DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Scottsdale Dermatology Clinic patients became victims of ID theft after billing firm employee stole their information

Posted on October 9, 2013 by Dissent

The Sonoran News reports that two people have been arrested in Maricopa County on charges related to identity theft. One of them, Brittany Davidson, is suspected of stealing the credit card information of multiple patients in the course of her employment at a medical billing firm that is a business associate of Scottsdale Dermatology Clinic.

Sheriff’s detectives arrested both and Davidson later admitted to detectives to stealing and using addresses and credit card numbers from patients of Scottsdale Dermatology and their associated offices elsewhere in the valley.

Sheriff’s detectives ascertained that the two suspects had been accessing credit card information from untold numbers of patients from the dermatology clinics and were routinely using the cards for all kinds of purchases from pizza to tires and rims for their automobiles.

Read more on Sonoran News. It probably wasn’t a brilliant idea to steal the information of a sheriff’s captain.

AZfamily.com identifies the medical billing firm as All Source Medical Management. I do not find any statement or press release on either the clinic’s site or the business’s, and have sent an inquiry to the business associate requesting a statement.

No related posts.

Category: Uncategorized

Post navigation

← UK: Confidential patient details were in filing cabinet lost by Sutton hospital
Delay in FTC v. Wyndham →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.