DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CHRISTUS St. John reports patient information breach

Posted on November 24, 2012 by Dissent

Through the law firm of Baker & Hostetler,  CHRISTUS St. John Hospital notified the New Hampshire Attorney General’s Office of a breach involving unencrypted patient information on a lost memory stick.

The Houston-based hospital learned of the September 25th incident on September 27th, but a search was unsuccessful in recovering the drive, which contained  the name, date of birth, Social Security number, health insurance information, diagnoses, and progress notes on patients in the St. John Sports Medicine Program.  The total number of patients whose unencrypted data were on the lost stick was not reported, and this incident, reported to New Hampshire on November 16, has not (yet) shown up on HHS’s breach tool.

A notice about the incident is also linked from the hospital’s home page.  The web site notice indicates that not all patients in the program are affected, only those who were treated from January 1, 2011 to July 31, 2012.

Both the notice and the  letter to New Hampshire states that “St. John has no reason to believe that any of the information has been accessed…”  How would it know that? Was there some program on the stick that would call home if files were opened or the stick inserted in a computer? If not, is it misleading to suggest that there’s no reason to believe the information has been accessed if there’s also no reason to believe that it hasn’t been accessed by someone who may have found the drive?  And should a hospital claim it has no reason to believe the information has been used improperly? Does it have any reason to believe it hasn’t been used improperly? Did the hospital or its lawyers run credit checks and/or any investigations that would determine whether patients’ health insurance information had been misused by others? I really wish such reassuring platitudes were impermissible absent some actual investigation or offer of proof. But that’s just my opinion.

The hospital is offering a year of free credit protection monitoring and has set up a dedicated call center for affected patients or those who have questions.

CHRISTUS St. John Hospital is part of the CHRISTUS Healthcare System. In April 2005, CHRISTUS St. Joseph Hospital in Houston reported that it was notifying 16,000 patients  that a computer stolen from its business associate, Gateway File Systems, contained medical records and Social Security numbers.  The theft had occurred in January 2005, and the hospital claimed that the data were encrypted. In November 2008, CHRISTUS Healthcare System reported that two backup tapes with  patient information had been stolen from an unattended vehicle in Houston. I do not know whether that latter breach also affected CHRISTUS St. John Hospital patients, but their statement at the time indicated that some patients in Houston were affected, as well as patients in other parts of Texas and other states.

 

 

 

 

Category: Health Data

Post navigation

← Answer to yesterday’s trivia question
Hannibal account leak proven as false →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report