DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: EmCare Says Patient and Employee Personal Data Were Hacked

Posted on April 21, 2019 by Dissent

Jim Silver and Hailey Waller report:

EmCare Inc. recently learned an unauthorized party obtained access to a number of employees’ email accounts that contained the personal information of as many as 60,000 individuals, 31,000 of which are patients, the company said in an email.

On Feb. 19, the physician-services provider determined the accounts contained some patients’, employees’ and contractors’ personal information, including name, date of birth or age, and for some patients, clinical information. In some instances, Social Security and driver’s license numbers were affected, according to a company statement.

Read more on Bloomberg.

Comment: The text of EmCare’s press release appears below. I’ve emailed them to ask a few questions, including  when the breach occurred and when they first discovered that there had been an incident. I’ll update this post if I get a response. But it strikes me as somewhat absurd to provide false reassurances such as “There is no evidence to suggest that the information has been misused, or that anyone will attempt to misuse the information.” Well, maybe there’s no evidence that they’ve found that information has already been misused, but do they think attackers are just accessing or trying to access employee and patient data for the fun of it?  If you can’t tell whether the data was exfiltrated – or even accessed – then perhaps you shouldn’t be so quick to issue any reassurances.  This is one of those cases where it might be best to just say, “Despite our attempts to figure out what happened, we just don’t know, so take precautions.”


PLANTATION, Fla., April 20, 2019 /PRNewswire/ — EmCare, Inc. and its affiliates (EmCare) today announced that they are addressing a data security incident that involved the personal information of some patients, employees and contractors. EmCare has launched an internal investigation, notified individuals who may have been impacted and implemented additional security measures to prevent future occurrences.

EmCare recently became aware that an unauthorized third party obtained access to a number of EmCare employees’ email accounts. Upon learning of the incident, EmCare promptly launched a comprehensive investigation and obtained a leading forensic security firm to help determine the scope of the incident and those impacted. In addition, EmCare is taking measures to help prevent this type of incident from occurring in the future, including implementing advanced information technology (IT) solutions and providing all employees further training and reminders about email and IT security.

On Feb. 19, 2019, EmCare determined that the impacted email accounts contained some patients’, employees’ and contractors’ personal information, including name, date of birth or age, and for some patients, clinical information. In addition, in some instances, Social Security and driver’s license numbers were impacted.

There is no evidence to suggest that the information has been misused, or that anyone will attempt to misuse the information. In addition, EmCare is not aware of any individual who has been impacted by fraud or identity theft as a result and does not know if any personal information was actually obtained by an unauthorized party. For the subset of patients and employees whose Social Security or driver’s license numbers were impacted, EmCare has arranged for identity protection and credit monitoring services.

Beginning April 19, 2019, EmCare is sending written notification to all impacted individuals for whom it has contact information. If individuals did not receive written notification but have received care from a clinician employed by or engaged with EmCare and its affiliates or believe they could have been impacted, they can request information by calling the confidential inquiry line at 855.424.0467 between 9 a.m. and 9 p.m. Eastern time Monday through Friday. Additional information is available on www.EmCare.com.

Individuals should refer to the notice they received in the mail to learn how they can protect themselves against potential fraud and identity theft. As a precautionary measure, individuals should remain vigilant about opening suspicious emails and reviewing their account statements and credit reports. If unauthorized activity is suspected, they should promptly notify the financial institution or company with which the account is maintained and report the activity to the proper law enforcement authorities, including the police and their state’s attorney general.

The Federal Trade Commission offers additional information on fraud alerts, security freezes and ways to avoid identity theft. These can be found by visiting www.ftc.gov/idtheft, calling 1.877.438.4338 or sending a letter to:

Federal Trade Commission
600 Pennsylvania Avenue, NW
Washington, DC 20580

EmCare apologizes for any inconvenience or concern that this incident might cause. EmCare remains committed to providing patients the highest quality of care and working with healthcare partners to improve the health of communities.

Source: EmCare

Category: Breach IncidentsHackHealth Data

Post navigation

← United Way of the Big Bend investigates possible data security breach
Bodybuilding.com experiences data security incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.