DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Eight months after laptop theft, Oceans Acquisitions notifies patients

Posted on February 6, 2016 by Dissent

Strike 1: Storing PHI on inactive or terminated patients on a mobile device.
Strike 2: Leaving a laptop with unencrypted PHI in an unattended car.
Strike 3: Not knowing you had PHI on the stolen laptop.

If this was baseball, I’d call Oceans Acquisitions out. But it’s not, so…

As seen on TXheadlines.com: an explanation for the Oceans Acquisitions report to HHS. Apparently this is another case of a laptop with PHI being stolen from an employee’s car. Note that the theft was in April, 2015, but Oceans Acquisition did not realize the laptop contained PHI until “recently.” Again, as part of risk assessment and HIPAA compliance, entities need to know what data they are storing and where.

Notification of Potential Data Breach
In December 2015, Oceans Acquisitions, Inc. began notifying patients in the Abilene area about a possible data security breach that may have resulted in exposure of a limited amount of protected health information (PHI). The potential exposure occurred when a laptop was stolen from an employee’s car. The laptop stored emails that potentially contained PHI such as names, dates of birth, medical record numbers, diagnoses, payer information and admission dates. No patient social security numbers or bank account information was included in the emails. Upon learning PHI may have been present on the device, Oceans immediately took steps to identify the individuals with the potential to be impacted. Although the laptop was stolen April 9, 2015, only recently, during an unrelated systems review did Oceans learn the device contained PHI. In May 2015, Oceans validated that all portable devices and laptops have encryption technology active and in use. While there is no indication the personal information has been acquired or used, free identity protection resources are being provided to individuals who may have been impacted. Because it is possible the PHI contained on the laptops may have been improperly accessed, federal and state law requires Oceans to notify potentially affected patients of this incident. This notice in print media is being provided as notification to individuals for whom Oceans has out-of-date contact information and therefore cannot be notified via letter. If you believe you have been affected, you should review your credit reports for accounts or creditor inquiries that you do not recognize. Individuals who believe they may have been impacted or who have questions can call a dedicated toll-free help line at (877) 747-5168.
Location: ReporterNews.com | Publication date: 02/05/16
According to their report to HHS, 659 patients were affected.
Category: Health DataTheftU.S.

Post navigation

← Gyft Notifies Affected Users of Security Incident
LabMD’s answering brief captures how ridiculous FTC’s case was, and is →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.