DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Proliance Surgeons, Inc. Notifies Customers of Data Security Incident

Posted on December 23, 2020 by Dissent

Why are they calling them “customers” and not “patients?”  I’m confused by this press release, below. Were these payment cards the patients’ payment cards/payment info? If so, it’s still protected health information of patients.  I’ve reached out to the entity to request clarification. Update: A spokesperson says that the payment cards were not the patients’ but family members or others making payments, so that this is not a HIPAA situation. 


SEATTLE, Dec. 23, 2020 /PRNewswire/ — Proliance Surgeons, Inc. (“Proliance”) recently detected a data security incident affecting its corporate website. Proliance immediately worked to contain the incident, launched an investigation, and engaged an industry leading digital forensics firm to assist. The investigation determined that payment card information may have been exposed for customers who made payments through Proliance’s online payment platform between November 13, 2019 and June 24, 2020. The information involved in this incident may have included cardholder name, payment card account number, expiration date, and zip code. Only payments made online were at risk; in-person or phone payments were not affected.

Proliance has coordinated with all major payment card brands so steps could be taken to prevent fraudulent activity on any affected cards.

Patient health care information was not affected by this incident. Aside from payment card information, no sensitive personal information or protected health information was exposed.

In coordination with the digital forensics firm, Proliance was able to swiftly identify the source of the incident and ensure that its online payment platform has been secured. Proliance has also launched a brand new website and payment platform with enhanced security measures to prevent similar incidents in the future.

Proliance encourages potentially affected customers to carefully review and monitor their payment card account statements. If a customer believes a payment card may have been affected, the customer should immediately contact the bank or card issuer.

About Proliance: Proliance is a surgical practice headquartered in Seattle, Washington, that provides treatment at care centers across Washington State.

SOURCE Proliance Surgeons, Inc.

Related posts:

  • Proliance Surgeons notifying 437,392 patients after ransomware attack earlier this year
Category: HackHealth DataU.S.

Post navigation

← CT: Attorney General Tong Resolves Data Breach Investigation of Sabre Hospitality Solutions
Cyberattack on the website of the European Court of Human Rights →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.