DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mercy Medical Center Redding notifies patients after discovering NaviHealth case manager was working under a stolen identity

Posted on June 24, 2016 by Dissent

Typically, when an entity posts a link to a security breach notification on their web site, it’s a normal or small font. If you’re lucky, it’s positioned so that you stand a chance of spotting it immediately. But Mercy Medical Center Redding wanted to make sure they caught their patients’ attention with this graphic on their home page:

Screenshot from Mercy Medical Center - Redding website
Screenshot from Mercy Medical Center Redding website

From their notification:

Mercy Medical Center Redding has experienced a security incident involving patient information. If you were a patient at our facility between June 2015 and May 2016, please read this information carefully.

At Mercy Medical Center Redding we believe protecting our patients’ dignity and privacy is part of the care we provide.  This includes notifying patients in the event of a privacy or data security breach.  Unfortunately, on June 6, 2016, Mercy Medical Center Redding learned that information involving patients at our hospital was accessed inappropriately.

Our business partner, naviHealth, assists Mercy Medical Center Redding with patient support after leaving the hospital.  From June 2015 to May 2016 naviHealth unknowingly employed a person as a case manager who was working under a false name and nursing license. When naviHealth discovered the problem, it immediately severed ties with the case manager and prevented further computer access.  Law enforcement was contacted, and naviHealth is cooperating in the on-going investigation.

Unfortunately, this individual accessed patient information as part of his work, including:

  • standard clinical information, such as diagnosis, lab results, medications, dates of treatment, and provider notes;
  • individual information, such as name, address, phone number, social security number, date of birth, email, medical record number, account number, dates of service; and
  • health insurance account information, such as group health plan number and member ID.

Mercy Medical Center Redding has sent letters to all patients whose personal/sensitive information may have been exposed.  If you were a patient at Mercy between June 2015 through May 2016 and have questions, please contact 1-800-960-0427.  If you were a patient between these dates and have not received a letter, please call 1-800-960-0427 immediately.

For its part, naviHealth has taken a number of steps to ensure this doesn’t happen in the future.  All calls made by this case manager were recorded; and these recorded calls have been reviewed for content and clinical accuracy. All current naviHealth employees’ nursing licenses and identification have been reviewed and confirmed as authentic.  New employees will go through additional screening processes when hired.

We apologize for the inconvenience this may have caused our patients.

[…]

Action News Now reports that 520 patients were notifed.

Related posts:

  • Updating: CaptureRx incident impacted more than 2.4 million. List of Entities.
Category: Health DataID TheftInsiderSubcontractorU.S.

Post navigation

← AL governor axes officials, asks FBI for help after finding unauthorized access to state’s criminal justice database
NASCAR team’s data locked up by ransomware; Circle Sport-Leavine Family Racing paid the ransom →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.