DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Notice of Data Breach from Bay Area Children’s Association

Posted on May 6, 2016 by Dissent

To the Patients and Guarantors of Bay Area Children’s Association:

On April 1, 2016, we received notice from our electronic medical record provider that some of our patient records were acquired by unauthorized persons. Specifically, they determined that cyber intruders may have installed malware on their system in January 2015 and, through credential theft, accessed certain systems in their environment. We immediately requested further information to identify which of our patients were affected and on April 22, 2016, we were informed that such information could not be confirmed. Though we do not have confirmation that your records were compromised, we wanted to notify everyone whose records were on the affected system.

Though there is no evidence of fraudulent use, we have been informed that the information accessed by unauthorized individuals may have included your name, address, telephone number, date of birth, social security number, and medical insurance information if provided to us. Further, BACA health visit information may have also been exposed.

Please be assured that we take this matter seriously. Immediately upon notice that our patient records were accessed by a cyber intruder and who was affected, we are notifying you of the breach, and are providing complimentary credit monitoring for one year. Further, we have been assured that our electronic record provider has thoroughly investigated the matter and has done everything it can to hardened (sic) its firewall and network configurations. Lastly, we have been informed that the FBI and Secret Service have been investigating this matter for several months and that the U.S. Attorney’s Office is involved in the investigation of the potential perpetrators.

Given the breadth of information potentially exposed, we strongly recommend you call the three credit bureaus and place a 90 day fraud alert on your accounts. Their contact information is: Equifax (1-888-766-0008; P.O. Box 740241, Atlanta, GA 30374), Experian (1-888-397-3742; P.O. Box 4500, Allen, TX 75013), and TransUnion (800-680-7289; P.O. Box 2000, Chester, PA 19022-2000). You are also entitled to a free credit report every year from these agencies at www.annualcreditreport.com. Additionally, we will provide affected patients and their guarantors with complimentary identity theft protection for 1 year through AllClear ID.

Again, we sincerely apologize for any inconvenience. We understand how important confidentiality and trust is to our physician-patient relationship. Please contact 1-855-904-5767 (8 a.m. to 5 p.m. Central Time, Monday – Friday) or 1175 Saratoga Avenue Suite 14, San Jose, CA 95129 if you believe you have been impacted by this incident.

SOURCE: Bay Area Children’s Association

So why, if the feds had been investigating for months, was notification to BACA delayed until April 15? And why don’t they name the vendor? Were any other clients of the vendor also affected this way?


Related:

  • New York Attorney General James Alerts 17 Companies to “Credential Stuffing” Cyberattacks Impacting More Than 1.1 Million Consumers
  • IRS’s Top 10 Identity Theft Prosecutions
  • Small-Scale Violations of Medical Privacy Often Cause the Most Harm
  • HIPAA Compliance and Breach Communications: Helpful Tips for SMBs
  • Madison Square Garden Company Alerts Customers of Payment Card Data Breach
Category: Health DataMalwareU.S.

Post navigation

← InvestBank UAE hack: Database containing credit card details and passport scans leaks online
Google notifies employees of breach by vendor →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.