DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NE: Complete Family Medicine advises patients of burglary

Posted on April 30, 2018 by Dissent

From their public notice:

On March 1, 2018, the offices of Complete Family Medicine, LLC were burglarized. Later the same day, Complete Family Medicine discovered that the perpetrators stole numerous items including a computer component of a medical device used to conduct EKGs and uncashed patient checks that were stored in a locked safe. Law enforcement was notified and immediately began an investigation. Some, but not all, of the checks were later recovered. To date, the computer has not been recovered.

The stolen computer contained information about patients who had an EKG performed at Complete Family Medicine including first and last names, dates of birth, and EKG images. Information on the computer did not include financial information, social security numbers, or patient addresses. The stolen checks contained information including first and last name, address, and bank account information.

Complete Family Medicine has sent letters to all impacted individuals for whom the practice has valid addresses by U.S. mail. The letters contain important information about steps individuals can take to prevent medical identity theft or fraud. Complete Family Medicine recommends the following actions as good practice for individuals concerned about misuse of their health care information:

  • Closely monitor any Explanation of Benefits or EOB sent by an insurance company other entity that pays medical bills and contact your health care provider if anything looks suspicious.
  • Request a copy of current medical records from each health care provider and report any errors or suspicious information.
  • Request an accounting of disclosures which lists the times health information has been shared for certain activities.

For those individuals whose bank account information was involved, Complete Family Medicine has arranged for a one-year enrollment in an online credit monitoring service (myTrueIdentity) provided by TransUnion Interactive, a subsidiary of TransUnion, one of the three nationwide credit reporting companies. Instructions on how to enroll in this free service are included in the letters sent to affected individuals whose bank account information was compromised.

To learn whether your information was included in the breach or to ask questions, please contact the Complete Family Medicine office manager, Lisa Ackerman, by phone at 308-696-2273 or by e-mail at [email protected]. Due to the nature of the incident and to further mitigate risk to patients, callers will be asked to provide additional identifiers so that Complete Family Medicine can accurately verify a callers identity.

Complete Family Medicine is reviewing its policies and procedures to determine if any changes are necessary to its physical security or how information is maintained. We deeply regret any inconvenience this incident may have caused patients and their families.

Published in the North Platte Telegraph North Platte, Nebraska April 28, 2018 May 1, 2018.


Related:

  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • SEC Voluntarily Dismisses SolarWinds Litigation
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident' impacting city's IT systems
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • Large medical lab in South Africa suffers multiple data breaches
Category: Health DataPaperTheftU.S.

Post navigation

← A former hacker reveals what he’s learned about cybersecurity
Supreme Court to rule in Google referrer header privacy settlement case →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief
  • Justice Department Announces Actions to Combat Two Russian State-Sponsored Hacking Groups
  • Should entities be required to disclose the name of a vendor if the breach was at the vendor’s?
  • The Hidden Risks of Information Disclosure: A Costly Lesson from Cornwall
  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition (1)
  • US Posts $10 Million Bounty for Iranian Hackers
  • South Korea police raid e-commerce giant Coupang over data leak; govt schedules hearing

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.