DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Updates to HHS breach tool

Posted on February 12, 2014 by Dissent

HHS added a number of breaches to its public breach tool yesterday, including one from 2008.

Here are the ones we already knew something about, linked to previous coverage on this blog:

  • Phoebe Putney Memorial Hospital
  • Coulee Medical Center reported that 2,500 patients had their PHI improperly shared by the physician
  • University of Pennsylvania Health System reported that the error by RevSpring affected 3,000 (more than what was reported previously)
  • North Carolina Department of Health and Human Services
  • Southwest General Health Center notified 953 patients, not 480 as reported in the media at the time. I’m not sure why the HHS entry shows the breach occurred between April and October and suspect the hospital was reporting the dates of patient visits rather than the date the binder went missing.
  • St. Joseph Health System
  • RGH Enterprises  d/b/a Edgepark Medical Supplies notified 4,230 patients.
  • Complete Medical Homecare notified 1,700 patients.
  • Robert Neves, M.D. Curiously, this 2011 incident had been posted to their breach tool back in 2011. Why that entry was removed and replaced more recently with the same information is unclear.

The following breaches were not previously reported on this blog. Of concern, this is the first time I’ve been unable to find ANY information on so many breaches reported to HHS. I’ve sent email inquiries to some of the covered entities below and hope to have more details at some point, so do check back for updates:

  • 101 Family Medical Group in California reported a laptop theft involving business associate Phreesia on November 23, 2013. The laptop reportedly contained information on 2,500 patients. There is no statement on their website and I can find no media coverage of the incident.
  • Tri-Lakes Medical Center in Mississippi notified 1,489 patients after what might be a hacking incident on September 20, 2013. There is no statement on their website at this time and I can find no media coverage, either.
  • Virginia  Dept. of Medical Assistance Services notified 25,513 clients of a breach involving Virginia Premier Health Plan (VPHP) that occurred in November. The breach was coded as “Unauthorized Access/Disclosure, Other”, Paper. A legal (substitute) notice appeared on HamptonRoads.com on January 23, but is no longer available.
  • Cook County Health & Hospitals System in Illinois reported that 22,511 were notified of a breach involving e-mail that occurred on November 12.
  • The University of Texas MD Anderson Cancer Center in Texas reported that 3,598 were notified of an incident on December 2 involving a portable electronic device.  The missing thumb drive is believed to contain “some patient information, including first and last names, medical record numbers, dates of birth (for a very small number of patients), diagnoses, and treatment and/or research information relating to treatment of infections. The USB thumb drive contained no Social Security numbers or other financial information.” Their notification can be found on their website, here.
  • Network Pharmacy Knoxville in Tennessee reported that 9,602 patients had data on laptop that was stolen on November 18. A cached copy of a legal notice that appeared on January 20 in the Times Free Press reads:

LEGAL NOTICE Network Pharmacy, Knoxville Reports Possible Breach of Information

Officials at Network Pharmacy, Knoxville have reported a possible breach of patient information due to a stolen laptop that was not encrypted. The information on this laptop included patient names, dates of birth and personal medical information. Network Pharmacy, Knoxville has begun an immediate investigation of the incident and security measures have been revised to prevent future incidents of this nature. The company believes there is low risk of this information being used inappropriately; however, we understand any concern of possible unauthorized use of personal information. If you have any questions regarding this incident, you may contact us by using the toll-free number 1-888-568-8578. When using the toll-free number, please indicate that you are calling in regards to the breach of information that occurred at Network Pharmacy, Knoxville.

  • Health Dimensions in Michigan reported that 5,370 patients were notified of an incident on November 2nd involving “Theft,Network Server.”
  • Triple-S Salud in Puerto Rico and Triple-C, Inc. reported that 8,000 were affected by a breach in October 2008 involving “Theft, Unauthorized Access/Disclosure”,Network Server.” I have no idea what this is about, but note Triple-S Salud has had other very large breaches since that time. I also have no idea why this is even on HHS’s public breach tool if it occurred in 2008 – before HITECH –  unless the breach was only first discovered after HITECH went into effect.

Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
Category: Health Data

Post navigation

← California Dept. of Public Health notifies some clients of privacy breach
Statement on Target data breach by HVAC vendor Fazio Mechanical Services →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.