DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Saliba’s Extended Care Pharmacy notifies more than 6,500 patients after email error

Posted on March 8, 2017 by Dissent

Phoenix, Arizona – March 3, 2017 – Saliba’s Extended Care Pharmacy (“Saliba’s Pharmacy”) is notifying certain patients of the inadvertent e-mailing of December 2016 invoices, which contained patient names, addresses, account balances, and may have also included a description and dosage amount of prescription or over-the-counter medication or other pharmacy items provided by Saliba’s Pharmacy in December 2016, to the wrong patients. While Saliba’s Pharmacy believes the risk of misuse of this information is very low, it is nevertheless providing notification to ensure its patients are aware of the incident so that they may take steps to protect their information should they feel it is appropriate to do so.

On January 16, 2017, Saliba’s Pharmacy discovered that on January 12, 2017, a copy of the December 2016 patient invoices was inadvertently emailed, via Saliba’s Pharmacy’s encrypted email platform, and thereafter opened by three other Saliba’s Pharmacy patients or their Personal Representatives.

“We take this incident, and the privacy and security of our patients’ information, very seriously,” John Saliba, President, stated. “We terminated the employee that committed this error, have provided staff with additional training, and reviewed our policies and procedures to better protect against an event like this from happening again.”

Saliba’s Pharmacy is mailing letters to its patients on March 3, 2017. Saliba’s Pharmacy is also disclosing this incident to the U.S. Department of Health and Human Services.

Saliba’s Pharmacy emphasizes that the invoices were sent to three known Saliba’s Pharmacy patients or their Personal Representatives, that Saliba’s Pharmacy is unaware of any actual or attempted misuse of its patients’ information, and that these invoices did not contain patient Social Security numbers, financial account information, or health insurance information. Nevertheless, Saliba’s Pharmacy encourages its patients to review their Saliba’s Pharmacy account statements, health insurance account records, and explanation of benefits forms for suspicious activity, and to immediately report all suspicious activity to the institution that issued the record.

To better assist its patients, Saliba’s Pharmacy has established a toll-free privacy inquiry line to answer questions. This privacy inquiry line is available Monday through Friday, 7:00 a.m. to 7:00 p.m. MST at 844-789-6860.

SOURCE: Saliba’s Extended Care Pharmacy

Note: This incident was reported to HHS as affecting 6,599 patients.


Related:

  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • John P. Meehan Agency was hacked in July 2024. Affected customers were first finding out in November 2025.
  • Ransomware blog claims New Horizons Medical has been attacked
Category: ExposureHealth DataU.S.

Post navigation

← Fort Myers man arrested, charged with cyber attack on Calif. software company
Hacktivist who conspired to hack high school football website sentenced to 2 years →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Teen who allegedly stole millions of personal data records arrested in Spain
  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief
  • Justice Department Announces Actions to Combat Two Russian State-Sponsored Hacking Groups
  • Should entities be required to disclose the name of a vendor if the breach was at the vendor’s?
  • The Hidden Risks of Information Disclosure: A Costly Lesson from Cornwall
  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition (1)
  • US Posts $10 Million Bounty for Iranian Hackers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • U.S. Plans to Scrutinize Foreign Tourists’ Social Media History
  • ANNOUNCEMENT: EFF Launches Age Verification Hub as Resource Against Misguided Laws
  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.