DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mercy Medical Center Redding notifies patients after discovering NaviHealth case manager was working under a stolen identity

Posted on June 24, 2016 by Dissent

Typically, when an entity posts a link to a security breach notification on their web site, it’s a normal or small font. If you’re lucky, it’s positioned so that you stand a chance of spotting it immediately. But Mercy Medical Center Redding wanted to make sure they caught their patients’ attention with this graphic on their home page:

Screenshot from Mercy Medical Center - Redding website
Screenshot from Mercy Medical Center Redding website

From their notification:

Mercy Medical Center Redding has experienced a security incident involving patient information. If you were a patient at our facility between June 2015 and May 2016, please read this information carefully.

At Mercy Medical Center Redding we believe protecting our patients’ dignity and privacy is part of the care we provide.  This includes notifying patients in the event of a privacy or data security breach.  Unfortunately, on June 6, 2016, Mercy Medical Center Redding learned that information involving patients at our hospital was accessed inappropriately.

Our business partner, naviHealth, assists Mercy Medical Center Redding with patient support after leaving the hospital.  From June 2015 to May 2016 naviHealth unknowingly employed a person as a case manager who was working under a false name and nursing license. When naviHealth discovered the problem, it immediately severed ties with the case manager and prevented further computer access.  Law enforcement was contacted, and naviHealth is cooperating in the on-going investigation.

Unfortunately, this individual accessed patient information as part of his work, including:

  • standard clinical information, such as diagnosis, lab results, medications, dates of treatment, and provider notes;
  • individual information, such as name, address, phone number, social security number, date of birth, email, medical record number, account number, dates of service; and
  • health insurance account information, such as group health plan number and member ID.

Mercy Medical Center Redding has sent letters to all patients whose personal/sensitive information may have been exposed.  If you were a patient at Mercy between June 2015 through May 2016 and have questions, please contact 1-800-960-0427.  If you were a patient between these dates and have not received a letter, please call 1-800-960-0427 immediately.

For its part, naviHealth has taken a number of steps to ensure this doesn’t happen in the future.  All calls made by this case manager were recorded; and these recorded calls have been reviewed for content and clinical accuracy. All current naviHealth employees’ nursing licenses and identification have been reviewed and confirmed as authentic.  New employees will go through additional screening processes when hired.

We apologize for the inconvenience this may have caused our patients.

[…]

Action News Now reports that 520 patients were notifed.

Category: Health DataID TheftInsiderSubcontractorU.S.

Post navigation

← AL governor axes officials, asks FBI for help after finding unauthorized access to state’s criminal justice database
NASCAR team’s data locked up by ransomware; Circle Sport-Leavine Family Racing paid the ransom →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.