DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Statement from St. Mary's Janesville Hospital

Posted on October 1, 2013 by Dissent

St. Mary’s Janesville Hospital in Wisconsin, a member of SSM Health Care, posted this statement on their web site today:

On August 27, 2013, we received a report that an SSM Health Care laptop was stolen from an employee’s car during a break-in.

We are sincerely sorry this happened and want to provide pertinent information concerning the occurrence along with the steps we are taking to minimize any potential impact.

We have identified 629 patients who may have been affected. We are notifying each of the patients or their guardians by letters mailed September 30, 2013. Care was received at St. Mary’s Janesville Hospital in the emergency department between January 1 and August 26, 2013.

Upon our own thorough investigation and our attempts to identify the affected patients, we determined that the information on the laptop included some protected health information relating to medical visits. The information may have included patient name, date of birth, medical record and account numbers, provider and department of service, bed and room number, date and time of service, visit history, complaint, diagnosis, procedures, test results, vaccines, if administered, and medications. The laptop did not contain any Social Security numbers, addresses, credit card numbers, or financial information of any kind.

We have no reason to believe the laptop was stolen to gain access to patient information or that this information has been accessed or misused in any way. In fact, the computer was configured in such a way that information could not be written to the hard drive. Email information, however, was stored on the hard drive and password protected but not encrypted, which was in violation of St. Mary’s Janesville Hospital policy.

We take our responsibility to protect patient information very seriously. St. Mary’s Janesville Hospital is undertaking comprehensive reviews of this breach of policy and is instituting an information and re-education initiative to ensure that all employees and providers protect patient information at all times. We have inspected all laptops to ensure they all have encryption software. We will actively be monitoring consistency of laptop encryption and conducting monthly audits to ensure compliance with our encryption policies.

Additionally, we have partnered with ID Experts, a leader in identity protection services with extensive experience in this field, for patient identity monitoring and protection at our expense. Through ID Experts, we have arranged for affected patients to opt for a one-year identity theft monitoring and protection at our expense.

The notifications to patients, the federal Department of Health and Human Services, and the general public through a news release and posting on the hospital’s website are being made pursuant to the Health Information Technology for Economic and Clinical Health Act of 2009 and revised January 2013.

Media coverage by the Gazette Extra adds this detail:

Police have no suspects in the theft, according to police reports. The laptop was stolen from a vehicle parked at a downtown apartment, and reports said the thief or thieves rummaged through the vehicle, left credit cards scattered on the floor and dropped papers and a pocket pursue with change on the ground.

Category: Health Data

Post navigation

← Updates to HHS's breach tool
UnityPoint Health notifies 1,800 patients after contractor's employee inappropriately accessed electronic medical records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.