DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Thomas Jefferson University Hospitals Notify Patients Of Security Breach

Posted on April 10, 2012 by Dissent

ID Experts alerts us to this latest x-ray breach incident:

 

Thomas Jefferson University Hospitals Notify Patients Of Security Breach, Affected Patients Offered Extensive Identity Protection

Thomas Jefferson University Hospitals (TJUH) has notified approximately 600 patients that there was a theft of radiology registration documents containing personal information for services provided between February 4 and March 22, 2005. Affected patients have been sent a letter detailing the extensive identity protection resources being made available to them.

The stolen documents were the subject of a criminal investigation being conducted by the Towamencin Township Police and were disclosed to TJUH management on February 9, 2012. These documents contained personal health information that included: patient name, address, home phone number, work phone number, Social Security number, date of birth, TJUH account number, TJUH medical record number, insurance information, emergency contact, and the specified radiological studies performed.

TJUH has engaged Kroll, Inc. to provide the following free identity protection resources to affected individuals:

  • Enhanced Identity Theft Consultation and Restoration – Licensed investigators trained to manage the problems surrounding identity theft are available to listen, answer questions, and offer expertise regarding any concerns patients may have. If a patient’s name or credit is affected by this incident, an investigator will help restore the patient’s identity to pre-theft status.
  • Continuous Credit Monitoring – Monitoring alerts from Kroll will make patients aware of key changes to their Experian credit file that could indicate the kind of unauthorized activity commonly associated with identity theft and fraud.

Patients may call 1-877-309-0186 Monday through Friday, between 9 a.m. and 6 p.m. Eastern Time, with questions about this incident or to report information relating to the theft.

“We deeply regret this unfortunate incident and we are committed to protecting our patients’ personal health information,” said Thomas J. Lewis, President and Chief Executive Officer, Thomas Jefferson University Hospitals. “Long before TJUH became aware of this breach, a new process for scanning and destroying radiology registration information had already been implemented. In addition, TJUH continually reinforces the importance of securing patient information, whether paper or electronic, with all managers, and, in response to the breach, provided specific reinforcement to the Department of Radiology.”

via HIPAA Security and Privacy

From the wording of their statement, it seems they had no knowledge of the stolen documents until law enforcement notified them. So how did law enforcement become aware of these documents – in the context of investigating someone for charges of fraud? Or did they just stumble across the documents during a traffic stop… or…? It would be nice to know.

Category: Health Data

Post navigation

← Seton medical cards with personal data go astray
Case Western Reserve notifies 600 alumni of data breach involving Social Security numbers →

3 thoughts on “Thomas Jefferson University Hospitals Notify Patients Of Security Breach”

  1. Anonymous says:
    April 13, 2012 at 2:54 pm

    This just happened to them five months ago when someone posed as a legitimate x-ray collector. The term epic fail has been thrown around a lot… It’s like a game Bugs Bunny would play to keep stealing x-rays from the same place. Maybe there’s an employee who is getting paid to look the other way while theft occurs.

    1. Anonymous says:
      April 13, 2012 at 2:57 pm

      Whoops, it’s radiology registration info instead of x-rays this time. I redact my previous comment and continue to wonder about this particular entity’s data management practices.

      1. Anonymous says:
        April 13, 2012 at 2:59 pm

        If it’s any consolation, I made the same mistake – saw “x-rays” and thought it was the same type of breach, but as you note, it wasn’t.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
  • HHS OCR Settles HIPAA Security Rule Investigation of BayCare Health System for $800k and Corrective Action Plan

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.