DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

ID: Larsen Dental Care notifies patients of stolen hard drive

Posted on May 6, 2014 by Dissent

From their website:

Notice of Stolen External Hard Drive

Larsen Dental Care is notifying the public of a recent incident which could result in possible exposure of certain types of information. On March 4, 2014, an external hard drive was stolen from an employee’s vehicle. We immediately reported the theft to the police, filed a police report, and hired a forensic expert to provide support and investigative services. Larsen Dental Care values the privacy of its patients and deeply regrets that this incident occurred.

Through forensic analysis, it was determined that data on the stolen hard drive may have included information for persons such as name, address, date of birth, email address, phone number, dental record, medical history, health insurance identification number and Social Security number. To our knowledge, the data did not include credit card number, driver’s license number, bank account or other financial account numbers.

We have no reason to believe that the hard drive was taken for the information it contains. Although the affected data did not include financial account information, we encourage patients to review statements from their accounts for unusual activity.

As a precaution, we have arranged to have AllClear ID protect the identity of affected patients for 12 months at no cost. Affected patients are automatically eligible to use this service – there is no action required on their part. If a problem arises, simply call (877) 313-1404 and a dedicated investigator will do the work to recover financial losses, if any, restore credit and make sure affected patients’ identities are maintained in their proper condition.

We are also offering the services of AllClear PRO, which provides additional layers of protection including credit monitoring and a $1 million identity theft insurance policy. To use the PRO service, patients will need to provide their personal information to AllClear ID, by signing up online at enroll.allclearid.com or by phone by calling (877) 313-1404 and using the redemption code in the notification letter they received. AllClear maintains an A+ rating at the Better Business Bureau.

We take the protection of our patients’ personal information seriously and are taking active steps to prevent a similar occurrence. We are implementing encryption software to protect the data contained on our hard drives and our network storage device, revising our security policy which includes our policy for transporting backup media, providing additional training to employees on the policies and procedures for safeguarding patient data and notifying affected individuals.

We are sincerely sorry for any concern this event may cause our valued patients. If patients have further questions or concerns about this incident, they may call this special toll-free number we have established: (877) 313-1404.

h/t, KPVI

Category: Health Data

Post navigation

← Former Navy nuclear aircraft systems administrator charged with hacking
Wyndham faces more litigation over breaches – this time, from shareholders →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale
  • The Meta AI app is a privacy disaster – TechCrunch
  • Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
  • Norwegian Data Protection Authority’s findings on tracking pixels: 6 cases
  • Multiple States Enact Genetic Privacy Legislation in a Busy Start to 2025
  • Rules Proposed Under New Jersey Data Privacy Act
  • Using facial recognition? Three recent articles of interest.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.