DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CORRECTED: Missing Riverside County Regional Medical Center laptop may have held data on 7,900 patients (updated)

Posted on January 30, 2015 by Dissent

Correction: This article originally reported that Riverside did not return the phone call from PHIprivacy.net asking them to clarify whether this was a second breach or an update of the first breach report.. Riverside did attempt to return the call that day, but was unable to get through as the line was tied up. PHIprivacy.net apologizes to Riverside for our error in reporting that they hadn’t returned our call. 

ABC News reports that an unencrypted laptop that went missing from Riverside County Regional Medical Center in December may have contained personal information of nearly 7,900 patients.

At first blush, this new report appeared to be an update of a breach disclosure the center made in June, when they reported notifying 563 patients of a missing laptop that had been connected to electromyogram testing equipment. But it’s not – it’s a second breach that also involves a missing laptop.

The following notice to patients, dated January 29, is prominently displayed on the center’s homepage:

An unencrypted laptop computer reported missing from Riverside County Regional Medical Center (RCRMC) in December might have contained the personal information of patients who received ophthalmology and dermatology services at the hospital between Jan. 26, 2012 and last Nov. 26.

RCRMC’s chief compliance officer, Jan Remm, said the hospital immediately notified law enforcement and began a thorough internal investigation after a department manager at the Moreno Valley-based hospital reported the laptop missing on Dec. 1.

Remm said she has no reason to believe that the laptop was taken for its patient-related files or that information has been accessed or used in any way. She said computer forensic experts determined the information of approximately 7,900 patients might have been stored on the laptop. The information can include differing amounts of patient information, including names, addresses, birth dates and, in some instances, social security numbers and health plan policy numbers. Limited clinical information, such as diagnosis, also might have been present.

“We are taking significant measures to safeguard patient privacy and to restrict unauthorized access to computers and devices that potentially contain patient data,” Remm said. “The privacy of our patients is a fundamental priority in our organization and part of our commitment to quality healthcare.”

Remm said the hospital has significantly strengthened its inventory controls to prevent future loss of electronic devices, while cyber-security experts are currently encrypting all the organization’s computers and laptops to safeguard patient data. Letters are being mailed out to inform affected patients about the potential data breach, Remm said

Hospital officials encourage patients concerned about personal information to closely monitor their credit reports by calling 1-877-322-8228 to request a free annual report from the three U.S. credit reporting agencies; Equifax, Experian and TransUnion. The report also may be requested online at www.annualcreditreport.com

Patients concerned about whether their information was stored on the laptop are encouraged to contact the RCRMC confidential assistance line staffed with professionals familiar with this incident. The confidential assistance line is available Monday through Friday 6:00 a.m. to 4:00 p.m., PST at (866) 313- 7993.

The Press Enterprise is reporting it as a second breach.

Update: The letter to patients uploaded to California Attorney General’s web site today confirms that this was a second breach, as it was first detected on December 1, 2014.

No related posts.

Category: Uncategorized

Post navigation

← Update: Russian dating website Topface pays off ‘Mastermind’ hacker following email breach, and will work with him going forward
Has Hirsche Private Asset Management Ltd. gone dark after disclosing breach? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.