DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

South Sound doctor's laptop stolen, containing information of about 900 patients

Posted on January 28, 2014 by Dissent

Alexis Krell reports:

A South Sound doctor who visits patients at local nursing homes said Monday his laptop computer with personal information of about 900 patients he’s seen for the past three years was stolen from his vehicle.

Dr. Ronald Schubert, whose practice is based in Federal Way, said he saw the patients between January 2011 and November 2013 in Pierce, Thurston and Kitsap counties. Information on the stolen computer includes names, Social Security numbers, birth dates, addresses and medical information.

Read more on The News Tribune.  This incident had been added to HHS’s breach tool in the January 10 update, as I reported here.

Of note, Dr. Schubert’s license to practice medicine was (and remains) under probation at the time of this incident. He had been disciplined by the state over serious charges involving sexual misconduct with a patient that went on for over seven years.  As a result of the disciplinary action, Dr. Schubert was and is required  to comply with all state, federal, and local laws and administrative rules governing the practice of medicine.  Could violating HIPAA’s Security Rule run him afoul of that provision of the order? Possibly, although I suspect the state is more concerned about the misconduct and boundaries issues and this incident will have little or no impact on his probationary status.

But that brings us back to a question I’ve posed previously on this blog: are covered entities who have violated the ethics or licensing rules due to failure to control impulses – whether for alcohol, drugs, or sex – more likely to have data/HIPAA breaches that are also related to failure to control impulses (such as impulse to check a state database about a non-patient, or impulsively leaving a laptop in the car when prudence dictates you take it with you, etc.)?

I think it’s an interesting question that someone might want to research by starting with a sample of covered entities who have reported breaches and backtracking to determine what percent of them had disciplinary action against their licenses prior to the breach. And compute the same statistic for a matched sample of providers who have not reported any breaches.

It’s just a thought….

 


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← Patient information may be exposed in UC Davis health system breach
Five steps to take if you’ve become a victim of ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.