DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Unencrypted patient info from 2008 left in a van, and…… yeah.

Posted on April 22, 2017 by Dissent

From their disclosure notice:

Western Health Screening (“WHS”) is an organization that offers comprehensive blood screening tests. It partners with community organizations, such as hospitals, to provide onsite blood screenings at Health Fairs throughout the Western slope of Colorado. You have been a participant at Health Fairs in the past that were sponsored by either Montrose Memorial Hospital; Gunnison Valley Health; or Delta County Memorial Hospital (the “Hospitals”).

WHS recently learned that a vehicle owned by WHS in route to a Health Fair and passing through Salt Lake City, Utah, was stolen. There was a piece of computer equipment known as a “jump drive” belonging to WHS that was in the stolen vehicle. Upon learning of this theft, WHS immediately investigated and determined that the jump drive, which was password protected, but unencrypted, contained participants’ personal information. WHS learned of the theft on February 7, 2017, but determined that the jump drive was unencrypted on February 15, 2017. WHS is sending this letter to you as part of WHS’s, and the Hospitals’, commitment to privacy. We take privacy very seriously, and it is important to us that you are made fully aware of this incident.

When WHS learned of the theft, it immediately reported the theft to the Salt Lake City Police Department. The jump drive has not been recovered and the police continue to investigate. WHS also conducted its own internal investigation. WHS determined that the jump drive contained demographic information that had been collected by WHS for health fair participants from the years 2008-2012, including health fair participants’ names, addresses, phone numbers and in some instances Social Security numbers. WHS also determined that the jump drive can only be accessed via a unique password. The jump drive did not contain any medical information such as blood test results, nor did it contain any nancial information such as credit card numbers or other source of payment information. To date, WHS has no evidence that any participants’ information was accessed by unauthorized persons or that any participants’ personal information has been misused.

We are notifying you out of an abundance of caution so that you can take appropriate steps to protect yourself. To help relieve concerns and restore con dence following this incident, we have secured the services of Kroll to provide identity monitoring at no cost to you for one year.

[…]

So why was a portable device with unencrypted patient information from 2008 – 2012 even in the van in 2017? If they needed old information as part of the current screening services, then how might they have accessed it more securely? At the very least, the data or drive should have been encrypted. Did Western Health Screening’s risk assessment include portable devices left in vans or taken out in the field for screenings? I would hope so.

No related posts.

Category: Health DataTheftU.S.

Post navigation

← Russian Accused of Running Spam Ring is Indicted in US
Wall Street IT Engineer Hacks Employer to See If He Will Be Let Go →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.