DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stephenville Medical & Surgical Clinic​ notifies patients after data sent to another patient in error

Posted on May 31, 2017 by Dissent

I wonder if this incident really occurred on May 19, 2016, or if that was a typo and they meant to write “2017.” Their press release:

Stephenville, Texas, May 31, 2017 / Stephenville Medical & Surgical Clinic, P.A. (SMSC) , a multi-specialty clinic serving the Stephenville, Texas area, disclosed it was involved in a data “breach,” related to inadvertently emailing an archived list of patients to a single individual.  The incident occurred May 19, 2016, when an individual requested the clinic email a blank medical record release form.  Rather than emailing the blank form, an employee in the Medical Records Department mistakenly emailed a spreadsheet containing a list of former patients, most of whom had not been seen at the clinic for more than 9 years. The recipient opened the document that evening and determined it was not the form requested.  The recipient immediately deleted it.  The next morning, the individual contacted the clinic to report the error.  

The spreadsheet included patient’s name, date of birth, medical record number, and, for some patients, the date the patient last visited the clinic.  For many patients, the list did not include a full date of birth or information about the date last seen in the clinic.  The medical record number is unique to SMSC and has no potential use except at this facility.

Importantly, the list did not include sensitive medical or financial information. It did not include diagnoses or what providers the patients saw. It did not include addresses, phone numbers, credit card numbers, insurance information, or social security numbers. Thus, it is unlikely the individual receiving this list could use the information to perpetuate identity theft or any other fraudulent activity.  It is also important to note that SMSC was not hacked. No records were stolen.  This incident was the result of accidental human error.  And again, no sensitive medical or financial information was included.

SMSC brought in an independent firm to conduct an assessment of this incident, ultimately concluding the incident posed little, if any, risks to the patients involved.  During the course of the investigation, the recipient fully cooperated, including meeting with representatives of the outside firm on multiple occasions, signing an affidavit regarding the incident, and ensuring the information was deleted from the “deleted” folder of the computer.  The recipient is a long-time patient of the clinic and believed to be honest and trustworthy – conclusions that the outside investigation also made.  SMSC has no evidence that any of the data provided to the recipient has been or will be used or misappropriated.

Letters to potentially affected patients are being mailed.  These letters explain what occurred and offer identity protection and restoration services.

In the course of the assessment, SMSC mitigated potential harm to its patients by reasonably assuring itself that the recipient had deleted the email and would not use or misappropriate anyone’s information.  The employee who made the mistake was terminated.  SMSC also changed how the information is stored to prevent this type of incident from occurring in the future.  Clinic employees undergo yearly training to ensure they understand and maintain patient privacy and data security.

SMSC understands the importance of safeguarding protected health information and takes that responsibility seriously.  The clinic is strongly committed to maintaining the privacy and security of all patient data.  

To Learn More

SMSC has established a dedicated-assistance line for anyone seeking additional information regarding this incident, as well as steps to better protect against identity theft. For the next 90 days, this assistance line can be reached at (888) 735-0505, Monday through Friday from 9 am to 9 pm EST.  

Identity Protection Tips

SMSC recommends potentially affected individuals check their credit reports and account statements regularly for suspicious activity.  SMSC also recommends potentially affected individuals consider enrolling in the complimentary identity protection services described in the letter.  

SOURCE: Stephenville Medical and Surgical Clinic


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: ExposureHealth DataInsiderU.S.

Post navigation

← Former Tufts Health Plan employee sentenced for stealing patient info
Woman stole info of 150 patients at Charlotte area medical practice →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.