DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Confluence Health discloses patient data breach after employee email account hacked

Posted on July 28, 2018 by Dissent

Jefferson Robbins reports:

Confidential patient information may have been released in an email breach at Confluence Health, the Wenatchee medical organization said in a Saturday press statement.

The information contained in an employee’s breached email account may have included “some patient information” including name and treatment, the press release said, but no financial information was believed to be at risk.

Read more on iFiberOne.

On July 27, Confluence Health published a statement on its web site:

SUBSTITUTE NOTIFICATION

July 27, 2018

Confluence Health values the privacy and confidentiality of our patients’ information. Regrettably, an incident may have involved some of that information.

On May 29, 2018, we learned that an unauthorized person may have gained access to an employee’s email account on March 30 and May 28, 2018. We immediately began an investigation, including hiring a leading third-party forensic firm to assist us. Our investigation determined that some patient information may have been included in the email account, including name and treatment information. No financial information was contained in the email account.

We have no indication that any information has been misused. However, out of an abundance of caution, we are notifying affected patients about this incident and provide assurances that we take it very seriously. We recommend that patients review statements received related to their healthcare, and contact their provider if they see services they did not receive.

Despite having security measures in place and maintaining a routine training program for our staff, this incident still occurred and we deeply regret any concern or inconvenience this incident may cause our patients. To help prevent something like this from happening in the future, we have taken numerous measures to heighten security around our email system and increased monitoring of our network for suspicious activity. For questions, please contact 1-877-341-4604, Monday through Friday, 6 a.m. to 6 p.m. Pacific Time.

Thank you,

 

Debby Andruss

HIPAA Privacy Officer


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: HackHealth DataU.S.

Post navigation

← TRAI Chief Tweets His UIDAI Number as a Security Challenge, and Promptly Gets Massively Pwned by @fs0c131y
Mumbai: Ransomware hits Dadar CA’s office, demands payment in bitcoins for decryption →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Gates Down: Third Circuit Says Breaking Employer Computer Access Policies Is Not Hacking
  • Short-term renewal of cyber information sharing law appears in bill to end shutdown
  • Yanluowang ransomware IAB pleads guilty
  • Lawsuit Alleges Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
  • HIPAA, but for non-Covered Entities?
  • Manassas City Public Schools close on Monday due to cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.