DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Security firm to start notifying patients of breaches or vulnerabilities that haven't been disclosed or addressed by the covered entities

Posted on October 17, 2014 by Dissent

So how many times have I said – here and on DataBreaches.net – that it’s much much better for breached entities to get out ahead of a breach disclosure than to have others disclose the breach?

SLC Security has been investigating breaches – including those involving patient data. They tried – with limited success, it seems – to get breached or vulnerable entities to respond to notifications and to take action to protect personal information. Now they write that they’re taking this to the next level:

HIPAA Has No Teeth – Here’s what we are going to start doing

Starting today we will start mailing out notifications directly to the affected person’s when we don’t get a response from the organization we report. It’s not fair that companies can choose to ignore issues that they know exist and it’s really not fair that they take the stance that if they are not aware of the issue that they can just ignore it while consumers are sitting by hoping nothing happens to their identities or their bank accounts.

It seems that organizations feel as though it’s alright to violate the consumers trust. Out of 29 organizations that we have contacted only 3 have actually taken steps to remedy the problems that we have identified. We started thinking like the consumer and the one thing that kept coming back to us is if it was our data we would want to know what was released, how it was released and if the company responded when we notified them of the problem.

Starting today we will be sending out notices to persons that can be identified and located. If companies fail to respond I’m pretty sure they will fail to respond to request by the consumers that are affected also because it’s easier to ignore the problem than to fix the problem.

After all if it was your private information being leaked wouldn’t you want to know?

Note their comment: “it’s really not fair that they take the stance that if they are not aware of the issue that they can just ignore it while consumers are sitting by hoping nothing happens to their identities or their bank accounts.” I don’t think HHS accepts ignorance as an excuse. Neither does the FTC. While SLC Security is taking the tack of notifying those who are at risk or whose data have been exposed or compromised, nothing stops them from also filing a complaint against the entity with HHS and/or the FTC.

But imagine what might happen if patients start getting alerts from a security firm that tells them their hospital was told about a vulnerability or breach and didn’t respond? This will not be good for reputation.

Category: Uncategorized

Post navigation

← AU: Asylum seekers’ personal details stolen in second immigration data breach
National Domestic Workers Alliance notifies employees of email intrusion that may have compromised their information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile
  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch (1)
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.