DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CHRISTUS St. John reports patient information breach

Posted on November 24, 2012 by Dissent

Through the law firm of Baker & Hostetler,  CHRISTUS St. John Hospital notified the New Hampshire Attorney General’s Office of a breach involving unencrypted patient information on a lost memory stick.

The Houston-based hospital learned of the September 25th incident on September 27th, but a search was unsuccessful in recovering the drive, which contained  the name, date of birth, Social Security number, health insurance information, diagnoses, and progress notes on patients in the St. John Sports Medicine Program.  The total number of patients whose unencrypted data were on the lost stick was not reported, and this incident, reported to New Hampshire on November 16, has not (yet) shown up on HHS’s breach tool.

A notice about the incident is also linked from the hospital’s home page.  The web site notice indicates that not all patients in the program are affected, only those who were treated from January 1, 2011 to July 31, 2012.

Both the notice and the  letter to New Hampshire states that “St. John has no reason to believe that any of the information has been accessed…”  How would it know that? Was there some program on the stick that would call home if files were opened or the stick inserted in a computer? If not, is it misleading to suggest that there’s no reason to believe the information has been accessed if there’s also no reason to believe that it hasn’t been accessed by someone who may have found the drive?  And should a hospital claim it has no reason to believe the information has been used improperly? Does it have any reason to believe it hasn’t been used improperly? Did the hospital or its lawyers run credit checks and/or any investigations that would determine whether patients’ health insurance information had been misused by others? I really wish such reassuring platitudes were impermissible absent some actual investigation or offer of proof. But that’s just my opinion.

The hospital is offering a year of free credit protection monitoring and has set up a dedicated call center for affected patients or those who have questions.

CHRISTUS St. John Hospital is part of the CHRISTUS Healthcare System. In April 2005, CHRISTUS St. Joseph Hospital in Houston reported that it was notifying 16,000 patients  that a computer stolen from its business associate, Gateway File Systems, contained medical records and Social Security numbers.  The theft had occurred in January 2005, and the hospital claimed that the data were encrypted. In November 2008, CHRISTUS Healthcare System reported that two backup tapes with  patient information had been stolen from an unattended vehicle in Houston. I do not know whether that latter breach also affected CHRISTUS St. John Hospital patients, but their statement at the time indicated that some patients in Houston were affected, as well as patients in other parts of Texas and other states.

 

 

 

 


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← Answer to yesterday’s trivia question
Hannibal account leak proven as false →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.