DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

ID: Larsen Dental Care notifies patients of stolen hard drive

Posted on May 6, 2014 by Dissent

From their website:

Notice of Stolen External Hard Drive

Larsen Dental Care is notifying the public of a recent incident which could result in possible exposure of certain types of information. On March 4, 2014, an external hard drive was stolen from an employee’s vehicle. We immediately reported the theft to the police, filed a police report, and hired a forensic expert to provide support and investigative services. Larsen Dental Care values the privacy of its patients and deeply regrets that this incident occurred.

Through forensic analysis, it was determined that data on the stolen hard drive may have included information for persons such as name, address, date of birth, email address, phone number, dental record, medical history, health insurance identification number and Social Security number. To our knowledge, the data did not include credit card number, driver’s license number, bank account or other financial account numbers.

We have no reason to believe that the hard drive was taken for the information it contains. Although the affected data did not include financial account information, we encourage patients to review statements from their accounts for unusual activity.

As a precaution, we have arranged to have AllClear ID protect the identity of affected patients for 12 months at no cost. Affected patients are automatically eligible to use this service – there is no action required on their part. If a problem arises, simply call (877) 313-1404 and a dedicated investigator will do the work to recover financial losses, if any, restore credit and make sure affected patients’ identities are maintained in their proper condition.

We are also offering the services of AllClear PRO, which provides additional layers of protection including credit monitoring and a $1 million identity theft insurance policy. To use the PRO service, patients will need to provide their personal information to AllClear ID, by signing up online at enroll.allclearid.com or by phone by calling (877) 313-1404 and using the redemption code in the notification letter they received. AllClear maintains an A+ rating at the Better Business Bureau.

We take the protection of our patients’ personal information seriously and are taking active steps to prevent a similar occurrence. We are implementing encryption software to protect the data contained on our hard drives and our network storage device, revising our security policy which includes our policy for transporting backup media, providing additional training to employees on the policies and procedures for safeguarding patient data and notifying affected individuals.

We are sincerely sorry for any concern this event may cause our valued patients. If patients have further questions or concerns about this incident, they may call this special toll-free number we have established: (877) 313-1404.

h/t, KPVI

Category: Health Data

Post navigation

← Former Navy nuclear aircraft systems administrator charged with hacking
Wyndham faces more litigation over breaches – this time, from shareholders →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.