DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Terminated employee continued to access Bon Secours' patients' billing information

Posted on November 10, 2014 by Dissent

When an employee is terminated, their login credentials to vendors’ databases with PHI must also be terminated. How often do you verify that it is actually being terminated properly?

Bon Secours Kentucky notified 697 patients that a former employee had improperly accessed their information from a billing database maintained by Athena.  In a statement uploaded to their website, Bon Secours write:

In early April, 2014, during an audit of our billing data base, Athena, we identified suspicious access that prompted an investigation. Our investigation revealed that a user ID and password assigned to a former employee had been used to access information in the Athena system between April, 2013 and March, 2014. Our investigation determined that the information accessed with the user ID and password for the majority of patients included their name, date of birth and the last four digits of their Social Security number. A small group of patients had additional information accessed which included their name, dates and times of service, provider and facility names, patient account numbers (which may have included Social Security numbers), date of birth, and treatment information, such as diagnosis.

Due to the nature of the access, and out of an abundance of caution to protect our patients, we approached law enforcement, specifically the Secret Service, to assist us with our investigation. The Secret Service asked Bon Secours to delay notifying patients until their investigation was complete so as not to compromise their investigation. The Secret Service worked with Bon Secours to thoroughly investigate this matter and to determine if any patient information may have been used illegally. After discussions with the IRS Identity Task Squad, the Secret Service informed Bon Secours they found no evidence of criminal use of patients’ information at this time. The Secret Service advised on August 26 that we could send letters to affected patients.

As a precaution, we began mailing letters to affected patients on September 5 and are offering all eligible individuals one year free credit monitoring and identity protection services. We have also established a dedicated call center to assist our patients. If you believe you are affected by this matter, but have not received a notification letter by September 26, please call 877-683-9363 between 9 a.m. and 9 p.m. Eastern Time to speak with a call center agent.

We are deeply sorry that this has occurred. In response to this matter, we are working with our vendor, Athena, to ensure that all user IDs and passwords to their system are properly and permanently disabled when Bon Secours determines that an employee should no longer have access to information in the Athena system. We will continue to proactively monitor our systems to ensure that access to any protected health information is maintained in the most secure manner possible. We apologize for any inconvenience this may cause our patients.



Related:

  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
Category: Uncategorized

Post navigation

← U.S. Postal Service Says It Was Victim of Data Breach (update3)
For NYC Health & Hospitals Corporation, 2011 wasn't a great year for data security, Part 1 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea’s largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
  • North Country Healthcare responds to Stormous’s claims of a breach
  • Gladney Adoption Center had serious data exposures in the past few months. What will they do to prevent more?
  • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access
  • Texas Enacts Electronic Health Record Data Localization Law
  • Upstate NY county clerk again refuses to enforce Texas abortion judgment
  • Attorney General James Leads Coalition Urging Congress to Protect Americans from Masked ICE Agents
  • Attorney General Tong Announces $85,000 Settlement with TicketNetwork for Violations of the Connecticut Data Privacy Act​

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.