DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Bellevue Hospital notifying 3,300 patients of breach

Posted on May 20, 2015 by Dissent

Jacobi Medical Center wasn’t the only hospital run by the Health & Hospitals Corporation that reported a breach on April 28.  Bellevue Hospital Center also reported one:

The incident in question occurred on January 15, 2015 and was discovered on February 27, 2015 when, in the course of HHC’s monitoring of outgoing emails, we identified an email attachment that a Bellevue employee improperly sent to her relative’s e-mail account at the relative’s place of employment.

Here’s their notice:

The New York City Health and Hospitals Corporation (HHC), which operates Bellevue Hospital Center began this week to notify about 3,300 Bellevue patients about the possible disclosure of some of their protected health information (PHI) when a Bellevue employee improperly sent a spreadsheet containing PHI to an unauthorized recipient.

The unauthorized disclosure was discovered by HHC’s information governance and security program that, among other things, monitors and detects all email communications that contain PHI and other confidential information that are sent from HHC’s information systems without proper authorization. A sample notification to the affected patients is attached. Notifications will also be posted on the HHC website and will be distributed to numerous New York area news outlets. The information in the spreadsheet included the names, medical record numbers, e-mail addresses, insurance carrier information, and limited sensitive health information of the affected patients.

Based on HHC’s investigation into the unauthorized disclosure, the spreadsheet has been deleted from all known unauthorized sources to which it was sent and there is no basis to believe that it was forwarded to any other site before deletion. There is no evidence to suggest that the spreadsheet was received or viewed by anyone other than the single unauthorized recipient, and there is no evidence to suggest that the PHI contained in the spreadsheet was misused or further disclosed in any manner.

Nonetheless, in an abundance of caution, HHC has taken decisive steps to protect the individuals who are potentially affected by offering, through a third-party vendor, free credit monitoring services for one year to those patients whose medical records may have been improperly disclosed. Affected patients who have questions about this incident, including how to sign up for free credit monitoring services, may contact Bellevue Privacy Officer Christopher Roberson at (212) 562-4316.

HHC has taken immediate measures to prevent the recurrence of an incident of this nature by automatically blocking of email communications containing PHI and other confidential information from being sent from HHC’s information systems to any site or entity outside of the HHC security network unless for a legitimate business purpose.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: ExposureHealth DataInsiderU.S.

Post navigation

← Cn: Hacker jailed for linking school website to pornography pages
CareFirst BlueCross BlueShield discloses that hack in June 2014 affected 1.1 million members →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.