DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Texas Health Resources notifying patients about incident in 2017 that affected multiple entities

Posted on April 14, 2018 by Dissent

Texas Health Resources is notifying fewer than 4,000 patients about an email incident last year. They were reportedly asked to delay notification for law enforcement purposes, and were told that this was part of a larger incident affecting multiple entities across the country. Now what larger incident would that be?

Texas Health Resources is committed to protecting the security and confidentiality of our patients’ information. Regrettably, this notice is about an incident involving some of that information.

On January 17, 2018, law enforcement advised us that an unauthorized third party may have gained access to some Texas Health email accounts in October 2017. Law enforcement indicated this was part of a larger incident affecting multiple entities across the country and did not just affect Texas Health entities and patients. They asked that we refrain from contacting our patients, so as not to impede the law enforcement investigation.

We respected law enforcement’s request and began our own internal investigation, including hiring a leading forensic firm to assist us.

The investigation determined that some patients’ information may have been in the affected email accounts, and may have included patients’ names, medical record numbers, dates of birth, addresses, insurance information, clinical information, and in some instances Social Security numbers and driver’s license and state identification numbers. Law enforcement has now indicated we could notify our patients regarding this incident.

This incident affected certain Texas Health patients that received care and treatment primarily in 2017.  It did not affect all Texas Health patients.

We have no indication that any information has been misused in any way. However, in an abundance of caution, we mailed letters to affected patients on April 13, 2018, and established a dedicated call center to answer any questions they may have. For those patients whose Social Security numbers were included, we are offering one year of free credit monitoring. We recommend affected patients review any statements they receive from their health insurer. If patients see charges for services they did not receive, please contact the insurer immediately. If you believe you are affected and have not received a letter by May 1, 2018, please call 855-331-3705, Monday through Friday, between 8 a.m. and 8 p.m. Central Time.

We deeply regret any inconvenience or concern this may cause our patients. To help prevent something like this from happening in the future, Texas Health is continuously working to implement safeguards and enhance information security monitoring.​​


Related:

  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • A Swath of Bank Customer Data Was Hacked. The F.B.I. Is Investigating.
  • Ph: Department of the Interior and Local Government to probe alleged data breach by hackers
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
Category: HackHealth Data

Post navigation

← College Consultants’ Client Information Was Exposed on Web Servers
Blue Shield of California notifies members of privacy breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage
  • GreyNoise launches free scanner to check if you’re part of a botnet

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.