DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Blistering audit reveals Illinois DHS failed to protect confidential patient information

Posted on May 29, 2014 by Dissent

AP reports:

A state audit has found that Gov. Pat Quinn’s administration left behind tractors, a forklift, computers, and confidential patient and employee records when it closed three Department of Human Services facilities.

The report by Auditor General William Holland — released Thursday — says officials failed to follow proper inventory and shut-down procedures when it closed centers in Jacksonville, Rockford and Tinley Park in 2012.

A digest of the report noted numerous current problems, involving the Central Office as well as closed facilities:

  • During walkthroughs at the Department’s Central Office, auditors found unlocked shred bins in open areas that were clearly marked as shred. We also found confidential information that was disposed of in a recycle bin.

At three closed facilities, auditors noted the following exceptions:

  • At Tinley Park Mental Health Center, which closed June 30, 2012, auditors conducted a walkthrough 13 months following closure and found the Department had left boxes of patient records near the side entrance of a building. In addition, files were noted in four buildings that contained employee personnel records, recipient files, forms containing names and contact information for volunteers, clinical record files, files containing medical tests, pharmaceutical records, patient incident records, patient surgical and psychiatric records, and files containing information on Hurricane Katrina refugees.
  • At H. Douglas Singer Mental Health Center, which closed October 31, 2012, auditors conducted a walkthrough 9 months following closure and found complete employee records, recipient court records and other court records, and Patient Daily Census and Movement reports with recipient names. In addition, auditors noted filing cabinets full of investigations, reports, and attorney correspondence related to the Department’s Office of the Inspector General.
  • At the Jacksonville Developmental Center, which closed on November 27, 2012, auditors found confidential information in trash receptacles, filing cabinets, binders, boxes, and on desks. We found resident names, health information, and social security numbers, a labeled medical specimen, photos of residents labeled with residents’ names and incident number, security reports which included resident names; filing cabinets with folder separators labeled with resident names; two computer monitors and three computer towers; large stack of binders which contained the last name and first initial of residents on the spine of the binders; and manila filing folders with patient names written on the tabs.

The auditors report:

We noted the confidential information at the above facilities may have been exposed to outside individuals, including employees of the Department of Central Management Services and vandals. With regard to Tinley Park Mental Health Center, additional exposure occurred as a result of training conducted at the Center by members of the U.S. Navy SEALs and area police officers.

Additionally, documents containing confidential information were found in trash or recycle bins while performing visits at certain other Department facilities. Documentation included information such as patient names, social security numbers, guardian names, addresses, telephone numbers, appointments, assessments, specimen logs, and test orders. (Finding 9, pages 41-43) This finding was first reported in 2005. 

We recommended the Department ensure confidential information is adequately protected and review existing policies regarding the security and control of confidential information to ensure Department-wide procedures exist for ensuring confidential and personal information is adequately secured in both electronic and hardcopy format. We further recommended the Department effectively communicate and enforce its procedures for safeguarding, retention, and subsequent disposal of all confidential information to all Department personnel, including facilities.

Department officials accepted the recommendation and stated they are developing a new Administrative Directive to ensure confidential information is adequately protected and personal information is adequately secured in both electronic and hardcopy format. The Department also stated they will communicate and enforce its procedures for safeguarding, retention, and subsequent disposal of all confidential information to all Department personnel, including facilities.

But wait, there’s more:

The Department did not adequately protect confidential sensitive information. From July to October, Department staff sent numerous unprotected emails to OAG staff that contained information such as: protected health information, names and social security numbers and bank account information. In each case, OAG staff informed the sender of the infraction, asked the sender to refrain from sending such information in an email, and provided information on the availability of State’s encryption resources.

You can access the full report here (pdf, 284 pp.).

Thanks to @PrivacyRightsIL for making me aware of the AP report.

Category: Uncategorized

Post navigation

← More details on the DeKalb Health breach
Monsanto Confirms Security Breach (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.