DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana covered entities discover that their documents storage and secure destruction vendor dumped records improperly

Posted on June 2, 2020 by Dissent

I know the arguments against holding covered entities for auditing and monitoring their business associates periodically for compliance with any contracts, but when you don’t hold covered entities really accountable for checking that their vendors or business associates are living up to their contracts, stuff like this happens.  And it can go on for years.

On May 28, St. Joseph Health System notified its patients of a data security incident involving Central Files, Inc:

Central Files, Inc. (“Central Files”) was entrusted to provide secure record storage and destruction, during the respective time periods below, for the following South Bend-area entities (the “South Bend Entities”) which publish this notice:

– Saint Joseph Health System (1999-2013)
– Allied Physicians of Michiana (1995-2007)
– New Avenues (June 2004-December 2015)
– South Bend Medical Foundation (2009-2015)
– Goshen Emergency Physicians, LLC / Elkhart Emergency Physicians, Inc. (2002-2010)
– Michiana Hematology Oncology (2002-2004)
– Cardiology Associates, Inc. (“CAI”) (March 1, 2007-November 30, 2013). CAI and its records were acquired by Beacon Health System in December 2013 and CAI was subsequently dissolved

The records entrusted to Central Files included sensitive and legally-protected information about these organizations’ patients, clients, and/or employees. Central Files was paid to destroy certain records, and was supposed to securely store the remaining records until transfer to a subsequent records storage company.

Between April 1 and April 9, 2020, the South Bend Entities were alerted that confidential documents which had been entrusted to Central Files for secure storage and destruction were discovered improperly dumped in an unsecure South Bend-area location sometime before April 1, 2020 and several more times until May 15, 2020.

So this wasn’t a one-off, it seems. But when did it start?  In 1995?  In 2019?  This year?  Did any of the entities ever go on site at Central Files to observe the secure storage they were paying for?  I’m not shaming them if they didn’t, because I’ve never been on-site at the firm that provides secure storage for my patient records. And while I observe secure shredding of some records, there are times when the firm shreds them there and sends me a certification that they were securely shredded. But do I really know for sure that happened? If I’m honest, then no, I don’t really know for sure.

h/t, Becker’s Hospital Review.  

Update/Note:  As Patrick points out in Comments, Central Files Inc. was sold in 2015. So who took responsibility for the transfer or the records and/or the disposal of the records then and since then?

notice-of-improper-disposal-of-records-incident-for-website-posting-052820
Category: Breach IncidentsCommentaries and AnalysesHealth DataOf NotePaperSubcontractor

Post navigation

← Agromart’s data up for auction while threat actors read — and publish — their victim’s emails about the attack
Judge Pushes Back Accused LinkedIn Hacker’s Trial One Last Time Over COVID-19 Concerns →

2 thoughts on “Indiana covered entities discover that their documents storage and secure destruction vendor dumped records improperly”

  1. Patrick says:
    June 2, 2020 at 5:01 pm

    This is strange. Central Files was acquired by another company in 2015. It doesn’t exist and hasn’t existed in five years. https://www.insideindianabusiness.com/story/30443127/major-records-storage-company-adds-south-bend-business

    It strikes me that these records were either not included in the acquisition for some reason (possibly because they we supposed to be destroyed) or the acquiring company missed a facility. I suspect that the storage location was abandoned and no one was in the building until it was scheduled for demolition or re-occupancy.

    That said, whoever was responsible for records at St. Joseph Health System has some explaining to do.

    1. Dissent says:
      June 2, 2020 at 8:16 pm

      Right. If you look at the dates in the notification, for each entity it shows that Central File’s arrangement/involvement ended in 2015. But what did Central Files tell its clients back in 2015, or what arrangements were made, and what did the covered entities require or do?

      And why, when you look up James Linder on LinkedIn, does it show he currently lists himself as CEO of Central Files, Inc., a position he has held since May, 1986?

      There’s a lot of explaining that needs to happen…. and I’ll be curious to see what, if anything, OCR does.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale
  • The Meta AI app is a privacy disaster – TechCrunch
  • Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
  • Norwegian Data Protection Authority’s findings on tracking pixels: 6 cases
  • Multiple States Enact Genetic Privacy Legislation in a Busy Start to 2025
  • Rules Proposed Under New Jersey Data Privacy Act
  • Using facial recognition? Three recent articles of interest.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.