DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Penn State U. – Hershey Patient Info Security Breach

Posted on June 7, 2014 by Dissent

Penn State Hershey Medical Center is notifying 1,801 patients that their health information could potentially be accessed by people not involved in their care.

The medical center says the information is  related to a type of test ordered by its women’s health or family medicine doctors and other medical offices in the community that use Penn State Hershey labs for testing. Records involved, date from August 1, 2013 to March 26, 2014.

Penn State Hersey says the potential security breach occurred when one of its lab technicians used his own computer and a flash drive to enter the information, while working from home.

Read more on WeAreCentralPA.

Penn State Hershey posted the following notice on their website:

Penn State Hershey notifies patients of potential information breach

June 6, 2014

Penn State Milton S. Hershey Medical Center is notifying 1,801 patients that their protected health information had the potential to be accessed by individuals not involved in their care due to the actions of an employee. The information is specifically related to a type of test ordered by Penn State Hershey women’s health or family medicine clinicians, as well as other medical practitioners in the community who used Penn State Hershey laboratories for testing, between August 1, 2013 and March 26, 2014.

Results of an extensive internal investigation give no indication that any unauthorized person actually viewed or accessed this protected health information as a result of the employee’s activity. However, because the employee worked with this information on devices and systems outside the safeguards and controls of the secure Penn State Hershey information network, we cannot completely rule out the possibility and are notifying patients out of an abundance of caution.

On April 11, 2014, Penn State Hershey learned that one of our clinical laboratory technicians had been working with protected health information—entering this information into a test log—from his home. Specifically, the test log contained information related to tests ordered in conjunction with patient visits that occurred at Penn State Hershey’s women’s health and family practice clinician offices. It also contained information from other physicians’ offices in the community that used Penn State Hershey’s lab to perform the tests over the same time period. The test log information included patient names, medical record numbers, name of lab test, visit dates, and test results.

The employee was authorized to access and use this information because of his job at Penn State Hershey. However he worked on the test log at home using systems and devices outside the secured Penn State Hershey system—his personal computer, a removable storage device (a flash drive) to transport the log home to continue his work after hours and his personal email account to send the updated test log to two Penn State Hershey physicians.

No Social Security numbers and no financial information were included in the test log.

Penn State Hershey considers patient privacy and confidentiality to be of the utmost importance and chose to notify patients of this incident out of an abundance of caution. To decrease the likelihood of similar circumstances occurring in the future, Penn State Hershey is increasing education efforts with employees, focusing on the essential responsibility of all staff to safeguard patient health information at all times and follow proper practices for doing so.

We are attempting to reach all 1,801 patients by personal letter. Any patient who believes they may be among those whose information was involved in this situation but has not received a letter by June 12, 2014 is encouraged to call (877) 223-3689, Monday through Friday, 9:00 a.m. to 7:00 p.m. Eastern Time (closed on U.S. observed holidays). Please be prepared to provide the following ten-digit reference number when calling: 7045053014.

No related posts.

Category: Uncategorized

Post navigation

← UK: Basingstoke council apology over benefits data breach
New resource to help merchants understand PCI-DSS compliance →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.