Leah Maclennan reports: SA Health is investigating how confidential medical notes from three Lyell McEwin Hospital patients in Adelaide ended up in someone else’s file. Scott McKay’s mother spent time in the northern suburbs hospital with terminal cancer. Mr McKay said that after her death, he was looking through the notes she had kept and…
Month: March 2015
Rogers statement on hack by TeamHans
A spokesperson for Rogers sent DataBreaches.net the following statement about the hack reported here yesterday: A single email address of one of our enterprise sales employees, who managed a small number of medium business accounts, was accessed last week by a third party due to human error (not system error). The third party was able…
Identities left exposed in Indiana salvage yards
Bennett Haeberle reports: The list of items was long: medical records, bank statements, insurance cards, employee identification cards, car registrations, a signature, a child’s name, dates of birth, and an application for welfare assistance. They’re things many people would keep under lock and key, but I-Team 8 found them scattered throughout auto salvage yards in…
Nina Pham to sue hospital for negligence, invasion of privacy
KVUE reports that Nina Pham, a nurse who contracted ebola while working in a Texas hospital, is planning to sue the hospital for lack of adequate training and for invasion of privacy: The 37-page lawsuit alleges that Texas Health Presbyterian Hospital and its parent company [Texas Health Resources] did not provide proper training for Pham…
NY: Stolen Pioneer bank laptop contained some customers’ data (updated)
Eric Anderson reports: Pioneer Bank over the weekend alerted some of its customers that an employee’s laptop stolen Jan. 26 contained “secured personal information of certain customers, including names, social security numbers, street addresses, and account and debit card numbers.” Letters were sent to those customers whose information “may have been on this laptop,” Pioneer…
Who ‘owns’ an investigation into a security breach?
Taylor Armerding writes: The last things an organization needs when launching an investigation into any kind of security breach are confusion and disorganization. If it is not clear who is really in charge, or what responsibilities fall to what departments, that is adding trouble to trouble. But that, according to the Security Executive Council (SEC),…