DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HHS updates breach tool

Posted on July 17, 2012 by Dissent

HHS has added 17 incidents to its breach tool. Some of the incidents we already knew about, but here are the ones that are new to me or that add new details:

Awklein ,CA,,”2,000″,2/1/2011,Theft,Other,6/8/2012,,
I cannot find any information on this breach via a Google search.

“Stephen Haggard, DPM Podiatry”,WA,,”1,597″,3/4/2012,Theft,Network Server,6/8/2012,,
Dr. Haggard published a substitute notice/classified ad about the breach on April 22nd, but the notice is no longer available.

“Safe Ride Services, Inc”,AZ,,”42,000″,8/31/2011 -1/31/2012,”Unauthorized Access/Disclosure, Hacking/IT incident”,Network Server,6/8/2012,,
A May 1st notice posted on Safe Ride’s web site says, in part:

In February, Safe Ride Services discovered that a former employee may have accessed computer systems without authorization and deleted service files which included patient demographic and insurance information. The file has since been restored and the information is secure. The system also includes employee personal information, but there is no evidence that any information was taken or misused.

SHIELDS For Families,CA,,961,2/27/2012,Theft,Network Server,6/8/2012,,
A hard-to-find notice on their web site says, in part:

SHIELDS For Families is hereby notifying you of the recent theft of your personal information. We became aware of this breach on 2/28/12. We believe the breach occurred on or around 2/27/12. The incident occurred as follows:

After operating hours on 2/27/12, an unknown person or persons gained access to the second-floor attic area of our Achieving Change Together (ACT) program located at 9624 S. Compton Avenue, Los Angeles, CA 90002. The person or persons stole the program’s computer server, where personal information was stored, and other server components. The theft was discovered on February 28, 2012, when a staff member could not access the server’s software. A subsequent inspection of the attic area revealed that the server, monitor and keyboard had been stolen. The police were notified on February 28, 2012 and a police report is on file. The identity of the person(s) responsible for the theft is still unknown.

We believe that as a result of the theft you and your family’s privileged health information was compromised. Examples of privileged health information include date of birth, address, treatment plans, and other types of personal information.

SHIELDS for Families conducted an exhaustive search, but was unable to identify the person or persons responsible for the theft. We deeply regret what has happened and if the culprit(s) are identified we will be seeking the severest penalties possible under HIPAA and CFR 42, Part 2.

There’s a lot more to the notice, but no offer of any free services.

Hogan Services Inc. Health Care Premium Plan,MO,,”1,134″,3/30/2012,Unauthorized Access/Disclosure,Email,6/8/2012,,
I haven’t found anything on this breach yet.

Ameritas Life Insurance Corp.,NE,,”3,000″,3/21/2012,Theft,Laptop,6/8/2012,,
I haven’t found anything on this breach yet.

St. Mary Medical Center,CA,,”3,900″,5/7/2012,Loss,Other Portable Electronic Device,6/8/2012,,
A notice posted on their site explains:

On May 8, 2012, we discovered that an unencrypted thumb drive was lost the previous day. The drive contained patient names, account numbers, diagnoses, dates of admission and discharge, physician’s name, account numbers and medical record numbers. To date, we have not been able to locate this thumb drive. The thumb drive did not contain patient social security numbers, driver’s license numbers or home addresses.

In some cases, the HHS breach tool update provides details not previously disclosed:

  • Rex Smith, a podiatrist who had reported computer theft, reported that 20,915 patients had data on the stolen computer.
  • Emory Healthcare notified 315,000 about their missing backup disks.
  • UnitedHealth Group in Minnesota reported that 19,100 patients were notified after they discovered that an employee may have improperly accessed data.
  • Iowa Department of Human Services notified 3,000 of the breach where unshredded records mistakenly returned to a fire-destroyed building were found blowing around the area.

Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← CORRECTION
Elections Ontario breach update →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.