DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PA: Supportive Concepts for Families notifies clients after personal information was exposed on Google for 10 months

Posted on February 24, 2014 by Dissent

Supportive Concepts for Families, Inc. in Reading, PA offers services for clients with mental health/intellectual developmental disabilities. A hardware upgrade in February 2013 left consumer information in an internal database exposed in Google with no login credentials required.

They have posted a notice dated February 13, 2014 on their site, although it is not linked from their homepage, and you’d have to search under their HIPAA section of their site to find it:

SCFFI maintains an internal database that contains health information about our consumers. This database is used by our employees as they provide care to our consumers. The health information in this database is designed and intended to be accessible through our internal web portal only to authorized users who have been issued required log-in IDs and passwords. On December 16, 2013, we learned that the health information in our internal database was available on the internet by a Google search using the terms “Supportive Concepts for Families” and consumer first and last name, without using a log-in and password. The information available included names, addresses, social security numbers, dates of birth, dates of service, and consumer service notes entered by our employees.

We immediately investigated the incident and determined that when SCFFI employees performed a computer hardware upgrade in February 2013, some of the portal’s security settings were not properly set. Without the proper security settings, it was possible to access the web portal information from remote locations without using log-in and password authorization. Within one hour after discovering the breach on December 16, we changed the security settings so that only authorized users with log-in IDs and passwords could access and view our database. In our investigation, we reviewed the access history to the database through our computer logs going back to the upgrade in February 2013. We have found only a few instances of access that we cannot identify. Most access was made by SCFFI personnel just before the breach was reported to us, or by SCFFI personnel to confirm the nature of the problem before correcting the server’s security settings. We have no evidence about which records may have been accessed by unknown individuals or whether health information that may have been accessed has been misused.

Because protecting your personal information is important to us, we want to make you aware of two important things you can do to protect the consumer. First, keep a close watch on your bank statements, credit card statements, personal mail and other bills and financial statements for any suspicious or unauthorized activity. Second, you may want to consider placing a fraud alert on your credit files. A fraud alert lets creditors know to contact you before opening new accounts. You may call any one of the three credit reporting agencies at the number below. This will let you automatically place fraud alerts with all of the agencies. You will then receive letters from all of them, with instructions on how to get a free copy of your credit report from each.

  • TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790
  • Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241
  • Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 9532, Allen, TX 75013

In addition to restoring the security settings for our database, SCFFI staff will monitor internal consumer accounts for any suspicious activity, conduct random and frequent performance testing and monitoring of our database security, and have refresher training on our health information privacy and breach reporting obligations. SCFFI is also working with an information technology vendor to perform testing on our data systems to identify and correct any weaknesses that may arise.

Should you have any questions about this notice letter, or want additional information, please contact me directly at [email protected] or at 1-888-686-7233 (ext.1230).Please be assured that SCFFI is committed to providing quality care to our consumers, including maintaining the privacy and security of your personal and medical information. We take many precautions to provide adequate safeguards, and continuously modify our systems and practices to enhance the privacy and security of your information. We sincerely apologize and truly regret that this incident occurred.

Sincerely,

SUPPORTIVE CONCEPTS FOR FAMILIES, INC.
Drue Robinson, Chief Program Officer

SCFFI reported to HHS that the breach affected 593 clients. The incident was added to HHS’s public breach tool today.

Category: Health Data

Post navigation

← PA: Geisinger-Bloomsburg Hospital notifies patients of missing laboratory records and specimens from 2006 and 2007
Brooklyn Hospital Center notifies patients of stolen USB with medical information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.