DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Central Utah Clinic reports server containing 31,677 patients' information was breached in 2012

Posted on September 10, 2014 by Dissent

On August 7, Central Utah Clinic, P.C. posted a breach notification on their web site:

PUBLIC NOTICE: Potential Central Utah Clinic HIPAA Breach

PROVO, Utah. (Aug. 7, 2014) — Central Utah Clinic is committed to the protection of patient privacy and is notifying 31,677 patients, by letter, of a potential personal health information breach.

On June 9, 2014, Central Utah Clinic IT professionals discovered unauthorized individuals had compromised one of their servers. Each month, Central Utah Clinic successfully defends against numerous cybercriminal attacks. However, during this particular targeted attack, Central Utah Clinic security measures were circumvented.

Following discovery of the compromise, the server was isolated to prevent further risk of unauthorized information disclosure. A thorough forensic investigation found no evidence that personal information was viewed or copied from the server to an unauthorized location. Additionally, there is no indication that any of the other 100+ Central Utah Clinic servers were compromised.

The accessed server was not a complete database of patient information, but rather a limited subset of written imaging and radiology reports dated 2010 and earlier. The accessed server did store data on some individuals containing patient information with one or more of the following fields: name, date of birth, Social Security number, address and phone number.

“Protecting our patients’ information from exposure of any kind beyond what is needed for treatment, and particularly from cybercriminal activity, is a key focus at Central Utah Clinic, and we take full responsibility for this incident,” said Scott Barlow, CEO of Central Utah Clinic. “These attacks are an unfortunate aspect of information technology and modern healthcare is not immune from this. It is important to understand there is no indication that any of our patients’ personal information was viewed or copied. Regardless, we are committed to transparency and working with our patients to mitigate possible effects of this occurrence.”

Central Utah Clinic contacted appropriate regulatory authorities and has taken additional steps to safeguard patient information, including partnering with an advanced technology security firm and offering complimentary personal credit monitoring services to patients involved in the potential breach.

Involved parties are being contacted by mail. Individuals who believe their information may have been involved or who need additional information should contact Central Utah Clinic toll-free at 1-844-714-0284.

About Central Utah Clinic: Comprised of more than 170 physicians, Central Utah Clinic is the largest independent, physician-owned, multi-specialty practice in Utah. Based in Provo, UT, Central Utah Clinic provides care in 25+ specialties with many primary care and specialty providers located throughout the state.

Although not mentioned in their press release, Central Utah Clinic reported to HHS that the breach occurred on October 9, 2012 and continued until June 21, 2014.


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← Administrative law judge denies LabMD's motion to sanction FTC
Security lapse by Diamond Computing exposed Diatherix patients' information on the Internet for 22 months →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.