DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Napa Valley Dentistry notifies patients after theft of server from storage facility

Posted on September 23, 2016 by Dissent

A dental practice that purchased another dentist’s practice in 2012 finds itself having to notify their patients and his former patients after the theft of a server from a storage facility. 

In a letter to their patients and those of Dr. Justin Quinn, Dr. Justin Newberry of Napa Valley Dentistry states that on August 11, they discovered that a password-protected server with patient information had been stolen at their secured storage unit. The gated storage facility was not named, and they do not indicate whether any other units were burgled at the same time or if this was likely to be a targeted theft.  Dr. Newberry writes:

In December 2012, Dr. Justin Newberry, DDS, purchased Napa Valley Dentistry, including this server, from Dr. C. Michael Quinn, DDS. The server may therefore contain personal information of Dr. Quinn’s former patients who may not currently have a relationship with Napa Valley Dentistry. While there is no indication that your personal information was, in fact, accessed without authorization, we are notifying you out of an abundance of caution and offering you identity protection services.

The information reportedly included names, addresses, dates of birth, Social Security numbers and dental insurance information.

The total number of patients was not disclosed in the notification letter, a copy of which was  submitted to the California Attorney General’s Office.

In response to the theft, and in addition to notifying patients and regulators, the practice has offered those affected credit monitoring services. Additionally, Dr. Newberry writes:

We have also terminated our relationship with the storage facility from which the theft occurred. We are also in the process of reviewing our information security practices with the goal of making it more difficult for a similar incident to occur in the future.

This is not the first burglary from a storage facility I’ve reported on this year. I shudder to think how many unencrypted devices with ePHI are sitting patiently in storage units, just waiting to be stolen.

 

Related posts:

  • TheDarkOverlord dumps 180,000 patients’ records from 3 hacks
  • PA: King of Prussia Dental Associates and Pediatric Dentistry of Collegeville notify patients after finding computer intrusion
  • Thousands of Pennsylvania dental patients may be at lifetime risk of ID theft after patient database is uploaded to torrent sites
  • Irony: When blackhats are our only source of disclosure for some healthcare hacks (Update1)
Category: Health DataLost or MissingSubcontractorTheftU.S.

Post navigation

← Kosovo Hacker Who Aided Islamic State to Be Sentenced in US to 20 Years (Updated)
UC San Diego School of Medicine notifying trainees whose SSNs were exposed on the Internet →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people
  • Terrible tales of opsec oversights: How cybercrooks get themselves caught
  • International Criminal Court hit with cyber attack during NATO summit
  • Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”
  • Iran-linked hackers threaten to release emails allegedly stolen from Trump associates
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.