DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CHRISTUS St. John reports patient information breach

Posted on November 24, 2012 by Dissent

Through the law firm of Baker & Hostetler,  CHRISTUS St. John Hospital notified the New Hampshire Attorney General’s Office of a breach involving unencrypted patient information on a lost memory stick.

The Houston-based hospital learned of the September 25th incident on September 27th, but a search was unsuccessful in recovering the drive, which contained  the name, date of birth, Social Security number, health insurance information, diagnoses, and progress notes on patients in the St. John Sports Medicine Program.  The total number of patients whose unencrypted data were on the lost stick was not reported, and this incident, reported to New Hampshire on November 16, has not (yet) shown up on HHS’s breach tool.

A notice about the incident is also linked from the hospital’s home page.  The web site notice indicates that not all patients in the program are affected, only those who were treated from January 1, 2011 to July 31, 2012.

Both the notice and the  letter to New Hampshire states that “St. John has no reason to believe that any of the information has been accessed…”  How would it know that? Was there some program on the stick that would call home if files were opened or the stick inserted in a computer? If not, is it misleading to suggest that there’s no reason to believe the information has been accessed if there’s also no reason to believe that it hasn’t been accessed by someone who may have found the drive?  And should a hospital claim it has no reason to believe the information has been used improperly? Does it have any reason to believe it hasn’t been used improperly? Did the hospital or its lawyers run credit checks and/or any investigations that would determine whether patients’ health insurance information had been misused by others? I really wish such reassuring platitudes were impermissible absent some actual investigation or offer of proof. But that’s just my opinion.

The hospital is offering a year of free credit protection monitoring and has set up a dedicated call center for affected patients or those who have questions.

CHRISTUS St. John Hospital is part of the CHRISTUS Healthcare System. In April 2005, CHRISTUS St. Joseph Hospital in Houston reported that it was notifying 16,000 patients  that a computer stolen from its business associate, Gateway File Systems, contained medical records and Social Security numbers.  The theft had occurred in January 2005, and the hospital claimed that the data were encrypted. In November 2008, CHRISTUS Healthcare System reported that two backup tapes with  patient information had been stolen from an unattended vehicle in Houston. I do not know whether that latter breach also affected CHRISTUS St. John Hospital patients, but their statement at the time indicated that some patients in Houston were affected, as well as patients in other parts of Texas and other states.

 

 

 

 

Category: Health Data

Post navigation

← Answer to yesterday’s trivia question
Hannibal account leak proven as false →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dublin ETB fined €125,000 for data protection breaches
  • From $5,000 to $800,000: Days Apart, OCR Security Settlements Show Puzzling Math
  • Liberty Township in Ohio has recovered its network after a ransomware attack
  • Marquette County Medical Care Facility discloses data breach
  • Industry Letter – June 23, 2025: Impact to Financial Sector of Ongoing Global Conflicts
  • MNGI Digestive Health settles class action lawsuit stemming from BlackCat attack
  • Four REvil ransomware members released after time served on carding charges
  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.