DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Hunt Regional Medical Center Notifies Patients of Possible Breach Due to Hack of Employee Email

Posted on July 14, 2018 by Dissent

This breach notification is dated June 29, but just appeared on HHS’s breach tool today with that submission date to them.

Hunt Regional Medical Center Notifies Patients of Data Security Incident

page1image3960

Greenville – Hunt Memorial Hospital District (“Hunt”) has notified patients of a data security incident that took place last month.

On May 1, 2018, Hunt learned that an unauthorized user accessed its Home Health email system through the email account of an employee of Hunt Regional Home Health and sent an email to certain internal users of Hunt’s email system. Although email did not contain any patient protected health information, Hunt was unable to definitively rule out whether the unauthorized user otherwise accessed protected health information while in the system. By having access to the email system, it is possible that the unauthorized user could have had access to personal information of Hunt’s Home Health patients whose information was accessible by the Hunt employee whose email account was compromised. Hunt has reported this incident to the FBI and will fully cooperate with its investigation.

Hunt recently sent letters to those patients who may have been affected by this incident. Although there is no evidence indicating that patients are at risk for identity theft, the letters informed those patients that Hunt is offering them identity theft protection services through ID Experts® to provide them with MyIDCareTM. MyIDCare services include: Twelve months of credit monitoring, a $1,000,000 insurance reimbursement policy, exclusive educational materials, and fully managed ID theft recovery services. More information can be found in the letters provided to those patients who may have been affected.

A variety of administrative, physical, and technical security measures were in place prior to this incident. After the incident, Hunt has taken steps such as reviewing its policies and procedures and retraining our employees on the proper handling and protection of login credentials to prevent mistakes such as this from occurring in the future. Hunt continues to assess its privacy and security controls to prevent future breaches.

Hunt takes its patients’ privacy and the security of information very seriously and deeply regrets any inconvenience this incident may have caused. Patients should call (888) 813-7480 for assistance or with any additional questions.

Category: HackHealth Data

Post navigation

← Tennessee hospice notifying patients whose information was accessed after employees fell for phishing attacks
NJ: C-TEC: Student information may be impacted by data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.