DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

No need to hack if it’s leaking, Wednesday edition: Wyoming Department of Health

Posted on April 28, 2021 by Dissent

From the Wyoming Department of Health, a report involving another GitHub leak:

Exposure of Laboratory Test Result Data Described

April 27, 2021

The Wyoming Department of Health (WDH) is announcing a mistaken exposure of laboratory test result data involving the health information of thousands of Wyoming residents and others, as well as describing its plan to respond.

The department became aware of a breach involving protected health information on March 10, 2021. It was discovered a workforce member inappropriately handled the health information of approximately 164,021 Wyoming residents and others as early as November 5, 2020.

The incident involves an unintentional exposure of 53 files containing COVID-19 and influenza test result data and one file containing breath alcohol test results. These files were mistakenly uploaded by a WDH Public Health Division workforce member to private and public online storage locations, known as repositories, on servers belonging to GitHub.com.

GitHub is an internet-based software development platform typically used for version control and code management while writing code for data models. This incident did not result from a compromise of GitHub or its systems. While GitHub.com has privacy and security policies and procedures in place regarding the use of data on their platform, the mistakes made by the WDH employee still allowed the information to be exposed.

The information was also unintentionally disclosed, meaning it was made available to individuals who were not authorized to receive it, on GitHub’s public site as early as January 8, 2021.

The exposed health information included COVID-19 tests that were electronically reported to the WDH for Wyoming residents, including name or patient id, address, date of birth, test results and dates of service. These COVID-19 tests could have been performed anywhere in the United States between January 2020 to March 2021.

Michael Ceballos, WDH director, said, “While WDH staff intended to use this software service only for code storage and maintenance rather than to maintain files containing health information, a significant and very unfortunate error was made when the test result data was also uploaded to GitHub.com.”

“We are taking this situation very seriously and extend a sincere apology to anyone affected. We are committed to being open about the situation and to offering our help,” Ceballos said.

Ceballos noted the affected files did NOT contain social security numbers, or banking, financial or health insurance information.

WDH started sending notices to potentially affected individuals yesterday. However, contact information was unfortunately incomplete for many others.

A special WDH information line dedicated to the situation has been established at 1(833) 847-5916. The phone line will be available Monday through Friday, 9 a.m. to 7 p.m. through August 6.

Wyoming residents who received COVID-19 or influenza tests anywhere in the United States between January 2020 and March 9, 2021 but who do not receive a written notice within the next two weeks should call the information line to learn if their information was involved. In addition, anyone who received a breath alcohol test performed by law enforcement in Wyoming between April 19, 2012 and January 27, 2021 who doesn’t receive a letter should also call.

“We recognize maintaining personal information privacy is important. Because we want to be extra cautious about this situation, we are offering affected individuals one year of free identity theft protection through IdentityForce,” said Jeri Hendricks, Office of Privacy, Security and Contracts administrator with WDH.

IdentityForce provides advanced credit and dark web monitoring, along with identity theft insurance and medical identity theft coverage. To take advantage of the offer, affected individuals can call the WDH information line at 1(833) 847-5916 for an IdentityForce verification code to allow online enrollment for the service.

“Because we are committed to the privacy and security of individuals’ protected health information, we have taken steps to help prevent further harm from this situation or similar circumstances from happening again,” Hendricks said. “Files have been removed from the GitHub repositories and GitHub has destroyed any dangling data from their servers. Business practices have been revised to include prohibiting the use of GitHub or other public repositories and employees have been retrained.”

Hendricks noted WDH always recommends the following steps to help prevent information-related harm:

  • Carefully read medical providers’ notices of privacy practices
  • Regularly request and maintain copies of health information
  • Monitor health information for accuracy, and request an amendment if incorrect
  • Request an accounting of disclosures from medical providers, especially if information is potentially being used or disclosed inappropriately
  • If necessary, request restrictions of health information uses and disclosures

Hendricks said appropriate corrective action has been taken and the WDH Office of Privacy, Security and Contract’s (OPSC) investigation of this incident is complete. An official WDH notice about the situation can be found online at https://health.wyo.gov/admin/privacy/.

Category: ExposureGovernment SectorHealth DataU.S.

Post navigation

← Ransomware gang targets Microsoft SharePoint servers
Maine government website displayed mental health patients’ confidential information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.