DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Computer file stolen in Oklahoma could put Spokane veterans at risk for identity theft

Posted on October 19, 2017 by Dissent

Thomas Clouse reports:

The staff at Mann-Grandstaff VA Medical Center is working to determine the scope of what could be the potential release of records for 1,915 veterans, who could now become victims of identity theft.

On July 18 someone stole two USB drives containing the personal information for the veterans from a contract employee who was conducting a service call in Oklahoma City, VA spokesman Brett Bowers said in a news release.

Read more on The Spokesman-Review. Of note, Clouse’s report indicates that the VA believed PHI might be involved:

“Although we cannot say for certain what information was stored on the stolen USB hard drive, we are alerting every veteran whose personal information resides on the” server, Bowers wrote. “We have determined the information at possible risk may include full names, social security numbers, addresses, phone contacts, surgical and insurance information.”

There is a statement on the center’s home page, but it appears to be describing a different incident:

Possible Data Breach Prompts Veteran Notification

Mann-Grandstaff VA Medical Center has contacted approximately 3,200 Veterans by mail, indicating there may have been a compromise in their personally identifiable information as a result of a missing laptop that interfaces with a laboratory analyzer owned by a VA vendor.  The direct mailing to Veterans is informing them of MGVAMC’s precautionary measure to allow potentially-impacted Veterans an opportunity to have free credit monitoring to protect them from any fraudulent attempts of identity theft.  For more information, please see this Press Release announcing further information for Veterans and how MGVAMC leadership is taking corrective action.

The press release it refers to says, in part:

The Mann-Grandstaff VA Medical Center (MGVAMC) in Spokane has notified 3,275 Veterans whose Protected Health Information (PHI) was potentially compromised. On August 7, 2017, an equipment inventory determined that a vendor-issued laptop from the Mann-Grandstaff VAMC Lab was missing. This laptop, a standalone piece of equipment used to interface with a Laboratory hematology analyzer, was in operation between April 2013 and May 2016. The laptop was replaced by the vendor in May 2016 after it became unusable, but they have no record of taking the laptop from the facility. VA staff conducted an extensive search of the VA premises and were unsuccessful in locating it.

Although we cannot say for certain what information was stored on the missing laptop, we are taking the necessary precaution of alerting every Veteran that may have had a hematology sample processed on the analyzer. We have determined that the information potentially at risk are full names, dates of birth, and social security numbers.

That press release was dated September 19, 2017.

On further investigation, the September incident is one previously noted in our report for Protenus as “Spokane VA Medical Center.”  It had been coded as a lost laptop incident based on their report to HHS, but no additional information was available at that time.

Note: This report was corrected post-publication. The original version incorrectly treated both reports as if they were from the latest incident.

No related posts.

Category: Government SectorHealth DataSubcontractorTheftU.S.

Post navigation

← Personal data of millions of Malaysians up for sale, source of breach still unknown (UPDATED)
Kromtech Security Center Releases Tool to Identify and Prevent Data Leaks for Amazon S3 Users →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.