DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

In yet another long gap to notification, a covered entity notifies patients of a May 2021 cyberattack

Posted on July 19, 2022 by Dissent

On May 5, 2021, Benson Health in North Carolina (formerly known as Benson Area Medical Center) discovered that it was the target of a cyberattack. According to their notification dated July 7, 2022,  they immediately launched an investigation, engaged a law firm specializing in cybersecurity and data privacy, and engaged third-party forensic specialists to assist.

“That investigation identified a data set that may have been accessed by the unauthorized person,” they write, so they then “retained data mining experts to perform an extensive and comprehensive review of the data set and identify individuals whose personal information was in that data set.”

They did not say when the data set was first identified or when they first retained data mining experts, but the latter’s investigation reportedly concluded on June 7, 2022.

So more than one year after detecting an attack, Benson Health first learned who had protected health information possibly accessed?

DataBreaches was alerted to this breach notification by a reader, “Soap,” who commented that it “kind of really sucks to wait a year and two months to notify patients whose Social Security number and health information may have been accessed.”

DataBreaches agrees.

And wait for it, because here it comes:

At this time, Benson Health does not have any evidence to indicate that any of your personal information has been or will be misused as a result of this incident. Nevertheless, Benson Health decided to notify you of this incident out of an abundance of caution.

Was notification required by HIPAA, HITECH, or any state law(s)?

And if a purpose of notification is so that patients can take steps to protect themselves, then a gap to notification from detection of more than one year is not really acceptable or an “abundance of caution,” is it?

The concerns raised here are not specific to Benson Health. DataBreaches has been raising these issues for years and will continue to publicly urge HHS to enforce the regulations on timeframe to notify HHS and those affected or to seek their amendment if the regulations are unrealistic and are not going to be enforced.

 


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsCommentaries and AnalysesHealth DataU.S.

Post navigation

← BJC HealthCare settles class action litigation
Desorden is back, declares an attack on MISTINE Better Way Thailand Company →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.