DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Oak River Insurance notifies 2,700 after employee disclosed workers’ compensation claims information

Posted on November 23, 2012 by Dissent

Noah Buhayar of Bloomberg BusinessWeek reports another insurance company has suffered a breach:

Oak River Insurance Co., a subsidiary of Warren Buffett’s Berkshire Hathaway Inc. (A), asked clients to guard against identity theft after an employee released some of their personal information.

The data are tied to about 2,700 workers’ compensation claimants who had spinal surgery in Southern California between 2004 and 2011 or had urinalysis testing, diagnostics or other medical treatment performed in the state between 2006 and 2011, the unit of Omaha, Nebraska-based Berkshire said in a Nov. 21 statement posted online. The personal information included medical records, Social Security numbers and health insurance information, the insurer said.

Read more on Bloomberg BusinessWeek.

In a press release dated November 21, the firm writes:

The Company discovered that a former employee, while employed with the Company, disclosed personal information about workers compensation claimants to certain individuals who were cooperating in an investigation of suppliers of medical services. The disclosures occurred between approximately October 2011 and March 2012.

It is important to note that we do not believe that access to individuals’ social security numbers or other identifying information was the goal of the disclosures, nor do we believe that the purpose of the disclosures was to compromise the security, confidentiality or integrity of personal information. Further, as of the date of this notice, we are unaware of any actual identity theft resulting from these disclosures.

Strange case. If the employee was intentionally cooperating with some investigation, why didn’t the employee notify the insurer? Was the employee asked to keep his/her employer in the dark, and if so, why? And how did this go on for a year without the insurer detecting it? Maybe some mainstream journalist will follow up on this one and ask more questions about how and why this happened.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: Breach IncidentsBusiness SectorInsiderU.S.

Post navigation

← VeriFi CCTV & VŠB-Technical University, Data Leaked
Answer to yesterday’s trivia question →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.