DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mercy Medical Center Redding notifies patients after discovering NaviHealth case manager was working under a stolen identity

Posted on June 24, 2016 by Dissent

Typically, when an entity posts a link to a security breach notification on their web site, it’s a normal or small font. If you’re lucky, it’s positioned so that you stand a chance of spotting it immediately. But Mercy Medical Center Redding wanted to make sure they caught their patients’ attention with this graphic on their home page:

Screenshot from Mercy Medical Center - Redding website
Screenshot from Mercy Medical Center Redding website

From their notification:

Mercy Medical Center Redding has experienced a security incident involving patient information. If you were a patient at our facility between June 2015 and May 2016, please read this information carefully.

At Mercy Medical Center Redding we believe protecting our patients’ dignity and privacy is part of the care we provide.  This includes notifying patients in the event of a privacy or data security breach.  Unfortunately, on June 6, 2016, Mercy Medical Center Redding learned that information involving patients at our hospital was accessed inappropriately.

Our business partner, naviHealth, assists Mercy Medical Center Redding with patient support after leaving the hospital.  From June 2015 to May 2016 naviHealth unknowingly employed a person as a case manager who was working under a false name and nursing license. When naviHealth discovered the problem, it immediately severed ties with the case manager and prevented further computer access.  Law enforcement was contacted, and naviHealth is cooperating in the on-going investigation.

Unfortunately, this individual accessed patient information as part of his work, including:

  • standard clinical information, such as diagnosis, lab results, medications, dates of treatment, and provider notes;
  • individual information, such as name, address, phone number, social security number, date of birth, email, medical record number, account number, dates of service; and
  • health insurance account information, such as group health plan number and member ID.

Mercy Medical Center Redding has sent letters to all patients whose personal/sensitive information may have been exposed.  If you were a patient at Mercy between June 2015 through May 2016 and have questions, please contact 1-800-960-0427.  If you were a patient between these dates and have not received a letter, please call 1-800-960-0427 immediately.

For its part, naviHealth has taken a number of steps to ensure this doesn’t happen in the future.  All calls made by this case manager were recorded; and these recorded calls have been reviewed for content and clinical accuracy. All current naviHealth employees’ nursing licenses and identification have been reviewed and confirmed as authentic.  New employees will go through additional screening processes when hired.

We apologize for the inconvenience this may have caused our patients.

[…]

Action News Now reports that 520 patients were notifed.

Related posts:

  • Updating: CaptureRx incident impacted more than 2.4 million. List of Entities.
Category: Health DataID TheftInsiderSubcontractorU.S.

Post navigation

← AL governor axes officials, asks FBI for help after finding unauthorized access to state’s criminal justice database
NASCAR team’s data locked up by ransomware; Circle Sport-Leavine Family Racing paid the ransom →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.