DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

OK, now HHS is messing with me…

Posted on January 10, 2014 by Dissent

Friday afternoon and HHS has added dozens of new updates/revisions to the breach tool – after adding dozens more during the week? Yikes. As before, some of them appear to be older incidents that had never been posted publicly while others are more recent.

One change that I noted immediately is that they’ve now organized the Advanced Data Processing breach that I’ve covered on this blog before (see previous posts). Their entry shows that the following covered entities were all affected by the insider breach for tax refund fraud that they code as “theft” from “desktop computer:”

  • 1st response Medical Transpot Corp.
  • City of North College Hill
  • Okaloosa County Public Safety
  • Sumner County Emergency Medical Services
  • City of Seguin – Fire/EMS Department
  • City of Overland Park Fire Department
  • Osceola County EMS
  • City of Gloucester, Fire Department
  • Washington County EMS
  • City of Covington Kentucky Fire Department
  • Sandoval County Fire Department
  • Frederick County Division of Fire Rescue
  • Village of North Palm Beach Fire Rescue
  • Bonham Fire Department
  • North Lake Tahoe Fire Protection District
  • Tahoe Douglas Fire Protection District
  • McAlester Fire/EMS
  • City of Blue Springs EMS
  • City of Azle Fire Department
  • City of Casselberry
  • Harris County Emergency Corps
  • Valparaiso Fire Department
  • City of Victoria Fire Department
  • City of Yuma
  • City of Atlanta/ Atlanta Fire Rescue Department
  • Omaha Fire & Rescue
  • City of Omaha
  • City of Berkeley
  • Cumberland County Hospital System, Inc.
  • Grady Health System
  • City of Los Angeles/Los Angeles Fire Dept.
  • City of Corona
  • City of Yuma
  • City of Omaha

HHS shows the total number affected as 32,000.

You can compare their list to the list I had constructed with numbers based on my research, here.

One implication of their reorganization should be that this should now be counted as (just) one incident instead of multiple incidents as they originally showed it. Unfortunately, the breach tool still shows these as individual incidents, many of which do not even list Advanced Data Processing as the involved business associate.

I’ll get to the other 3 dozen+ additions to the breach tool as time permits over the weekend.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← House passes bill to require data breach notification for breaches involving Healthcare.gov and state exchanges
Hackers Steal Card Data from Neiman Marcus →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.