DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

U. Colorado Health Notifies 827 Patients That Employee Snooped in Their Records

Posted on December 7, 2015 by Dissent

From their public notice:

UCHealth in northern Colorado is notifying approximately 800 patients that an employee inappropriately accessed their electronic medical record information. Letters to these patients have already been mailed, and affected patients will receive the letters over the coming days.

The privacy and confidentiality of patients’ medical record information is a priority, and UCHealth regularly audits employees to ensure strict compliance with HIPAA regulations. One of these audits and a subsequent investigation discovered that an employee was viewing patients’ charts out of personal curiosity, even if he/she was not providing direct care to that patient.

The employee was able to see patients’ names, addresses, phone numbers, dates of birth, insurance information, and a description of the care and treatment received during a visit. However, the employee was not able to access Social Security numbers or other personal, financial information. There is no evidence at this time that the staff member shared this information with anyone else.

UCHealth takes its obligations to protect healthcare information very seriously. This staff member’s employment with UCHealth has been terminated. Re-training has been given to all employees to re-emphasize that staff can only view health records of patients for whom they are actively providing care.  All employees also will continue to receive annual training on how to properly access healthcare information.

Patients who have questions may call (844) 470-1755 to speak to UCHealth’s director of compliance and privacy.

The incident has already been posted on HHS’s public breach tool.

A spokesperson for UCHealth informs DataBreaches.net that the employee was a nurse at nurse at Poudre Valley Hospital, but was unable to tell this site when the inappropriate access began and when it was first detected.

The incident does show the value of access controls and routine audits. This incident could have been even more costly for the hospital if the nurse had been able to access SSN and insurance or financial information.


Related:

  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: Health DataInsiderU.S.

Post navigation

← FL: Jury acquits former Osceola County deputy in ID theft, tax fraud case
Hacks, hacks, everywhere, Monday edition →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.