DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HHS updates breach tool, Part 1: many older incidents newly added

Posted on January 7, 2014 by Dissent

Okay, so HHS decided to give me a migraine by adding no less than 37 breach incidents to its public breach tool today. I suspect, but cannot be certain, that my repeated inquiries to them about breach reports not showing up in a timely fashion – the last such inquiry a few days ago – may have contributed to today’s massive update. Interestingly, a number of the entries refer to breaches well over a year old. Have they been sitting on these reports all this time?  And if so, why?

Let’s start with the breaches I knew about already:

  • In January 2013, Lee D. Pollan, DMD, PC notified NYS that a missing, and probably stolen, laptop contained unencrypted PHI on 13,806  former patients. That incident was reported to HHS as affecting 19,178 patients.
  • The Feinstein Institute for Medical Research breach involving a laptop stolen from an employee’s car was reported on this blog in September 2012, but now first shows up on HHS’s breach tool.
  • The Litton & Giddings Radiological Associates breach involving its janitorial service sending billing records handled by PST Services, Inc.  for recycling instead of shredding was reported on this blog in October 2012. It now appears on HHS’s list and indicates that 13,074 patients were affected.
  • The Washington University School of Medicine (Missouri) breach involving a laptop stolen from a lecturer in Argentina was reported on this blog in January 2013. It now appears on HHS’s breach list with a notation that 1,105 patients were affected.
  • The  El Centro Regional Medical Center breach involving records that went missing after they were turned over to an unnamed vendor for digitization and destruction was reported on this blog  in May 2013. It, too, now appears on HHS’s breach list, and we now learn that the vendor was Digital Archive Management and that 501 patients were affected.
  • The St. Elizabeth’s Medical Center (Massachusetts) breach  involving paper records first reported in February 2012 on this blog and updated in April 2012 has now been added to the breach list.
  • The Carolinas Medical Center – Randolph breach involving an e-mail hack that was reported on this blog in December 2012 has been added to the list.
  • The Volunteer State Health Plan breach added to their site appears to be a duplicate of a previous entry that had already been noted on this site.  Similarly, the Vidant Pungo Hospital breach added to their breach list today also appears to be a duplicate of an earlier entry, as reported previously on this blog.
  • The Jackson Health System breach involving a volunteer stealing/copying PHI on a smartphone was reported on this blog in December 2012.
  • Children’s Hospital Boston reported 2,159,patients had PHI on a laptop stolen on March 25, 2012. I suspect that there’s a typo in HHS’s entry and that this is the May 2012 incident previously reported.

Not all the additions were older breaches. Some of the more current ones that we already knew about include:

  • The New Mexico Oncology Hematology Consultants breach involving a laptop stolen from an employee’s office has been added to the list. It reportedly affected 12,354 patients.
  • The South Carolina Health Insurance Pool (SCHIP) breach involving a laptop stolen from a De Loach & Williamson employee’s car  has been added to the list.
  • The L.A. Gay & Lesbian Center hack resulted in notification of 59,000.

In the next post, I’ll discuss the newly added breaches we didn’t know about already.

 

 


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← ZA: Hacker reveals e-toll website security flaw
HHS updates breach tool, Part 2: it's news to me →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.