DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PA: Supportive Concepts for Families notifies clients after personal information was exposed on Google for 10 months

Posted on February 24, 2014 by Dissent

Supportive Concepts for Families, Inc. in Reading, PA offers services for clients with mental health/intellectual developmental disabilities. A hardware upgrade in February 2013 left consumer information in an internal database exposed in Google with no login credentials required.

They have posted a notice dated February 13, 2014 on their site, although it is not linked from their homepage, and you’d have to search under their HIPAA section of their site to find it:

SCFFI maintains an internal database that contains health information about our consumers. This database is used by our employees as they provide care to our consumers. The health information in this database is designed and intended to be accessible through our internal web portal only to authorized users who have been issued required log-in IDs and passwords. On December 16, 2013, we learned that the health information in our internal database was available on the internet by a Google search using the terms “Supportive Concepts for Families” and consumer first and last name, without using a log-in and password. The information available included names, addresses, social security numbers, dates of birth, dates of service, and consumer service notes entered by our employees.

We immediately investigated the incident and determined that when SCFFI employees performed a computer hardware upgrade in February 2013, some of the portal’s security settings were not properly set. Without the proper security settings, it was possible to access the web portal information from remote locations without using log-in and password authorization. Within one hour after discovering the breach on December 16, we changed the security settings so that only authorized users with log-in IDs and passwords could access and view our database. In our investigation, we reviewed the access history to the database through our computer logs going back to the upgrade in February 2013. We have found only a few instances of access that we cannot identify. Most access was made by SCFFI personnel just before the breach was reported to us, or by SCFFI personnel to confirm the nature of the problem before correcting the server’s security settings. We have no evidence about which records may have been accessed by unknown individuals or whether health information that may have been accessed has been misused.

Because protecting your personal information is important to us, we want to make you aware of two important things you can do to protect the consumer. First, keep a close watch on your bank statements, credit card statements, personal mail and other bills and financial statements for any suspicious or unauthorized activity. Second, you may want to consider placing a fraud alert on your credit files. A fraud alert lets creditors know to contact you before opening new accounts. You may call any one of the three credit reporting agencies at the number below. This will let you automatically place fraud alerts with all of the agencies. You will then receive letters from all of them, with instructions on how to get a free copy of your credit report from each.

  • TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790
  • Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241
  • Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 9532, Allen, TX 75013

In addition to restoring the security settings for our database, SCFFI staff will monitor internal consumer accounts for any suspicious activity, conduct random and frequent performance testing and monitoring of our database security, and have refresher training on our health information privacy and breach reporting obligations. SCFFI is also working with an information technology vendor to perform testing on our data systems to identify and correct any weaknesses that may arise.

Should you have any questions about this notice letter, or want additional information, please contact me directly at [email protected] or at 1-888-686-7233 (ext.1230).Please be assured that SCFFI is committed to providing quality care to our consumers, including maintaining the privacy and security of your personal and medical information. We take many precautions to provide adequate safeguards, and continuously modify our systems and practices to enhance the privacy and security of your information. We sincerely apologize and truly regret that this incident occurred.

Sincerely,

SUPPORTIVE CONCEPTS FOR FAMILIES, INC.
Drue Robinson, Chief Program Officer

SCFFI reported to HHS that the breach affected 593 clients. The incident was added to HHS’s public breach tool today.

Category: Health Data

Post navigation

← PA: Geisinger-Bloomsburg Hospital notifies patients of missing laboratory records and specimens from 2006 and 2007
Brooklyn Hospital Center notifies patients of stolen USB with medical information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.