DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BioTel Heart Notice of Breach of Personal Information

Posted on June 6, 2021 by Dissent

Cardiac biotelemetry firm BioTel seems to be issuing public notices about a data leak incident first reported on this site in August, 2020. The data were only secured when Amazon was contacted by a researcher and asked to reach out to their customer to secure the data. Neither BioTel nor its vendor had responded to attempts by the researcher or this site to notify them of the leak, and by three months later, still had not acknowledged notifications or any incident. In November, DataBreaches.net filed a watchdog complaint with HHS against both the covered entity and the business associate, still not knowing whose bucket it was.

BioTel disclosed the leak to patients and to HHS in March, claiming that they first discovered the breach in January (when they read this site’s August reporting on the incident).  Their notification indicated that they had terminated their relationship with the vendor, and it seemed clear that they were claiming that the vendor never notified them of the incident after discovering it in August.

To date, OCR’s investigation of the incident, which incorporates this site’s watchdog complaint  appears to still be open.

So did BioTel continue investigating and discover more patients who needed to be notified? It’s possible. There’s really nothing new in their latest public notice that appears below the separator.

As an update: DataBreaches.net never did hear back again from BioTel after their lawyer called this site in February to ask how we had attempted to notify them.


MALVERN, PA, June 2, 2021 – BioTel Heart (the “Company”), a division of BioTelemetry, Inc., has announced that on January 28, 2021, it learned that a vendor failed to secure certain patients’ personal information that was stored online. The Company immediately took steps to investigate and respond to the incident. The investigation revealed that the information involved may have been publicly accessible between October 17, 2019 and August 9, 2020. There is no evidence to date that the information has been misused as a result of this incident. The affected personal information may have included patient names, contact information, dates of birth, medical information relevant to remote cardiac monitoring services (including the name of the prescribing physician, and patients’ diagnoses, diagnostic tests, and treatment), and health insurance information. The records may have also included Social Security numbers, although the Company does not request or require Social Security numbers from the physicians who order its services. The Company notified all those affected patients for whom it had current contact information and arranged to provide identity protection services including credit monitoring at no charge to all affected patients for two years. Individuals who did not receive notification but believe their information may have been affected can call 855-654-0879 toll-free for additional information, Monday through Friday, 9:00 a.m. to 9:00 p.m. Eastern Time (closed on U.S. observed holidays). Published in The Gazette June 4, 2021

Update:  OCR eventually closed their investigation without any further action against the entity.  HHS’s public breach tool lists the incident as impacting 38,575 patients.


Related:

  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • Software companies must be held liable for British economic security, say MPs
  • SEC Voluntarily Dismisses SolarWinds Litigation
  • A Swath of Bank Customer Data Was Hacked. The F.B.I. Is Investigating.
  • Cyberattack disables Onsolve Code Red emergency alert system across St. Louis region (1)
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
Category: Breach IncidentsExposureHealth DataSubcontractorU.S.

Post navigation

← IA: Des Moines Area Community College investigating possible breach
Northwestern Illinois Area Agency on Aging notifyng clients of breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • UK Government Considers Computer Misuse Act Revision
  • Japan issues arrest warrant against teen suspected of cyberattack using AI
  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.