DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Huntington Medical Research Institutes discloses two HIPAA breaches in one-month period

Posted on November 5, 2015 by Dissent

HIPAA Journal reports:

Nonprofit biomedical research company Huntington Medical Research Institutes (HMRI) has announced two HIPAA breaches in the space of a month: One involving the improper disposal of records, the other an alleged theft of patient data by a former employee.

The insider breach reportedly impacted 4,300 patients. Read more on HIPAA Journal. The full text of HMRI’s notices follows:

06 Oct NOTICE OF HIPAA BREACH

NOTICE OF HIPAA BREACH

HMRI takes patient privacy very seriously.  Regrettably, some of our small glass laboratory slides and paper records were disposed of in a way that did not conform to our policies.   We first learned of this incident on August 6, and our investigation concluded only recently.  Some slides and paper records may have been improperly disposed of up to approximately two weeks prior to our discovery.  Affected patients’ names, some demographic information such as date of birth, clinical information such as diagnosis, treatment, tissue source, specimen information, specific tests ordered, and referring physician information, as well as some billing information, may have been included in these records and/or slides.

Importantly, the information involved did NOT include any Social Security numbers or patient credit card or other financial payment card information.

At this time we are not aware of any actions patients need to take.   HMRI is diligently following up on this incident and taking reasonable actions to prevent similar incidents in the future.  Among other actions, HMRI is reinforcing the training of staff who have access to patient health information, and strengthening data security.   To find out if your information may have been included in these slides/records or to learn more about this incident, please contact us at 1-800-690-0069 or [email protected].

and

20 Oct NOTICE OF HIPAA BREACH

NOTICE OF HIPAA BREACH 

On August 20, 2015, HMRI learned that a former employee might have taken electronic patient health information related to HMRI’s laboratory. HMRI believes this former employee took this information around the time of the former employee’s departure on July 31, 2015. HMRI continues to investigate this incident and seek return of all HMRI patient health information. At this time, HMRI has no reason to believe this information has been or will be misused. The information included patients’ names, some demographic information such as date of birth, clinical information such as diagnosis, treatment, tissue specimen source, other specimen information, specific tests ordered, and referring physician information, as well as some billing information.

The information did NOT include any Social Security numbers or patient credit card or other financial payment card information.

At this time we are not aware of any actions patients need to take.   HMRI is diligently following up on this incident and taking reasonable actions to prevent similar incidents in the future.  Among other actions, HMRI is reinforcing the training of staff who have access to patient health information, and strengthening data security.  To find out if your information may have been included in the affected records or to learn more about this incident, please contact us at 1-800-690-0069 or [email protected].

Category: ExposureHealth DataInsiderPaperU.S.

Post navigation

← Ca: Simcoe nurse suspended by College of Nurses over privacy breach at Norfolk General Hospital
In a first, the FCC is fining a major cable company for getting hacked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach
  • Oklahoma Expands its Security Breach Notification Law
  • Ransomware group Gunra claims to have exfiltrated 450 million patient records from American Hospital Dubai.
  • North Shore University Sleep Disorders Center employee charged with secretly recording patients in restrooms
  • When ransomware listings create confusion as to who the victim was

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious
  • Florida ban on kids using social media likely unconstitutional, judge rules
  • State Data Minimization Laws Spark Compliance Uncertainty

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.