DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CORRECTED: E.A. Conway learns of FTP exposure breach of patient information; information exposed for over one year

Posted on August 19, 2014 by Dissent

CORRECTION AND UPDATE: See this email and documentation from Professor Bowne.

It seems that the media reporting on a breach involving patients at E. A. Conway Medical Center was  inaccurate in some important respects, with the inaccuracies stemming from the Louisiana State University Health System‘s notice about the breach.

To summarize:  Professor Sam Bowne of City College – San Francisco discovered an FTP exposure via a Google search and responsibly notified LSU of same on June 17.

While what LSU subsequently wrote in its notice, i.e., that the professor had “successfully accessed a server” was somewhat correct, other statements in their notice were misleading or inaccurate. It was not true that he did this in the context of teaching a class, he did not disclose it to anyone other than LSU until after the server was secured, the breach did not occur on June 17, and he did not do it by hacking, which the phrase “accessed a server” might suggest to some readers.

Coverage in TheNewsStar compounded the problem, and SC Magazine‘s coverage compounded it even further by specifically headlining that this was a hack.

Although he was not named in their statement or early media coverage, Bowne’s employing college was named, and John Paffenbarger of Definitive Data Security contacted Bowne’s employer to urge them to investigate the alleged hack and to denounce it. Whether Paffenbarger was involved with LSU or just did this on his own is unknown to me, but it is the type of complaint that could get a faculty member fired – if the allegations were true. In this case, they were not true, but the bad press the college received over what many construed to be a hack  and Paffenbarger’s email to the college likely created some headaches for Professor Bowne.

On Friday,  Professor Bowne filed a complaint with HHS against LSU, alleging they retaliated against him for filing a HIPAA complaint.  In his correspondence, he provides copies of communications and the media reports.

I could be very wrong, but I don’t think HHS will take action against LSUHealthNewOrleans under the retaliation prohibition of the law, although they might take enforcement action over the breach itself and what might be a misleading or incomplete notification.

But why did LSU get their notice so wrong? It’s crystal clear from Bowne’s notification to them that the breach didn’t first occur on June 17 and he clearly stated he discovered the FTP breach via a Google search. Why didn’t they write a more accurate notice, and why did they say it was in the context of his teaching and a “demonstration?”

With respect to the last point, Adam Greenberg of SC Magazine reports:

Andrew Conkovich, chief compliance officer at University Health, told SCMagazine.com on Friday that the line, “demonstrating potential vulnerabilities of computer system[s] to his class,” was included because Bowne posted his findings – including the email he sent and images with redacted information – to the website he uses for his classes shortly after the FTP site was gone, as well as posted about it on Twitter.

So what if Bowne did share his redacted findings with future students after the server was secured? That doesn’t justify what LSU reported, in my opinion. Bowne even attempted to redact the identity of LSUHS in his posting for his course, although one failure to redact does identify “LSUHS.”

On Friday, SC Magazine posted a clarification without actually calling it a correction. They did not apologize for their error. The NewsStar does not seem to have corrected their post about the breach. Nor has LSU corrected its notice. In fact, I can find no breach notice linked from the homepage for E. A. Conway (LSUHS/Shreveport). Bowne comments on the updated situation here.

PHIprivacy.net apologizes for potentially contributing to Professor Bowne’s distress by quoting The NewsStar‘s coverage. I hope this now sets the record straight.

Original post, which was an excerpt from The NewsStar’s report, deleted so as to not perpetuate false information about the incident or the discoverer of the breach. 

 

Category: Uncategorized

Post navigation

← Restaurant Mizado Cocina says customer credit card data breached by hacker
Personal data on 170 New Mexico State U. students on stolen laptop →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.