DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PA: Hershey Medical Center notifies 1,801 patients of potential breach

Posted on June 19, 2015 by Dissent

Lancaster Online reports:

Penn State Hershey Medical Center said it has notified 1,801 patients of a privacy breach, after it was discovered an employee had been working with protected health information from his home computer.

Officials at the hospital said in a press release Friday afternoon that results of an extensive internal investigation give no indication that any unauthorized person actually viewed or accessed the information as a result of the employee’s activity.

Read more on Lancaster Online.

The full text of the medical center’s statement follows:

Penn State Milton S. Hershey Medical Center is notifying 1,801 patients that their protected health information had the potential to be accessed by individuals not involved in their care due to the actions of an employee. The information is specifically related to a type of test ordered by Penn State Hershey women’s health or family medicine clinicians, as well as other medical practitioners in the community who used Penn State Hershey laboratories for testing, between August 1, 2013 and March 26, 2014.

Results of an extensive internal investigation give no indication that any unauthorized person actually viewed or accessed this protected health information as a result of the employee’s activity. However, because the employee worked with this information on devices and systems outside the safeguards and controls of the secure Penn State Hershey information network, we cannot completely rule out the possibility and are notifying patients out of an abundance of caution.

On April 11, 2014, Penn State Hershey learned that one of our clinical laboratory technicians had been working with protected health information—entering this information into a test log—from his home. Specifically, the test log contained information related to tests ordered in conjunction with patient visits that occurred at Penn State Hershey’s women’s health and family practice clinician offices. It also contained information from other physicians’ offices in the community that used Penn State Hershey’s lab to perform the tests over the same time period. The test log information included patient names, medical record numbers, name of lab test, visit dates, and test results.

The employee was authorized to access and use this information because of his job at Penn State Hershey. However he worked on the test log at home using systems and devices outside the secured Penn State Hershey system—his personal computer, a removable storage device (a flash drive) to transport the log home to continue his work after hours and his personal email account to send the updated test log to two Penn State Hershey physicians.

No Social Security numbers and no financial information were included in the test log.

Penn State Hershey considers patient privacy and confidentiality to be of the utmost importance and chose to notify patients of this incident out of an abundance of caution. To decrease the likelihood of similar circumstances occurring in the future, Penn State Hershey is increasing education efforts with employees, focusing on the essential responsibility of all staff to safeguard patient health information at all times and follow proper practices for doing so.

We are attempting to reach all 1,801 patients by personal letter. Any patient who believes they may be among those whose information was involved in this situation but has not received a letter by June 12, 2014 is encouraged to call (877) 223-3689, Monday through Friday, 9:00 a.m. to 7:00 p.m. Eastern Time (closed on U.S. observed holidays). Please be prepared to provide the following ten-digit reference number when calling: 7045053014.

No related posts.

Category: Health DataU.S.

Post navigation

← Green Tree Services notifies mortgage applicants of 2013 breach that was discovered 10 months ago
Georgia Man Pleads Guilty To Filing 62 Fraudulent Tax Returns →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.