DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

OH: Community Mercy Health Partners notifies patients after vendor improperly discarded patient records (UPDATED)

Posted on January 25, 2016 by Dissent

There’s an update to the update below. The incident was reported to HHS as impacting Community 113,528 patients’ records.

Original post:

There’s an update to a breach reported previously on this site. From a statement on their site:

Community Mercy Health Partners (CMHP) and its hospitals, Springfield Regional Medical Center and Mercy Memorial Hospital, are committed to protecting the confidentiality of our patients’ personal information and are providing this notice concerning an incident involving some of that information.

On November 27, 2015, law enforcement contacted CMHP and advised us that
CMHP’s patient records were found in a public recycling dumpster. CMHP employees immediately went to the recycling site, retrieved all the documents in the dumpster, and began an internal investigation. Our investigation determined that a CMHP vendor had inadvertently disposed of the lab records in the dumpster on November 25, 2015.

The lab records may include patients’ names, physicians’ names, accession numbers, types of study, guarantor information, health insurance information, diagnoses, other clinical information, and in some instances Social Security numbers and driver’s license numbers.

This incident did not affect all CMHP patients but in an abundance of caution we began mailing letters on January 25, 2016. We also established dedicated call center for patients to call with any questions. If you believe you are affected but do not receive a letter by February 15, 2016, please call 1-877-810-8083 between 9 a.m. and 9 p.m. Eastern Time. We also recommend that affected patients review the explanation of benefits they receive from their health insurer. If they see services that they did not receive, please contact the insurer immediately.

CMHP regrets any inconvenience this incident may have caused our patients. To help prevent this from happening in the future, we have taken steps to re-inventory all document storage locations, significantly reduced or eliminated retention of paper documents when the information is electronically available, and re-educated our facilities management contractors on the requirements for physical storage relocation projects.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Gatineau gymnastics centre warns members of possible data breach
Category: ExposureHealth DataPaperSubcontractorU.S.

Post navigation

← Centene discloses missing hard drives contain personal information of 950,000 people
Confidentiality language may not throw you into the breach! →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.