DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update: BioTel Heart notifies patients of vendor leak. Did vendor fail to notify them?

Posted on March 31, 2021 by Dissent

BioTel Logo

A cardiac monitoring firm is now notifying patients after a Google search on their name in January led them to an August, 2020 report on this site about a vendor’s leak. But why didn’t they know about it already from the vendor last year or from the notifications this site had sent them last year?

In August, 2020, DataBreaches.net reported on a data leak discovered by a researcher. The leaky Amazon s3 bucket appeared to be storing  files related to patients having cardiac diagnostic monitoring and evaluation. The files included medical histories, findings, and insurance billing documentation requests. They came from numerous medical providers.

The researcher shared the data with DataBreaches.net in an attempt to determine who owned the storage bucket. The files had some recurring names on them, but neither the researcher nor DataBreaches.net were ever able to conclusively determine who owned the bucket, although it appeared to be either BioTel Heart or HealthSplash/SplashRx. HealthSplash appeared to be involved in insurance billing somehow for BioTel Heart, but neither entity responded to multiple attempts by this site to contact them to alert them to the fact that ePHI was exposed and possibly had been exposed since 2019.

It was only with Amazon’s assistance that the researcher was able to get the bucket secured. As is their policy, however, Amazon never told the researcher who their client was — only that they contacted them to secure the bucket.

On August 9, the bucket was secured and DataBreaches.net reported on the leak shortly thereafter. But DataBreaches.net continued to try to contact the entities to inquire whether either was notifying regulators or patients.

Getting no answers and seeing no disclosures despite the fact that more than 3 months had passed since the bucket owner had been notified by Amazon and the bucket had been secured, DataBreaches.net filed a watchdog complaint against both entities with OCR in November.

On February 2, DataBreaches.net got a phone call from a lawyer for BioTel. He informed this site that they had just discovered this site’s  August, 2020 report about them having a leak and they were conducting an internal investigation to find out why they had known nothing about it until they came across this site’s reporting.  He wanted to know how this site had attempted to contact them, and this site wanted to know whether it was their bucket and why neither they nor HealthSplash/SplashRx had responded to multiple attempts to contact them.

He never got back to this site, so DataBreaches.net has no idea what their internal investigation revealed.

Yesterday,  a template of a notification letter to BioTel’s  patients was uploaded to the California Attorney General’s site (BioTel also does business as LifeWatch Services, Inc. and CardioNet LLC).  A copy of the notification is embedded below.

A few things jumped out at me:

  • In its March 26 notification, BioTel described the incident as “recent.”  This was not a “recent” incident. It began in 2019 and continued until August 9, 2020, as they note in their letter. Maybe they meant to say that it was not a recent incident but they only discovered it recently? They say that they discovered it on January 28, 2021.
  • Their “discovery” at the end of January is only because they didn’t read their email back in August of 2020 and thereafter when we repeatedly reached out to them. The notification makes no mention or admission of that.
  • The fact that they say the “discovered” the vendor’s leak in  January, 2021 seems to indicate that their vendor never informed them of the incident. If that’s true, it would appear to be a violation of HIPAA, and it is no surprise to read in the notification that BioTel has terminated its relationship with the vendor.  The notification never names the vendor.
Are you gambling with HIPAA compliance
If HealthSplash failed to notify BioTel, this overhead would be ironic.
  • But what did BioTel find out from the vendor other than date of exposure, types of data, and the identities of the patients affected? Did the vendor have access logs? BioTel claims that there is no evidence of misuse of the data (and they are offering complimentary monitoring/restoration services). But how many unauthorized IP addresses accessed the data?  How many downloaded it?
  • BioTel says it will require the vendor to securely delete all files after they securely provide them to BioTel. That seems prudent.

This incident is not yet up on HHS’s public breach tool. DataBreaches.net hopes that OCR does not just close its investigation just because BioTel has now disclosed. Something went wrong here and a thorough review of risk assessment, business associate agreements, security protections, and incident response seems in order.

DataBreaches.net reached out to HealthSplash to ask them whether they ever notified BioTel of the leak last August and whether they examined logs to determine how many unauthorized IP addresses may have accessed or downloaded data from the misconfigured bucket. No response has been received by publication time, but this post will be updated if a response is received.

Updated April 1: BioTel reported this incident to HHS as impacting 38,575 patients.

Correction: On April 7, after reviewing the storage bucket, DataBreaches.net edited this post to remove any claim that there were 60,000 patient records. That appeared to be an error in our original calculations, and we apologize for the error.

Sample BioTel Notice

 


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
Category: Breach IncidentsCommentaries and AnalysesOf Note

Post navigation

← Booking.com hit with €475K penalty for failing to report a breach within 72 hours
Update on education sector clients impacted by Blackbaud ransomware incident →

2 thoughts on “Update: BioTel Heart notifies patients of vendor leak. Did vendor fail to notify them?”

  1. Charles E. Gardner says:
    April 1, 2021 at 11:56 am

    Is the offer for identity protection legit. Should I register and give my personal information?

    1. Dissent says:
      April 1, 2021 at 2:17 pm

      If you got the letter from them, then the offer is legit. I can’t advise you whether to give out your personal info but the only way you can get the services is to provide some of your perosnal info.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.