DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

SC: Self Regional Healthcare notifies patients of breach

Posted on July 25, 2014 by Dissent

Self Regional Healthcare has posted a notice on its web site concerning a data security incident:

On May 27, 2014, Self Regional employees discovered that two unauthorized individuals broke into one of its facilities and stole a laptop belonging to SRH. The theft occurred on Sunday, May 25, 2014. Upon learning of the burglary, SRH contacted law enforcement and worked closely with them. Both intruders have been arrested. The thief responsible for stealing the laptop confessed to the crime and stated that he destroyed and disposed of the laptop in a lake. The police sent divers in the water, but SRH and police have been unable to recover the stolen laptop to date.

“Self Regional takes the security of our patients’ personal information very seriously,” said SRH President and CEO Jim Pfeiffer. “We retained third-party computer forensic experts to assist with the investigation of this incident, even though the intruders admitted their actions to law enforcement and claimed never to have accessed the laptop. Because we do not have the laptop in our possession, Self Regional must assume there is a possibility that someone may have accessed certain patients’ protected health information,” he said. The protected health information that could have been accessed includes patients’ names, Social Security numbers, driver’s license numbers, treating physician names, insurance policy numbers, patient account numbers, service dates, diagnosis/procedure information, payment card information, financial account information, and possibly their addresses.

“In an abundance of caution, Self Regional is providing written notice of this incident to affected individuals, to the U.S. Department of Health and Human Services, as well as to certain state regulators,” said Craig White, vice president, corporate compliance and integrity. “We are also publishing notice of this incident on our website and to major statewide media. In order to help further safeguard affected individuals from any potential misuse of their personal information, we are offering affected individuals access to a complimentary one-year membership to Experian’s® ProtectMyID® Alert,” he said. This product helps detect possible misuse of personal information and provides individuals with superior identity protection support focused on immediate identification and resolution of identity theft.

[…]

 Matt Bruce of the Index-Journal reports that SRH has not disclosed the total number affected, but Self Regional executives said the total was at least 500. He also reports:

In the wake of the break-in, Self officials said they have taken several security measures, such as encrypting each of the system’s laptops with sensitive patient information as well as physical security upgrades to the building.


Related:

  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
  • North Country Healthcare responds to Stormous's claims of a breach
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies
Category: Uncategorized

Post navigation

← Do You Know Where Your Health Data Are?
UK: Review of the impact of the ICO’s civil monetary penalties →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
  • North Country Healthcare responds to Stormous’s claims of a breach
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies
  • DOGE Denizen Marko Elez Leaked API Key for xAI
  • Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods
  • RansomedVC is back — and is still attacking its competitors
  • Texas Enacts Electronic Health Record Data Localization Law

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft can’t protect French data from US government access
  • Texas Enacts Electronic Health Record Data Localization Law
  • Upstate NY county clerk again refuses to enforce Texas abortion judgment
  • Attorney General James Leads Coalition Urging Congress to Protect Americans from Masked ICE Agents
  • Attorney General Tong Announces $85,000 Settlement with TicketNetwork for Violations of the Connecticut Data Privacy Act​
  • Fourth Circuit upholds West Virginia ban on abortion pills
  • Meta fixes bug that could leak users’ AI prompts and generated content

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.