DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

U. Colorado Health Notifies 827 Patients That Employee Snooped in Their Records

Posted on December 7, 2015 by Dissent

From their public notice:

UCHealth in northern Colorado is notifying approximately 800 patients that an employee inappropriately accessed their electronic medical record information. Letters to these patients have already been mailed, and affected patients will receive the letters over the coming days.

The privacy and confidentiality of patients’ medical record information is a priority, and UCHealth regularly audits employees to ensure strict compliance with HIPAA regulations. One of these audits and a subsequent investigation discovered that an employee was viewing patients’ charts out of personal curiosity, even if he/she was not providing direct care to that patient.

The employee was able to see patients’ names, addresses, phone numbers, dates of birth, insurance information, and a description of the care and treatment received during a visit. However, the employee was not able to access Social Security numbers or other personal, financial information. There is no evidence at this time that the staff member shared this information with anyone else.

UCHealth takes its obligations to protect healthcare information very seriously. This staff member’s employment with UCHealth has been terminated. Re-training has been given to all employees to re-emphasize that staff can only view health records of patients for whom they are actively providing care.  All employees also will continue to receive annual training on how to properly access healthcare information.

Patients who have questions may call (844) 470-1755 to speak to UCHealth’s director of compliance and privacy.

The incident has already been posted on HHS’s public breach tool.

A spokesperson for UCHealth informs DataBreaches.net that the employee was a nurse at nurse at Poudre Valley Hospital, but was unable to tell this site when the inappropriate access began and when it was first detected.

The incident does show the value of access controls and routine audits. This incident could have been even more costly for the hospital if the nurse had been able to access SSN and insurance or financial information.


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Heritage Provider Network $49.99M Class Action Settlement
Category: Health DataInsiderU.S.

Post navigation

← FL: Jury acquits former Osceola County deputy in ID theft, tax fraud case
Hacks, hacks, everywhere, Monday edition →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.