this is a “purely” medical data breach or if SSN or insurance numbers are involved.

      We *will* get all the information eventually – under FOI. But that takes time and work. If HHS/OCR had more resources and investigated everything more promptly, we could just wait for them to post their summary on their breach tool, but that doesn’t seem to be a timely solution for those who track and analyze breaches.

  2. Anonymous says:
    December 19, 2011 at 6:33 pm

    Am I missing something or isn’t the UCLA Health System breach above (without details) the same one reported on in the LA Times blog http://latimesblogs.latimes.com/lanow/2011/11/ucla-patient-identification-stolen.html which indicated 16,288 records had been compromised?

    1. Anonymous says:
      December 19, 2011 at 7:36 pm

      It might be. The dates are a day apart, but the numbers are so different that I sent UCLA an email asking them what incident the report to HHS was about. They didn’t answer me.

    2. Anonymous says:
      December 22, 2011 at 3:41 pm

      See the update in the post. It *was* the same incident.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.