DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

SCAN Health Plan notifying members of unauthorized access to their information (UPDATED)

Posted on August 23, 2016 by Dissent

SCAN Health Plan is notifying some members of a potential breach that may have begun on March 4.  From an FAQ on the incident, they explain:

August 22, 2016

Keeping your information private is something we take very seriously. This notice will explain what happened and what SCAN is doing to protect you.

What Happened? On June 27, 2016 we learned that contact sheets, which are documents kept in a system used for sales purposes, had been accessed and possibly viewed for unauthorized purposes. We immediately began an investigation and brought in outside experts. We determined the unauthorized access occurred between March and June of 2016. While there is no indication that the information in this system has been used fraudulently, we needed to let you know that your information was in this system.

What Information Was Involved? The information on the contact sheets that were exposed included name, address, and phone number. For some people it also included date of birth and limited health notes, such as a doctor name, health condition, or medication name. For a small number of individuals it may have also included Social Security number.

What SCAN Is Doing. For your protection, SCAN Health Plan has arranged to have AllClear ID provide their expert identity protection services for one (1) year at no cost to you. We hope this provides you some peace of mind.

The following services start on the date of this notice and you can use them at any time during the next 12 months. See the What You Can Do section below for how to use these AllClear services.

  1. AllClear Identity Repair: This service is automatically available to you with no enrollment required. If a problem arises, a dedicated investigator will help recover financial losses, restore your credit and make sure your identity is returned to its proper condition.
  2. AllClear Credit Monitoring: This service offers additional layers of protection including credit monitoring and a $1 million identity theft insurance policy. To use this service, you will need to provide your personal information to AllClear ID. Please note: Additional steps may be required by you in order to activate your phone alerts and monitoring options.

What You Can Do. Contact AllClear with any questions or concerns or to enroll in option 2, AllClear Credit Monitoring.

  • AllClear is available Monday – Saturday from 6 a.m. – 6 p.m. PST at 1-855-270-9186 (tty 711),
  • To enroll with AllClear Credit Monitoring, go to scan.allclearid.com or call the phone number above.

You can also review the Information About Identity Theft Protection below for more steps you can take to protect your identity.

We take the privacy of the personal information in our care very seriously and are working to ensure this doesn’t happen again. We are very sorry for any inconvenience and concern this may cause you. If you have any questions about this incident, please call AllClear at the phone number listed above, or visit www.scandatafacts.com.

This breach does not (yet?) appear on HHS’s public breach tool, and the number of those notified was not reported in their FAQ.

UPDATE: FierceHealthcare reports:

Overall, 87,000 individuals were impacted, SCAN spokesman Ross Goldberg told FierceHealthIT, fewer than half of whom were health plan members. Some of those impacted may simply have inquired about SCAN Health Plan, according to Goldberg.

Category: Health DataInsiderU.S.

Post navigation

← Dominican Hospital notifies patients whose PHI was sent to wrong health plan
Turkish Hackers Launch Second Cyber-Attack on Killeen’s Website →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.