DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

U. of Oklahoma College of Medicine – Department of Obstetrics & Gynecology notified patients after laptop stolen from physician’s car

Posted on August 24, 2015 by Dissent

Statement issued by University of Oklahoma College of Medicine – Department of Obstetrics & Gynecology on July 2, 2015:

OU Physicians is committed not only to providing quality care, but also to the proper handling and protection of its patients’ information.  As part of its commitment to patient privacy, and out of an abundance of caution, OU Physicians is sending letters to certain individuals to notify them of a potential privacy matter.

On the June 12, 2015, OU Physicians learned that a laptop had been stolen from a physician’s car earlier that day.  The laptop had a list of information on it related to two groups of individuals.  For one group of individuals, the information included  full name, medical record number, date of birth, age, the name and date of a gynecologic or urogynecologic medical procedure, patient account number, and admission and discharge dates for that procedure (if the procedure was an inpatient procedure).  Social Security numbers and credit card numbers were not included. Addresses were not included.  These individuals had gynecologic or urogynecologic procedures at the OU Outpatient Surgery Center or the Presbyterian Tower between January 1, 2009, and December 31, 2014.  The information for other group of individuals included last name and first initial, age, and information related to pregnancy, such as lab results and medications, delivery date, and problem and allergy list.  Social Security numbers, credit card numbers, and birth dates were not included. Addresses were not included. These individuals were inpatients for high risk delivery or pregnancy services at OU Medical Center from approximately September 24, 2014, to May 31, 2015.

The physician immediately contacted the local police; to date, they have been unable to recover the laptop. The police will notify the physician if the laptop is recovered.

OU Physicians is not aware of any misuse of any of the information or of any actual access to any of the information.  However, OU Physicians takes the matter seriously, so it is notifying the individuals affected by letter.  For those individuals who believe it is necessary and, as an extra measure of security, OU Physicians will provide a one-year subscription to credit monitoring and reporting services.

The University of Oklahoma is continuing to review this situation and is taking additional steps to prevent similar incidents from occurring, such as providing additional training to workforce members and revising certain procedures governing the protection of electronic information. Individuals who believe they may be affected and who have not yet received a letter may contact the University’s Office of Compliance at 405-271-2511 or toll-free at 1-866-836-3150.

According to HHS’s public breach tool, 7,693 patients were affected by the breach.

No related posts.

Category: Health DataTheftU.S.

Post navigation

← Is United Airlines’ Mobile App Secure Enough?
John McAfee: Ashley Madison database stolen by lone female who worked for Avid Life Media →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.