DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

United Health Centers of the San Joaquin Valley reaches agreement to settle data breach litigation

Posted on October 12, 2022 by Dissent

The Business Journal reports:

A class action settlement has been reached in a lawsuit against United Health Centers of the San Joaquin Valley.

The case, pending in Fresno County Superior Court, stems from an Aug. 28, 2021 data breach where United Health Centers (UHC) patient information including birth dates, Social Security numbers, diagnosis information codes, financial account information and more was compromised by a third party.

The class-action complaint filed by Clovis resident and UHC patient Narek Avetisyan said the breach was caused by a ransomware attack by a cybergang called the Vice Society, believed to be based in Russia, according to public reporting from the cybersecurity community.

Read more at The Business Journal.

The notice of settlement, relevant documents, and instructions how to submit a claim can be found at the official settlement site: https://www.uhcofsjvdatabreach.com/. The site also provides information on the deadlines for submitting a claim or opting out of the settlement or objecting to it. In key part, the settlement provides the following benefits:

UHC will provide Settlement Class Members the following benefits under the Settlement: (1) the ability to immediately enroll in credit monitoring and identity restoration services for a period of three years (available to all persons potentially affected by the Data Security Incident, including persons who exclude themselves from the Settlement); (2) the opportunity for Non-Economic Loss claims of up to $500 per Settlement Class Member; and (3) reimbursement of documented Economic Losses up to $2,500.00 per Settlement Class Member, which: (a) are related to the Data Security Incident; (b) are not otherwise reimbursable by another third party; (c) are supported by required documentation; and (d) meets all requirements set forth in the Reimbursement Form and the Settlement Agreement.

Complete details regarding the Settlement benefits are available in the Settlement Agreement, which is available at www.UHCofSJVdatabreach.com.

Previous coverage of this incident on DataBreaches.net can be found at United Health Centers of San Joaquin Valley remains publicly silent after ransomware attack  and Three months after ransomware attack and two months after data was dumped, UHC has yet to notify patients in writing.

Category: Breach IncidentsMalwareU.S.

Post navigation

← Quarter of Healthcare Ransomware Victims Forced to Halt Operations – Report
Eventus WholeHealth notifies patients of breach →

2 thoughts on “United Health Centers of the San Joaquin Valley reaches agreement to settle data breach litigation”

  1. wenonah karen parker says:
    October 13, 2022 at 11:37 pm

    I am one of the people who has had my data stolen in this breach. I received a letter informing me I must submit a Claim Form available on this web site. I have found no such form. Please email me the claim form to my email.
    Thank you for your attention to this matter.
    Wenonah

    1. Dissent says:
      October 14, 2022 at 7:30 am

      It sounds like you read the letter incorrectly. To file a claim, you need to go to the official settlement site at https://www.uhcofsjvdatabreach.com/ and then follow their link to File a Claim.. None of those links have anything to do with this site (DataBreaches.net).

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)
  • RCMP thumb drive with informant, witness data obtained by criminals: watchdog

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Meta AI app is a privacy disaster – TechCrunch
  • Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
  • Norwegian Data Protection Authority’s findings on tracking pixels: 6 cases
  • Multiple States Enact Genetic Privacy Legislation in a Busy Start to 2025
  • Rules Proposed Under New Jersey Data Privacy Act
  • Using facial recognition? Three recent articles of interest.
  • India publishes consent management rules under Digital Personal Data Protection Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report