DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Belden issues substitute notice for November, 2020 breach

Posted on July 3, 2021 by Dissent

In November, 2020, networking equipment vendor Belden revealed that they had been the victim of a cyberattack. DataBreaches.net noted it at the time, but did not realize any protected health information was involved until  April, 2021, when Belden notified HHS that protected health information they maintained as part of their health plan had been potentially impacted for 6,348 individuals.

This week, Belden published a substitute notice that provided more details and informed people impacted by the breach what they could do to protect themselves. Their substitute notice of July 2 begins:

What happened?

On the evening of November 12, 2020, Belden IT professionals detected unusual activity involving certain company servers. We immediately triggered our cybersecurity incident response plan, deployed teams of internal IT specialists, and engaged leading third-party cybersecurity forensic experts and other advisors to identify the scope of the incident and move quickly to mitigate the impact. Forensics experts determined that we were the target of a sophisticated attack by a party outside the company.  On or about November 15, 2020, we learned that the outside party accessed servers that contained personal information of some current and former employees.  We subsequently learned that our servers also contained some health-related information of some current and former employees, as well as some personal and health-related information of some spouses, dependents, and relatives of some current and former employees.

What information was involved?

For affected individuals, the personal and health-related information involved in this incident may have included names, birthdates, government-issued identification numbers (for example, social security number), bank account information (for North American employees on Belden payroll), home addresses, email addresses, other general employment-related information (for Belden employees), gender, and benefits information, such as UMI (member) number, group number, coverage category, primary source of coverage, the effective date of that coverage, any additional sources of coverage, the effective date of additional coverages, their relationship to a Belden employee, and other benefits information. For individuals involved in a workers’ compensation claim associated with Belden, the personal and health-related information may have also included some information about their injury. For Belden personnel in insurance claims dispute discussions, the information about them may have included diagnosis and treatment information related to the claim.  Otherwise, Belden personnel do not have access to individuals’ diagnosis and treatment information.

What we are doing?

While our investigation continues, we believe that we have stopped further unauthorized access of personal data on our servers. We are also working with regulatory and law enforcement officials, including the F.B.I. and Department of Homeland Security, to investigate the matter and have engaged legal counsel to help us notify appropriate regulatory authorities.  In addition, we are continuously monitoring for any suspicious activity on our systems and have deployed additional resources to reinforce the security of our systems.

To help relieve concerns and attempt to mitigate the consequences of this incident on affected individuals, where available and legally permissible we are offering a complimentary twenty-four month membership of Experian IdentityWorksSM Credit 3B to individuals whose data was potentially impacted by this incident. If you are interested in obtaining this service, please contact us using the methods provided below and, if we are able to verify that you were a potentially affected individual, we will provide instructions on how to enroll in the Experian IdentityWorksSM Credit 3B product. This product helps detect possible misuse of your personal information and provides you with identity protection services focused on immediate identification and resolution of identity theft.

What you can do?

If you think that you may have been impacted by this incident, you may contact us at 1-833-971-3268, Monday through Friday from 8:00 a.m. to 5:30 p.m. Central Time or at [email protected].  Please also review the enclosed “Additional Resources” section below. This section describes additional steps you can take to help protect yourself, including recommendations by the Federal Trade Commission regarding identity theft protection and details on how to place a fraud alert or a security freeze on your credit file.

Protecting your information is important to us. We trust that the services we are offering to you demonstrate our continued commitment to your security and satisfaction.

The remainder of the substitute notice can be found here.

The notice makes no specific mention of HHS or HIPAA, and it’s not clear whether their substitute notice at this time is purely voluntary on their part, on the advice of counsel, or if HHS pushed them to do a notice that would be compliant with HITECH and HIPAA requirements. In either event, It seems that seven months after they first detected a breach, the firm is first offering some mitigation services to some of its workforce or their dependents. Will that persuade people of their commitment to security and satisfaction?  Hopefully there has been no misuse of any information that may have been acquired by the unnamed threat actors.

No related posts.

Category: Business SectorHealth DataU.S.

Post navigation

← Blackbaud must face data breach claims over 2020 ransomware attack
Suspected voters list leak in Kerala: Crime branch registers case →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.