DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

In a year of supply-chain attacks, do you have your business associate agreements in place?

Posted on March 2, 2021 by Dissent

I recently came across a breach report that is a useful reminder of the value of ensuring that  business associate agreements (BAA) are in place, and that compliance with the agreements is assessed regularly.

In this instance Humana, a health plan, reported that on December 22, they were notified by a business associate that an employee of the business associate’s subcontractor had engaged in wrongdoing with some members’ protected health information.

Specifically, Humana uses a business associate for risk management, Cotiviti. Cotiviti, in turn, utilizes a subcontractor, Visionary.

In December, Cotiviti learned that a Visionary employee had been misusing Humana members’ protected health information to train unauthorized individuals how to do risk adjustment coding (this employee had his own business as a sideline). While the employee was authorized to access and use the data for Humana purposes, they disclosed the information to unauthorized individuals through a personal Google Drive account. The misuse of members’ medical records occurred from October 12, 2020 through December 16, 2020. When Visionary discovered the misuse, they notified Cotiviti, who in turn, notified Humana on December 22.

Humana notified 985 members in Washington state and Montana; the total number of affected members was not reported in the notifications DataBreaches.net saw. I expect we’ll eventually see a total number on HHS’s public breach tool for this incident.

Humana did not indicate how Visionary first became aware of their employee’s wrongdoing.

In response to the incident, Humana offered those affected two years of credit monitoring and identity theft protection.

In addition to other steps the firms have taken to strengthen protections and to prevent a future incident of this kind,  both Visionary and Cotiviti launched a comprehensive investigation into the incident and hired cybersecurity firms to assist in the efforts.

Updated March 6, 2021:  WLIX is reporting that Humana is notifying approximately 65,000 members of this incident. The incident is not yet up on HHS’s public breach tool.

 


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
Category: Health DataSubcontractorU.S.

Post navigation

← European e-ticketing platform Ticketcounter extorted in data breach
Updating the Maze attack on Fairfax County Public Schools →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.