DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Hunt Regional Medical Center Notifies Patients of Possible Breach Due to Hack of Employee Email

Posted on July 14, 2018 by Dissent

This breach notification is dated June 29, but just appeared on HHS’s breach tool today with that submission date to them.

Hunt Regional Medical Center Notifies Patients of Data Security Incident

page1image3960

Greenville – Hunt Memorial Hospital District (“Hunt”) has notified patients of a data security incident that took place last month.

On May 1, 2018, Hunt learned that an unauthorized user accessed its Home Health email system through the email account of an employee of Hunt Regional Home Health and sent an email to certain internal users of Hunt’s email system. Although email did not contain any patient protected health information, Hunt was unable to definitively rule out whether the unauthorized user otherwise accessed protected health information while in the system. By having access to the email system, it is possible that the unauthorized user could have had access to personal information of Hunt’s Home Health patients whose information was accessible by the Hunt employee whose email account was compromised. Hunt has reported this incident to the FBI and will fully cooperate with its investigation.

Hunt recently sent letters to those patients who may have been affected by this incident. Although there is no evidence indicating that patients are at risk for identity theft, the letters informed those patients that Hunt is offering them identity theft protection services through ID Experts® to provide them with MyIDCareTM. MyIDCare services include: Twelve months of credit monitoring, a $1,000,000 insurance reimbursement policy, exclusive educational materials, and fully managed ID theft recovery services. More information can be found in the letters provided to those patients who may have been affected.

A variety of administrative, physical, and technical security measures were in place prior to this incident. After the incident, Hunt has taken steps such as reviewing its policies and procedures and retraining our employees on the proper handling and protection of login credentials to prevent mistakes such as this from occurring in the future. Hunt continues to assess its privacy and security controls to prevent future breaches.

Hunt takes its patients’ privacy and the security of information very seriously and deeply regrets any inconvenience this incident may have caused. Patients should call (888) 813-7480 for assistance or with any additional questions.

Category: HackHealth Data

Post navigation

← Tennessee hospice notifying patients whose information was accessed after employees fell for phishing attacks
NJ: C-TEC: Student information may be impacted by data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.