DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Arkansas Methodist Medical Center Notification of Technology Management Resources Security Incide

Posted on October 29, 2020 by Dissent

Note: the following is a press release from AMMC. DataBreaches.net reached out to Technology Management Resources, but has received no reply by publication time. This post will be updated if a reply is received.

Arkansas Methodist Medical Center (“AMMC”) has a lockbox service with IBERIABANK for collecting and processing payments from our patients and/or customers. IBERIABANK uses Technology Management Resources, Inc. (TMR) as a third‐party lockbox service provider to process payments and capture pertinent payment data for items received in the lockbox. On July 3, 2020, TMR discovered that a TMR employee’s user account had been compromised. AMMC was notified of this incident on August 24, 2020 and has been actively seeking information regarding the incident to be able to provide this notice.

Upon discovery of the incident, TMR reported that they secured the account and began an investigation in consultation with external cybersecurity professionals. TMR has stated that their investigation determined that the threat actor may have viewed images of checks and related images containing potential Protected Health Information (PHI) related to customers of Arkansas Methodist Medical Center. According to TMR, the threat actor activity occurred between August 5, 2018 and May 31, 2020, with the bulk of the activity occurring between February and May 2020. TMR notified the FBI of this incident.

What information was involved?

According to TMR, their investigation concluded that the threat actor potentially viewed images within TMR’s iRemit application that may have PHI. The information contained on these images may have included your name, address, checking account number and routing number (as found on personal checks) and information on billing statements, submitted with your payment, such as your AMMC account number.

What is the Company doing in response?

We take the privacy and security of personal information very seriously. As part of our ongoing commitment to information privacy and the security of information, and although this incident in no way involved AMMC’s nor IBERIABANK’s internal security or computer systems, as a professional courtesy, IBERIABANK is offering affected individuals credit monitoring and identity theft protection through CyberScout in order to give peace of mind.

TMR reports that they have taken several corrective actions to remediate the security incident, prevent a further security incident, and mitigate the effects of the security incident. According to TMR, TMR credentials have been reset or deactivated (as applicable). TMR also reports that they implemented additional rules in their firewall to more tightly control the ability to access the iRemit website from other countries, among other steps taken.

What you can do.

As a best practice, we encourage our customers to remain vigilant against incidents of identity theft and fraud, to review financial account statements and claims information from your health insurance provider, and to monitor credit reports for suspicious activity. Any suspicious activity or suspected identity theft should be reported to us and to the proper law enforcement authorities.

For more information.

To verify and obtain additional information regarding whether your information was potentially affected by this incident, please call 1‐888‐905‐0513, toll‐free, Monday through Friday, 9:00 am – 9:00 pm Eastern Time. We apologize for any inconvenience this Technology Management Resources security incident may have caused.

Source: AMMC

No related posts.

Category: Breach IncidentsHealth DataSubcontractorU.S.

Post navigation

← Taiwan’s UMC pleads guilty, fined $60 mln in trade secret theft case
College Community School District notifies parents of Medicaid billing service breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.