DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HHS updates its breach tool, but still leaves us pretty much in the dark

Posted on July 29, 2013 by Dissent

HHS has added 19 reports to its breach tool. Some of these have been previously covered on this blog, and I’ve linked to the coverage below:

  • Texas Health Harris Methodist Hospital Fort Worth/Shred-it
  • Iowa Department of Human Services (affected 7,335, a fact we did not previously know)
  • San Jose Medical Supply Co.  (affected 800, a fact we did not previously know)
  • A Harris County,TX breach that affected 21,000 was reported on my companion web site, but it apparently included PHI as well.
  • The Sutter Health East Bay Region, Alta Bates Summit Medical Center, Sutter Delta Medical Center, Eden Medical Center/Nelson Family of Companies breach affected 4,479 patients. This is the first reference I’m seeing to the Nelson Family of Companies, which provides staffing/recruitment services to businesses.
  • Illinois Department of Healthcare and Familiy Services, Family Health Network
  • Long Beach Memorial Medical Center
  • The Delta Dental of Pennsylvania/ZDI breach affected 4,718. Or did it? Why did they report this number to HHS when the statement they sent me said that over 14,000 were notified?
  • James A. Fosnaugh

Some of the newly added breaches have not been previously noted on this blog:

  • Lone Star Circle of Care in Texas reported that 1,955 patients had data on a laptop stolen on or about May 1, 2013. An FAQ on their web site indicates that the laptop was stolen from an employee’s car. The laptop contained personal health information of certain patients who had been hospitalized at an Austin-area health system in 2012 or 2013 and included name, address, date of birth, Social Security number, and primary diagnosis related to the individuals’ or their children’s recent hospitalizations.
  • Jacksonville Spine Center in Florida reported that 5,200 patients were affected by an April 25 breach involving paper records. I cannot find any substitute notice on their site or via a Google search at this time.
  • Samaritan Regional Health System in Ohio reported that 2,203 had PHI on paper records in a May 29th breach. I can find no notice on their site at this time.
  • South Florida Neurology Associates, P.A. in Boca Raton reported that 900 patients had PHI on a laptop stolen sometime between May 25 and May 30. There is no notice on their web site at this time and I can find no copy of any substitute notice.
  • Sheet Metal Local 36 Welfare Fund reported that 4,560 were affected by a breach at People Resource Corporation that occurred between August 1, 2012 and July 8, 2013. I can find no notice online concerning this breach at this time, nor even any listing for People Resource Corporation.
  • Aflac in Georgia/Alberto Gerardo Vazquez Rivera reported that 679 insured had PHI on a laptop stolen on May 8, 2013.
  • Health Net, Inc. in California reported that 8,331 insured members were affected by a paper records breach that occurred between April 1 and May 31, 2013.
  • Medtronic, Inc. in Minnesota reported that 2,764 patients had PHI on paper records that were lost between March 28 and March 29. [UPDATE: see additional information here]
  • MED-EL Coproration in North Carolina reported that 609 individuals had PHI exposed due to an e-mail error on June 25.
  • Northrop Grumman Retiree Health Plan reported that 4,305 enrollees were affected by a paper records breach involving CVS Caremark.

The preceding’s lack of sufficient details demonstrates, yet again, why we should have full and prompt access to the forms entities complete and submit electronically to HHS. As it stands now, we do not have the entities’ descriptions of their breaches.

Category: Health Data

Post navigation

← Walgreens must pay woman $1.44 million over HIPAA violation
Stolen laptop contained 2,000 Fairfax student health records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)
  • RCMP thumb drive with informant, witness data obtained by criminals: watchdog
  • Evoke Wellness to Pay $1.9 Million to Settle FTC Claims That They Misled Consumers Seeking Substance Use Disorder Treatment
  • Former Hilliard treatment center employee accused of selling patient data on dark web
  • Trump Rewrites Cybersecurity Policy in Executive Order
  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Republicans Move A Step Closer To Repealing Protections For Abortion Clinics
  • Democrats introduce bill that aims to protect reproductive health data
  • Don’t Mind If I Do: Montana Says Hands Off Neural Data
  • 23andMe leadership grilled by lawmakers demanding answers about data security amid bankruptcy sale
  • Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.