DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Late notification raises questions about a US Radiology Specialists breach last year

Posted on September 9, 2022 by Dissent

As keen eyes have noticed, two radiology services — Gateway Diagnostic Imaging in Texas and Radiology Ltd in Arizona — recently submitted breach notices to the Montana Attorney General’s Office. Both notices reported an incident in December 2021. But were these separate incidents, or were they both the result of a third-party breach?

Both Gateway Diagnostic Imaging and Radiology Ltd. are partners of US Radiology Specialists, who notified HHS in February of an incident that impacted 87,552 patients.

But on whose behalf did US Radiology Specialists report to HHS?  In January, Touchstone Medical Imaging had reportedly acknowledged system outages in December. Was the US Radiology Specialists’ report to HHS in February for them of was it on behalf of all of affected covered entities or just some?

DataBreaches’ searches found that several US Radiology Specialists’ “partners” have reported the December 2021 incident but could not find indications that all of them had.

The following partners did disclose a December incident, but DataBreaches did not find any reports by them on HHS’s public breach tool:
Charlotte Radiology, Touchstone Medical Imaging, Radiology Ltd, and Gateway Diagnostic.  It’s possible, therefore, that the US Radiology Specialists report in February was for all of them.

DataBreaches could not find any notification letters nor submissions to HHS from the following:
Diversified Radiology,  American Health Imaging, Upstate Carolina Radiology, Windsong Radiology, South Jersey Radiology Associates, and Larchmont Imaging Associates.

US Radiology Specialists is a business associate. Did their incident also impact these other providers? Are there others not on this list who were also affected? And how many patients were affected in total?

And why would Gateway Diagnostic and Radiology Ltd. submit notifications to Montana now? Was that late reporting, or had they first discovered Montana residents who needed to be notified?

From some of the descriptions, it is not clear whether this was a ransomware attack on US Radiology Specialists and at least one entity was not answering specific questions. The types of patient information that may have been acquired included names and one or more of the following: address, date of birth, health insurance information, medical record number, patient account number, physician name, date(s) of service, diagnosis and/or treatment information related to radiology services. For some patients, Social Security numbers were contained in the documents involved.

DataBreaches sent an inquiry to US Radiology Specialists seeking clarification on the incident and additional details. No reply has been received.

Update 1: No reply has been received, but DataBreaches has found more information that suggests that the 87,552 report to HHS by US Radiology Specialists in February may have only been for Touchstone Imaging. Specifically:

Gateway Diagnostics reported to the Texas Attorney General’s Office that 240,673 Texans were impacted by a breach; and

American Health Imaging, whose website links to US Radiology Specialists, reported to the Texas Attorney General’s Office that 21,003 Texans were impacted by a breach

And if three radiology groups issued notifications this week related to an incident last December, will we see even more? And then why is notification so late?

No related posts.

Category: Commentaries and AnalysesHealth DataU.S.

Post navigation

← Indonesian Expert on Major Data Leaks: Baby Boomers Should Not Manage Crucial Data
LEAK: European Commission to introduce cyber requirements for Internet of Things products →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.