DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Blistering audit reveals Illinois DHS failed to protect confidential patient information

Posted on May 29, 2014 by Dissent

AP reports:

A state audit has found that Gov. Pat Quinn’s administration left behind tractors, a forklift, computers, and confidential patient and employee records when it closed three Department of Human Services facilities.

The report by Auditor General William Holland — released Thursday — says officials failed to follow proper inventory and shut-down procedures when it closed centers in Jacksonville, Rockford and Tinley Park in 2012.

A digest of the report noted numerous current problems, involving the Central Office as well as closed facilities:

  • During walkthroughs at the Department’s Central Office, auditors found unlocked shred bins in open areas that were clearly marked as shred. We also found confidential information that was disposed of in a recycle bin.

At three closed facilities, auditors noted the following exceptions:

  • At Tinley Park Mental Health Center, which closed June 30, 2012, auditors conducted a walkthrough 13 months following closure and found the Department had left boxes of patient records near the side entrance of a building. In addition, files were noted in four buildings that contained employee personnel records, recipient files, forms containing names and contact information for volunteers, clinical record files, files containing medical tests, pharmaceutical records, patient incident records, patient surgical and psychiatric records, and files containing information on Hurricane Katrina refugees.
  • At H. Douglas Singer Mental Health Center, which closed October 31, 2012, auditors conducted a walkthrough 9 months following closure and found complete employee records, recipient court records and other court records, and Patient Daily Census and Movement reports with recipient names. In addition, auditors noted filing cabinets full of investigations, reports, and attorney correspondence related to the Department’s Office of the Inspector General.
  • At the Jacksonville Developmental Center, which closed on November 27, 2012, auditors found confidential information in trash receptacles, filing cabinets, binders, boxes, and on desks. We found resident names, health information, and social security numbers, a labeled medical specimen, photos of residents labeled with residents’ names and incident number, security reports which included resident names; filing cabinets with folder separators labeled with resident names; two computer monitors and three computer towers; large stack of binders which contained the last name and first initial of residents on the spine of the binders; and manila filing folders with patient names written on the tabs.

The auditors report:

We noted the confidential information at the above facilities may have been exposed to outside individuals, including employees of the Department of Central Management Services and vandals. With regard to Tinley Park Mental Health Center, additional exposure occurred as a result of training conducted at the Center by members of the U.S. Navy SEALs and area police officers.

Additionally, documents containing confidential information were found in trash or recycle bins while performing visits at certain other Department facilities. Documentation included information such as patient names, social security numbers, guardian names, addresses, telephone numbers, appointments, assessments, specimen logs, and test orders. (Finding 9, pages 41-43) This finding was first reported in 2005. 

We recommended the Department ensure confidential information is adequately protected and review existing policies regarding the security and control of confidential information to ensure Department-wide procedures exist for ensuring confidential and personal information is adequately secured in both electronic and hardcopy format. We further recommended the Department effectively communicate and enforce its procedures for safeguarding, retention, and subsequent disposal of all confidential information to all Department personnel, including facilities.

Department officials accepted the recommendation and stated they are developing a new Administrative Directive to ensure confidential information is adequately protected and personal information is adequately secured in both electronic and hardcopy format. The Department also stated they will communicate and enforce its procedures for safeguarding, retention, and subsequent disposal of all confidential information to all Department personnel, including facilities.

But wait, there’s more:

The Department did not adequately protect confidential sensitive information. From July to October, Department staff sent numerous unprotected emails to OAG staff that contained information such as: protected health information, names and social security numbers and bank account information. In each case, OAG staff informed the sender of the infraction, asked the sender to refrain from sending such information in an email, and provided information on the availability of State’s encryption resources.

You can access the full report here (pdf, 284 pp.).

Thanks to @PrivacyRightsIL for making me aware of the AP report.

Category: Uncategorized

Post navigation

← More details on the DeKalb Health breach
Monsanto Confirms Security Breach (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.