DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Business associate of Maryland Developmental Disabilities Administration hacked in October

Posted on March 17, 2014 by Dissent

David Dishneau of Associated Press reports:

A state-licensed provider of services to developmentally disabled Marylanders says someone stole computerized Social Security and medical information for about 9,700 clients.

Frederick-based Service Coordination Inc. said Monday it learned of the security breach in October but didn’t notify affected individuals until Friday. The organization says part of the delay came at the request of the U.S. Justice Department to allow for a federal investigation.

Service Coordination says investigators have identified the alleged hacker and seized that person’s property.

Read more on Miami Herald.

A notification posted on the provider’s website today says:

Service Coordination Inc. (SCI) provides case management services to Maryland residents. In connection with those services, the Maryland Developmental Disabilities Administration (DDA) shares with SCI certain personally identifiable information and personal health information of Maryland residents in electronic form.

On October 30, 2013, SCI discovered that between October 20 and October 30, 2013, its computer systems had been hacked and that an individual had gained unauthorized access to those electronic files. Those improperly accessed files included the name of certain Maryland residents to whom SCI provides services, along with each of those individuals’ social security number, medical assistance number, Medicaid and Medicaid Waiver status and reason, DDA direct service provider, demographic and other information  related to SCI’s case management services.

Upon discovering this criminal, unauthorized access to its systems, SCI promptly engaged a cybersecurity forensics consultant, took steps to remedy the breach and prevent further unauthorized access, and alerted DDA, the FBI and the U.S Department of Justice. During the course of the ensuing criminal investigation, the Department of Justice required that notice to affected individuals be delayed so as not to impede their criminal investigation. That delay was recently lifted after law enforcement identified the alleged hacker, conducted a search of the alleged hacker’s home and seized certain of the alleged hacker’s equipment and accounts. SCI has now provided notice to affected individuals and others in accordance with applicable law, on behalf of DDA.

There is no current evidence of any misuse or further release of information by the hacker or others. To help protect affected Maryland residents from the possibility of identity theft and/or fraud as a result of this incident, SCI has engaged an identity theft protection firm, to provide affected individuals with a full year of identity theft protection services at SCI’s expense.

“We regret the occurrence of this unfortunate criminal incident and we apologize for any inconvenience this may have caused individuals who we work with. We continue our vigilant actions to safeguard the information of those who count on us for resource coordination services and we remain committed to supporting their needs,” said John Dumas, Executive Director of Service Coordination.

SCI urges affected Maryland residents to monitor account statements for unexplained, suspicious or unauthorized activity, obtain a free annual credit report at www.annualcreditreport.com, and to contact the Federal Trade Commission or the national credit reporting agencies—Equifax, Experian, and TransUnion—to obtain information about additional protections, such as fraud alerts and security freezes. Affected individuals may also contact the Consumer Protection Division of the Maryland Office of the Attorney General for Maryland-specific information.

 


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← UK: Update: Man Held Over Morrisons Payroll Data Breach
Service Coordination Inc. also affected MD Department of Health and Mental Hygiene patients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.