DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Chilton Medical Center hard drive containing protected health information was sold online

Posted on December 19, 2017 by Dissent

News12 NJ reports:

Nearly 10 years of personal hospital records could be at risk after it was discovered that a former employee sold a hard drive containing the information online.

The incident could affect patients at Chilton Medical Center in Pequannock who visited the hospital from May 1, 2008 through Oct. 15, 2017.

The hard drive contained names, dates of birth, addresses and medical record numbers. Hospital officials says that no Social Security numbers, financial information or medical records were compromised.

Read more on News12.  The following is the text of the medical center’s notice from their web site:

Notice to Chilton Medical Center Patients Regarding a Hard Drive Incident

Chilton Medical Center is committed to the privacy and security of our patients’ information. We take patient privacy very seriously and wanted to make our patients aware of a recent incident involving some of that information.

On October 31, 2017, we learned that an employee had removed a computer hard drive from the hospital in violation of Chilton Medical Center policy and sold it on the internet earlier that month. We began an investigation and notified the Morris County Prosecutor’s Office. Our investigation determined that the hard drive contained patient information, and may have included patients’ names, dates of birth, addresses, medical record numbers, allergies, and medications the patient may have received at Chilton Medical Center. No Social Security numbers, financial information, or medical records were affected. The employee no longer works at Chilton Medical Center.

This incident did not affect all Chilton Medical Center patients; only certain patients treated at Chilton Medical Center from May 1, 2008 to October 15, 2017. We have no indication that any patient information has been misused in any way. However, we began mailing letters to affected patients on December 15, 2017 and have established a dedicated call center to answer any questions patients may have. If you believe you are affected but do not receive a letter by January 5, 2018, please call 1-855-590-2129 (toll free) between 9:00 am and 9:00 pm EST Monday through Friday.

During our investigation, we determined that the former employee removed other devices and assets from Chilton Medical Center to sell on the internet in violation of policy. While we currently have no indication that any of these devices or assets contain patient information, we continue to investigate this incident and, if we determine additional patients are affected, we will notify them as appropriate.

This incident is not consistent with our privacy practices. While we have policies in place to protect patient information, we have, since this incident, enhanced our processes and controls to help prevent something like this from happening again.

UPDATE: This was reported to HHS as affecting 4,600 patients.

Category: Health DataInsiderU.S.

Post navigation

← OH: Geauga County Employees Notified of Data Security Breach
Appleby taking legal action after leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.