DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IA: Ottumwa dental office notifies patients of 2020 ransomware attack

Posted on January 28, 2022 by Dissent

The Ottuma Courier reports that a dental office is notifying patients whose information may have been exposed in a ransomware incident. They report, in part:

On Nov, 22, 2020, the office of Gregory P. Vannucci, a dental provider and oral surgeon, detected a network security incident affecting his practice. An unauthorized third-party accessed the network and encrypted the practice’s data. the office shut off all access to the network and engaged a cybersecurity firm to investigate the extent of incident.

[…]

GPV mailed letters to all impacted individuals on Jan. 18….

Read more at Ottumwa Courier.

More than one year after detecting an incident, patients have first been sent individual notifications.

The incident sounded familiar, though, and a little digging into it confirmed that this incident had been reported to HHS by Dr. Vannucci’s office on August 20, 2021 as impacting 26,144 patients.

So it took eight months from detection to notify HHS and then another six months to notify patients.

If this timeframe or delay in notification is okay, then Congress really needs to amend HIPAA and HITECH to eliminate the “no later than 60 calendar days” from discovery notification requirement.

And if it is not okay, then HHS really needs to start enforcing the timely notification requirement.

 

Category: Health DataMalwareU.S.

Post navigation

← QNAP users angry after NAS drives are updated to combat DeadBolt ransomware
UK: Data breach at Greensward Academy →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale
  • The Meta AI app is a privacy disaster – TechCrunch
  • Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
  • Norwegian Data Protection Authority’s findings on tracking pixels: 6 cases
  • Multiple States Enact Genetic Privacy Legislation in a Busy Start to 2025
  • Rules Proposed Under New Jersey Data Privacy Act
  • Using facial recognition? Three recent articles of interest.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.