DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Security firm to start notifying patients of breaches or vulnerabilities that haven't been disclosed or addressed by the covered entities

Posted on October 17, 2014 by Dissent

So how many times have I said – here and on DataBreaches.net – that it’s much much better for breached entities to get out ahead of a breach disclosure than to have others disclose the breach?

SLC Security has been investigating breaches – including those involving patient data. They tried – with limited success, it seems – to get breached or vulnerable entities to respond to notifications and to take action to protect personal information. Now they write that they’re taking this to the next level:

HIPAA Has No Teeth – Here’s what we are going to start doing

Starting today we will start mailing out notifications directly to the affected person’s when we don’t get a response from the organization we report. It’s not fair that companies can choose to ignore issues that they know exist and it’s really not fair that they take the stance that if they are not aware of the issue that they can just ignore it while consumers are sitting by hoping nothing happens to their identities or their bank accounts.

It seems that organizations feel as though it’s alright to violate the consumers trust. Out of 29 organizations that we have contacted only 3 have actually taken steps to remedy the problems that we have identified. We started thinking like the consumer and the one thing that kept coming back to us is if it was our data we would want to know what was released, how it was released and if the company responded when we notified them of the problem.

Starting today we will be sending out notices to persons that can be identified and located. If companies fail to respond I’m pretty sure they will fail to respond to request by the consumers that are affected also because it’s easier to ignore the problem than to fix the problem.

After all if it was your private information being leaked wouldn’t you want to know?

Note their comment: “it’s really not fair that they take the stance that if they are not aware of the issue that they can just ignore it while consumers are sitting by hoping nothing happens to their identities or their bank accounts.” I don’t think HHS accepts ignorance as an excuse. Neither does the FTC. While SLC Security is taking the tack of notifying those who are at risk or whose data have been exposed or compromised, nothing stops them from also filing a complaint against the entity with HHS and/or the FTC.

But imagine what might happen if patients start getting alerts from a security firm that tells them their hospital was told about a vulnerability or breach and didn’t respond? This will not be good for reputation.

Category: Uncategorized

Post navigation

← AU: Asylum seekers’ personal details stolen in second immigration data breach
National Domestic Workers Alliance notifies employees of email intrusion that may have compromised their information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.