DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hospital worker at Massachusetts Eye and Ear charged with ID theft

Posted on May 19, 2012 by Dissent

Jack Encarnacao reports:

Police say a Quincy woman who worked at the Massachusetts Eye and Ear Infirmary and her brother used stolen patient information to open fake National Grid accounts that allowed them to dodge paying for electricity.

Fallon and Emmanuel Delacruz of 270 Quarry St. have been charged with identity theft and larceny.

Fallon Delacruz, 25, who also has a Dorchester address, was dismissed from her job after police made her employer aware of the investigation. A police report on file in Quincy District Court says Delacruz worked as a patient financial coordinator.

Mass. Eye and Ear has offered one year of free credit monitoring to potentially affected patients, and sent mail notifications to about 3,600 patients whose Social Security numbers Delacruz was able to access.

Read more on The Patriot Ledger.

The breach was actually disclosed by Massachusetts Eye and Ear last month. In an April 16th statement on their web site linked from their home page, they wrote:

On March 5, 2012, the Quincy, Massachusetts, Police Department informed Mass. Eye and Ear that they were investigating a Mass. Eye and Ear employee for inappropriately using the names, Social Security numbers and dates of birth of certain individuals, some of whom were believed to be Mass. Eye and Ear patients.

The hospital promptly suspended the employee, who was subsequently dismissed and no longer works at Mass. Eye and Ear. Mass. Eye and Ear determined that four of the individuals identified by the Quincy Police Department are Mass. Eye and Ear patients, and that the employee would have had access to certain personal information about them in order to perform her assigned duties.

The Quincy Police Department has informed us that they are not aware of any credit card theft. Mass. Eye and Ear is also not aware of any inappropriate access to, or use of, medical information.

While Mass. Eye and Ear is only aware of four individuals whose personal information was actually misused, as a precaution we are notifying, by mail, approximately 3,600 patients whose Social Security numbers were available to the former employee in the course of performing her assigned duties.

Mass. Eye and Ear will provide one year of free credit monitoring to potentially affected individuals to protect them against possible harm resulting from this incident.

“Please be assured that we take the protection of our patients’ personal information very seriously,” said Mass. Eye and Ear President and CEO John Fernandez. “We are saddened and disappointed that this former employee appears to have chosen to violate both our trust and that of our patients. We sincerely apologize for any inconvenience and concern caused by this incident.”

In order to reduce the chance of similar incidents in the future, Mass. Eye and Ear has taken steps to further restrict access to full Social Security numbers among our staff. Mass. Eye and Ear has been and will continue to perform appropriate background checks as part of the hiring process, and regularly reinforce with our staff the importance of safeguarding patient information.

Should you have any questions regarding this situation, please call the Mass. Eye and Ear Assistance Line at 877-313-1395.

There have been a number of insider breaches in the news recently in the healthcare sector. Maybe we need more criminal HIPAA prosecutions…?

Category: Health Data

Post navigation

← Biting the hand that feeds your soul?
UK: Personal details of Army snipers found in trunk of a second-hand car →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.