DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former employee of Texas Department of State Health Services charged with theft of hundreds of patients' information

Posted on January 31, 2013 by Dissent

Casey Murphy reports:

An employee of the Northeast Texas Public Health district was arrested earlier this month for allegedly stealing the identities of hundreds of patients at a Mount Pleasant clinic she worked for before moving to Tyler.

Selena Patino, 38, of Mount Pleasant, was arrested by the Titus County Sherriff’s Office on Jan. 4 and charged with fraudulent use or possession of identifying information, a second-degree felony, and credit card abuse, a state jail felony. If convicted, she faces up to 20 years in prison for the second-degree felony and up to two years in a state jail facility for the state jail felony.

Ms. Patino worked in the Texas Department of State Health Services (DSHS) Mount Pleasant clinic since 2008 before becoming employed by the Northeast Texas Public Health District, or NET Health, in October. She was terminated by NET Health on Jan. 3, and authorities do not believe any clients of the local facility were victims.

Read more on TylerPaper.com. A statement on the sheriff’s office web site, dated January 8, states:

During the first week of the new year, the Titus County Sheriff’s Office received multiple identity theft related complaints from citizens. During the investigation, investigators were led to a suspect by the name of Selena Patino. Patino was identified as a former Texas Department of Health and Human Service worker in Mt. Pleasant. Investigators determined that Patino had assumed the identity of clients receiving immunizations and other services at the Texas Department of Health and Human Services on N. Jefferson in Mt. Pleasant. Patino used this client information and applied for credit cards online and when approved made as many purchases as the credit card would allow. The list of individuals that had their information stolen is still growing and we believe it to be in the hundreds. If you have used the services of the office of the Texas Department of Health and Human Services in Mount Pleasant in the past few months you need to check your credit report. We are going to contact the Texas Department of Health with a list of clients that we know had their identity compromised and you should expect the Texas Department of Health to contact you.

On Friday, January 4th, 2012 a search and arrest warrant was issued for Selena Patino, age 38, and her residence located in the 4800 Block of FM 1735 Mount Pleasant, TX. Patino was arrested and charged with Fraudulent Use or Possession of Identifying information, a 2nd Degree Felony and Credit Card Abuse, a State Jail Felony. Some of the property that Selena Patino purchased with the credit cards was recovered along with stolen credit cards, immunization records and other documents with clients name (or family members name) and social security number were found.

An individual adjudged guilty of a felony of the second degree shall be punished by imprisonment in the Texas Department of Criminal Justice for any term of not more than 20 years or less than 2 years. In addition to imprisonment, an individual adjudged guilty may be punished by a fine not to exceed $10,000.

Category: Health Data

Post navigation

← Leader of Florida ID theft ring convicted
Bill advances to help prevent state data breaches →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.