DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Follow-up to Boyd Hospital breach

Posted on November 22, 2015 by Dissent

Remember the case in Illinois where Boyd Hospital had stored patient records in a building that was later sold as surplus? The hospital claimed it didn’t know the new owner was taking possession of the building, which is why the patient records were still in there when the new owner took possession of the premises. The hospital quickly re-secured the files.

In its investigation into the incident, OCR found:

A facility where the covered entity (CE) had stored its medical records since 1994 was sold to a third party and possession of this property was given to the new owner for five days, unbeknownst to the CE.  The protected health information (PHI) involved in the breach included the clinical, demographic and financial information of 8,300 individuals.  Upon discovery of the breach, the CE immediately retrieved all records at the facility.  There was no evidence that the records were otherwise compromised.  The CE provided breach notification to HHS, affected individuals, and the media.  The CE retrained employees on its revised policies and procedures, including the proper storage of PHI and distribution of its revised policies and procedures.  OCR obtained assurances that the CE implemented the corrective actions listed.

Does OCR just take entities’ word for how events unfolded? I wonder. In this case, the new owner had claimed that he and his realtor had made repeated calls to alert Boyd to the situation. Did OCR investigate that claim? While the hospital claimed it did not know, could it have known? Keep in mind that the hospital attempted to shift responsibility to the new owner and had reportedly filed a police report claiming that the records had been stolen.  So… did OCR give Boyd a pass on what they could have/should have known?

If I had the time and resources, I’d file some FOIA requests with OCR – and not just about this case. I know OCR is more concerned with educating entities/bringing them into compliance than in punitive measures, but are they being too forgiving or too trusting sometimes?


Related:

  • HIPAA Compliance and Breach Communications: Helpful Tips for SMBs
  • An OCR investigation illustrates the value of investigating small and medium-sized entities
  • Small-Scale Violations of Medical Privacy Often Cause the Most Harm
  • HHS Office for Civil Rights Imposes a $240,000 Civil Monetary Penalty Against Providence Medical Institute in HIPAA Ransomware Cybersecurity Investigation
  • Was a recent OCR settlement fair? Maybe, but maybe not.
Category: Breach IncidentsHealth DataOther

Post navigation

← Follow-Up: Company involved in NSUH-LIJ breach folded
Oh, so THAT’s what happened to 160,000 Walgreens customers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges
  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.