DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

(UPDATE 2 ): MO: Poplar Bluff Regional Medical Center notifying patients after tornado hits secure records service provider

Posted on April 25, 2020 by Dissent

I read relatively few reports of breaches due to weather-related events, floods, or fires, but when I do see them, I try to post them. This one involves a business associate that provides secure records services. A tornado struck their building in Tennessee on March 3.  The disaster impacted patients in Missouri. As Poplar Bluff Regional Medical Center explains in the notice on their website:

This notice provides information regarding a potential inappropriate disclosure of personal information due to a tornado that struck a building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee on March 3, 2020. STAT is based in Waupaca, Wisconsin and provides various secure record services to healthcare entities. Poplar Bluff Regional Medical Center contracts with STAT to scan paper documents into the hospital’s electronic medical record system and for secure destruction of records.

Regrettably, the records stored in the building damaged by the tornado contained medical records, which may have included personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications, and/or other types of information typically found in a medical record. As a result of the tornado, personal information may have been potentially exposed to others.

STAT immediately notified Poplar Bluff Regional Medical Center on March 3, 2020 of this incident. Hospital representatives visited the site right away and began working with STAT in the aftermath of the tornado to locate medical records, and to secure the remaining records on the site.

Poplar Bluff Regional Medical Center was able to confirm the majority of records remained in the remnants of the building. In an effort to prevent unauthorized access and disclosure of records involved, a tall fence was erected around the property and two security guards were posted 24 hours a day, seven days a week. The contents of the building remained secure while the recovery of records was assessed. All records that remained in the building were deemed unsalvageable and the records were securely destroyed.

At this time, Poplar Bluff Regional Medical Center has no evidence the information has been or will be used in a way that would cause financial harm. A letter will be mailed to individuals whose information may have been involved in the breach with information about how to enroll in credit monitoring services provided free of charge to potentially affected individuals.

We sincerely apologize for this incident and regret any inconvenience it may cause. Should you have questions or concerns regarding this matter, please do not hesitate to contact us at (855) 465-5157. For information on preventing identity theft or to report suspicious activity, contact the Federal Trade Commission at 1(877) 438-4338 or get free information at www.ftc.gov.


Update 1:  Bayfront Health Port Charlotte and Bayfront Health Punta Gorda in Florida have issued comparable statements to their patients about this incident. This incident is not on HHS’s breach tool as yet.

Update 2: Community Health Systems, which owns and Wilkes-Barre General Hospital and Moses Taylor Hospital in Scranton, Pennsylvania who were also affected by the incident. According to a media report, less than 2500 patients at both hospitals were impacted.

Category: Health DataLost or MissingPaperSubcontractorU.S.

Post navigation

← Mercy Health says nurse was fired for violating privacy of multiple patients not for talking to the media
South Korean and US payment card details worth nearly $2M up for sale in the underground →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.