DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IL: Urology patients notified after laptop attached to testing equipment was stolen

Posted on August 31, 2014 by Dissent

One of the recent breaches added to HHS’s public breach tool involved a case where a laptop connected to equipment was stolen from the covered entity’s premises.

Midwest Urological Group in Peoria, Illinois reported that 982 patients had information on a laptop that  was stolen on or about May 30th.

There does not appear to be any notice on their web site as of today’s date, but I was able to track down some coverage of the incident.

On June 4, the Journal Star reported:

A laptop valued at $4,000 was reported stolen from the Midwest Urological Group on Tuesday. According to a police report, the laptop contained patient information on its hard drive.

An employee of the group contacted police Tuesday after noticing a laptop used by employees had been missing for a day. The laptop was connected to a larger piece of equipment, but only the laptop was stolen, according to the report. The laptop was reported to contain information on patients treated at the facility and expensive medical software.

The last employee to have used the laptop told police he may have inadvertently left the storage closet that houses the equipment and laptop unlocked. Employees told police the laptop was stolen between noon Saturday and 4:30 p.m. Tuesday.

A subsequent notice (now only available in cache) in the Journal Star appeared on August 1:

Midwest Urological Group, 7309 N. Knoxville Ave., is notifying almost 1,000 current and former patients of a potential data breach because of a stolen laptop computer. There’s been no indication that any information has been misused.

The laptop did not contain patient health  information beyond the testing data, and it did not contain information that could lead to identity theft, such as social security numbers or credit card numbers. For more information, call Brenda at (800) 692-9898.


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← Hacker ‘Rawshark’ disrupts NZ election campaign
Huntington Bancshares Group Health Care Plan members latest victims of Staywell/Onsite Health Diagnostics breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.