DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NE: Complete Family Medicine advises patients of burglary

Posted on April 30, 2018 by Dissent

From their public notice:

On March 1, 2018, the offices of Complete Family Medicine, LLC were burglarized. Later the same day, Complete Family Medicine discovered that the perpetrators stole numerous items including a computer component of a medical device used to conduct EKGs and uncashed patient checks that were stored in a locked safe. Law enforcement was notified and immediately began an investigation. Some, but not all, of the checks were later recovered. To date, the computer has not been recovered.

The stolen computer contained information about patients who had an EKG performed at Complete Family Medicine including first and last names, dates of birth, and EKG images. Information on the computer did not include financial information, social security numbers, or patient addresses. The stolen checks contained information including first and last name, address, and bank account information.

Complete Family Medicine has sent letters to all impacted individuals for whom the practice has valid addresses by U.S. mail. The letters contain important information about steps individuals can take to prevent medical identity theft or fraud. Complete Family Medicine recommends the following actions as good practice for individuals concerned about misuse of their health care information:

  • Closely monitor any Explanation of Benefits or EOB sent by an insurance company other entity that pays medical bills and contact your health care provider if anything looks suspicious.
  • Request a copy of current medical records from each health care provider and report any errors or suspicious information.
  • Request an accounting of disclosures which lists the times health information has been shared for certain activities.

For those individuals whose bank account information was involved, Complete Family Medicine has arranged for a one-year enrollment in an online credit monitoring service (myTrueIdentity) provided by TransUnion Interactive, a subsidiary of TransUnion, one of the three nationwide credit reporting companies. Instructions on how to enroll in this free service are included in the letters sent to affected individuals whose bank account information was compromised.

To learn whether your information was included in the breach or to ask questions, please contact the Complete Family Medicine office manager, Lisa Ackerman, by phone at 308-696-2273 or by e-mail at ackermanl@gphealth.org. Due to the nature of the incident and to further mitigate risk to patients, callers will be asked to provide additional identifiers so that Complete Family Medicine can accurately verify a callers identity.

Complete Family Medicine is reviewing its policies and procedures to determine if any changes are necessary to its physical security or how information is maintained. We deeply regret any inconvenience this incident may have caused patients and their families.

Published in the North Platte Telegraph North Platte, Nebraska April 28, 2018 May 1, 2018.


Related:

  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: Health DataPaperTheftU.S.

Post navigation

← A former hacker reveals what he’s learned about cybersecurity
Supreme Court to rule in Google referrer header privacy settlement case →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report