DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ninth months later, almost 860 Indiana residents are first being notified of the ADPI breach.

Posted on August 27, 2013 by Dissent

James D. Wolf Jr. of the Post-Tribune reported today that up to 860 patients who used the City of Valparaiso Fire Department ambulance service last year would be receiving breach notification letters from ADPI.

You remember the ADPI breach, of course. I first reported on it November, 2012, when I also started compiling a list of all of ADPI’s clients that had been affected by the breach.

And yet it seems that individuals whose data were compromised for at least one city/client are first finding out now. Why the delay if  the employee was arrested last year and pleaded guilty?  Why weren’t affected Valparaiso residents notified last year?

After some digging, I finally located the city’s notice concerning the breach, and therein lies the explanation – of sorts:

This notice is provided by the Valparaiso Fire Department (the “Ambulance Agency”) concerning a data breach incident affecting records of a number of Ambulance Agency patients. Advanced Data Processing, Inc. (the “Company”) manages billing for the Ambulance Agency and on July 16, 2013 the Company learned from the Internal Revenue Service that certain patient records connected with the Ambulance Agency may have been improperly accessed. Accessed account information included name, date of birth, Social Security number and record identifier, but no medical information was accessed.

So ADPI never figured out all of the data that was accessed by the former employee, it seems, and only found out last month when the IRS contacted them. The fact that the IRS contacted them suggests to me that the data of at least some residents of Valparaiso was misused as part of the tax refund scheme although ADPI says it does not know whether any data was misused. The fire department’s notice continues:

By way of background, this past Fall the Company was notified by law enforcement in Tampa, Florida (on October 1, 2012) that a now-former employee of the Company illegally accessed and disclosed certain patient account information in connection with a scheme to file false federal tax returns. Based on the information available to the Company after a thorough internal and external forensic review, it appears that only patients who had ambulance transports during the period January 1 through June 21, 2012 would be potentially affected.

I think one can reasonably question any claim that there was a “thorough” forensic review if ADPI’s review did not reveal that up to 860 residents of Valparaiso may have had their data accessed.

When the Company first learned of this incident the Company had no reason to believe that any account information of the Ambulance Agency had been accessed.

Then that strikes me as a failure of their monitoring or auditing protocols.

The employee was apprehended by authorities, immediately terminated by the Company, pleaded guilty to charges brought against her, and is now awaiting sentencing.

Based on the additional information that was recently provided to the Company by the IRS, however, the Company and the Ambulance Agency have learned that account information of some patients of the Ambulance Agency may have been among the information that was accessed by the former employee. Although it is not known whether any of such information was actually misused, because this cannot be ruled out, this notice is being provided out of an abundance of caution.

“Abundance of caution?” An abundance of caution would have been to notify every person who used a service that was a client of ADPI’s during the time period in question. Notifying people after there is already evidence of misuse of at least a portion of the data is not any kind of “abundance of caution.”

Update: ADPI’s press release just showed up in my newsfeed. You can read it here.

No related posts.

Category: Health Data

Post navigation

← UK: Uni in Data Protection Breach
HHS adds 13 breaches to its breach tool →

2 thoughts on “Ninth months later, almost 860 Indiana residents are first being notified of the ADPI breach.”

  1. Anonymous says:
    August 27, 2013 at 4:47 pm

    Since both law enforcement and the IRS have notified them of potential data breaches and a former employee has pleaded guilty to charges, I am surprised that they did not offer credit monitoring services for at least a year to potentially affected patients. Everything the press release discussed for individuals who believe they may be affected appears to be the patient’s responsibility – monitoring their credit card statements and free credit reports, reporting suspicious activity to authorities, obtaining a police report, etc.

    1. Anonymous says:
      August 27, 2013 at 5:34 pm

      They did offer 1 year of Experian ProtectMyID Alert services to those whose data they were able to confirm had been accessed. You’re not seeing it now because they said they had no knowledge that Valpo’s data had been accessed. Why the IRS would be notifying them if there was no evidence makes no sense to me, but that’s ADPI’s claim.

      See this sample notification letter from last year where they offered a subset of patients a free service: https://oag.ca.gov/system/files/ADP%20Sample%20Notice%20Letters2_0.pdf.

      I personally don’t think they’ve offered people enough support and am somewhat surprised that I haven’t seen any lawsuits stemming from this breach. But then, I haven’t looked, either.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.