DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

OK, now HHS is messing with me…

Posted on January 10, 2014 by Dissent

Friday afternoon and HHS has added dozens of new updates/revisions to the breach tool – after adding dozens more during the week? Yikes. As before, some of them appear to be older incidents that had never been posted publicly while others are more recent.

One change that I noted immediately is that they’ve now organized the Advanced Data Processing breach that I’ve covered on this blog before (see previous posts). Their entry shows that the following covered entities were all affected by the insider breach for tax refund fraud that they code as “theft” from “desktop computer:”

  • 1st response Medical Transpot Corp.
  • City of North College Hill
  • Okaloosa County Public Safety
  • Sumner County Emergency Medical Services
  • City of Seguin – Fire/EMS Department
  • City of Overland Park Fire Department
  • Osceola County EMS
  • City of Gloucester, Fire Department
  • Washington County EMS
  • City of Covington Kentucky Fire Department
  • Sandoval County Fire Department
  • Frederick County Division of Fire Rescue
  • Village of North Palm Beach Fire Rescue
  • Bonham Fire Department
  • North Lake Tahoe Fire Protection District
  • Tahoe Douglas Fire Protection District
  • McAlester Fire/EMS
  • City of Blue Springs EMS
  • City of Azle Fire Department
  • City of Casselberry
  • Harris County Emergency Corps
  • Valparaiso Fire Department
  • City of Victoria Fire Department
  • City of Yuma
  • City of Atlanta/ Atlanta Fire Rescue Department
  • Omaha Fire & Rescue
  • City of Omaha
  • City of Berkeley
  • Cumberland County Hospital System, Inc.
  • Grady Health System
  • City of Los Angeles/Los Angeles Fire Dept.
  • City of Corona
  • City of Yuma
  • City of Omaha

HHS shows the total number affected as 32,000.

You can compare their list to the list I had constructed with numbers based on my research, here.

One implication of their reorganization should be that this should now be counted as (just) one incident instead of multiple incidents as they originally showed it. Unfortunately, the breach tool still shows these as individual incidents, many of which do not even list Advanced Data Processing as the involved business associate.

I’ll get to the other 3 dozen+ additions to the breach tool as time permits over the weekend.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← House passes bill to require data breach notification for breaches involving Healthcare.gov and state exchanges
Hackers Steal Card Data from Neiman Marcus →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.