DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Hunt Regional Medical Center Notifies Patients of Possible Breach Due to Hack of Employee Email

Posted on July 14, 2018 by Dissent

This breach notification is dated June 29, but just appeared on HHS’s breach tool today with that submission date to them.

Hunt Regional Medical Center Notifies Patients of Data Security Incident

page1image3960

Greenville – Hunt Memorial Hospital District (“Hunt”) has notified patients of a data security incident that took place last month.

On May 1, 2018, Hunt learned that an unauthorized user accessed its Home Health email system through the email account of an employee of Hunt Regional Home Health and sent an email to certain internal users of Hunt’s email system. Although email did not contain any patient protected health information, Hunt was unable to definitively rule out whether the unauthorized user otherwise accessed protected health information while in the system. By having access to the email system, it is possible that the unauthorized user could have had access to personal information of Hunt’s Home Health patients whose information was accessible by the Hunt employee whose email account was compromised. Hunt has reported this incident to the FBI and will fully cooperate with its investigation.

Hunt recently sent letters to those patients who may have been affected by this incident. Although there is no evidence indicating that patients are at risk for identity theft, the letters informed those patients that Hunt is offering them identity theft protection services through ID Experts® to provide them with MyIDCareTM. MyIDCare services include: Twelve months of credit monitoring, a $1,000,000 insurance reimbursement policy, exclusive educational materials, and fully managed ID theft recovery services. More information can be found in the letters provided to those patients who may have been affected.

A variety of administrative, physical, and technical security measures were in place prior to this incident. After the incident, Hunt has taken steps such as reviewing its policies and procedures and retraining our employees on the proper handling and protection of login credentials to prevent mistakes such as this from occurring in the future. Hunt continues to assess its privacy and security controls to prevent future breaches.

Hunt takes its patients’ privacy and the security of information very seriously and deeply regrets any inconvenience this incident may have caused. Patients should call (888) 813-7480 for assistance or with any additional questions.

Related posts:

  • TX: Hunt Memorial Hospital District notifies additional patients about May 2018 breach
Category: HackHealth Data

Post navigation

← Tennessee hospice notifying patients whose information was accessed after employees fell for phishing attacks
NJ: C-TEC: Student information may be impacted by data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.