DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Computer containing patient data stolen from Seton Healthcare

Posted on April 29, 2014 by Dissent

MyFoxAustin reports:

A computer-like device was stolen from Seton Northwest Hospital. Now two months later, nearly 180 patients possibly affected are just finding out. One of them came to FOX 7 for help.

It was inside a locked storage area at Seton Northwest Hospital where a device was stolen.

We’re told only names, dates of birth, and Seton account numbers were on it.

[…]

It was on February 28 when staff discovered that a Hewlett Packard desktop device had been stolen from the Seton Northwest Sleep Lab. Almost two months later, Falls was notified.

Read more on MyFoxAustin.

Previous incidents involving Seton Healthcare include:

  • In 2007, Seton reported that 2,500 young patients at Seton Highland Lakes Hospital had their names, medical information and some social security numbers on two laptops stolen from an employee’s car in the parking lot.
  • At around the same time, the healthcare system disclosed that a laptop with 7,800 emergency room patient names, birth dates and Social Security numbers was stolen from the information services department in North Austim.
  • In 2012, Seton Healthcare reported that a computer error by their business associate HealthLOGIX resulted in 555 member cards with dates of birth being mailed to the wrong members.
  • In October 2013, they reported that a laptop stolen from Seton McCarthy Clinic contained information on patients seen at Seton McCarthy, Seton Topfer and Seton Kozmetsky community health centers and the Seton Total Health Partners program,
Category: Uncategorized

Post navigation

← Almost 10,000 potentially affected by Snelling Staffing breach
Target Appoints New Chief Information Officer, Outlines Updates on Security Enhancements →

1 thought on “TX: Computer containing patient data stolen from Seton Healthcare”

  1. Anonymous says:
    April 29, 2014 at 9:56 am

    Given that 4 of the 5 incidents involved stolen computers or a “computer-like device” and the incidents occurred in 2007, 2013 and 2014, perhaps they should consider encryption of their ePHI. If the “computer-like device” was stolen from a locked storage area, I have to wonder if “enhanced physical security” will be sufficient to make sure another incident does not occur. Encryption has to be less expensive than four breach notifications and a year of credit monitoring for almost 16,000 affected patients. (The article indicated that 5,500 were affected by the October breach.)

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.