DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Emblem Health notifies GHI members whose SSN was exposed in mailing labels

Posted on November 15, 2016 by Dissent

Group Health Incorporated (GHI), an Emblem Health company, is notifying members of a breach due to exposure of PHI on mailing labels. The mailing error occurred between October 3 and October 14, and was discovered on October 13.

They explain:

Earlier this month, GHI mailed you a copy of your Medicare Prescription Drug Plan Evidence of Coverage (a document that describes the health care benefits covered by your plan and how your plan works).

On October 13, 2016, we learned of an unintentional disclosure of your Health Insurance Claim Number (HICN) as a result of this mailing.

Our investigation found that, while preparing the Evidence of Coverage documents for mailing, HICNs were inadvertently included in the electronic file sent to EmblemHealth’s vendor and were then disclosed on the external mailing label that was affixed to the package.

What Information Was Involved

GHI is required to assign each member a “mailing identifier” number, which is randomly selected and contains no member information. This mailing identifier helps us keep track of the mailings we send to you. In this instance, the “mailing identifier” that GHI intended to use was mistakenly replaced with your HICN, which mirrors your Social Security number. As a result, your proper name and address appeared on the external mailing label of the evidence of coverage documents, along with the nine digits of your Social Security number that were listed as the package number (PKG#) located above the barcode. At no time were these nine digits identified as your Social Security number and no health information or financial information about you was disclosed.

What We Are Doing

Protecting your personal information is a responsibility we take very seriously, and we are taking action to reduce the likelihood of this happening again. We sincerely apologize for this incident and want you to know that we have taken comprehensive steps to provide a set of support services to ensure your personal protection. We have arranged to have AllClear ID protect your identity for 24 months at no cost to you, including a dedicated helpline for any questions you may have, free credit monitoring for you, and up to $1 million of identity theft insurance coverage.

 

You can read the full notification on Emblem Health’s site.  The number of members being notified was not disclosed, and the incident is not yet up on HHS’s breach tool.

No related posts.

Category: ExposureHealth DataU.S.

Post navigation

← Convicted computer hacker who contributed to £27 million fraud jailed for not declaring laptop
Follow-up: Investigation Confirms No Patient or Employee Information Compromised in Cyberattack on Appalachian Regional Health system →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.