DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Humboldt Independent Practice Association’s breach notification leaves questions unanswered

Posted on February 15, 2025 by Dissent

On November 11, 2024, Humboldt Independent Practice Association (Humboldt IPA) submitted a breach report to HHS that used a placeholder of 500 for the number of patients affected. All we knew from HHS’s entry was that it was some kind of hacking or IT incident involving protected health information located in email. The California entity’s submission to HHS also indicated they were reporting as a healthcare provider and that no business associate was involved.

On February 7, Humboldt IPA provided a substitute notice on its website. It begins:

Humboldt IPA is a third-party that administers health plans and healthcare services on behalf of providers. As such, Humboldt IPA received your PHI from one or more of those providers.

But they reported the incident to HHS as a provider and had indicated that no business associate was involved. That seems a bit confusing, doesn’t it?

According to their notice, on June 28, 2024, Humboldt became aware of a phishing campaign “designed to appear as a legitimate communication from one of our partners.” The campaign was apparently successful, with an unauthorized actor gaining access to a single email account between June 26, 2024 and July 1, 2024.

The email account contained protected health information (PHI) on an as-yet undisclosed number of patients. The types of information included first and last name, in combination with one or more of the following: contact information (such as mailing address, emergency contact information, email, telephone number); date of birth, driver’s license, medical diagnosis or condition; and health insurance information.

The full notice can be read at https://humboldtipa.com/wrd-prs/notice-of-data-breach/. Like the vast majority of notices, it states that they are not aware of any reports of identity fraud or fraudulent activity involving the information of affected patients as a result of the incident. It then describes what individuals can do to protect themselves and what Humboldt is offering in support.

But What Good Does a Substitute Notice Do in This Kind of  Situation?

When business associates make notifications on behalf of their clients — whether those clients be healthcare providers, businesses, schools, or any other entity — the recipient of the letter will generally not recognize the business associate’s name and will only recognize the name of the provider, business, or school that gave the business associate their information.

But in many cases, the business associate will not be able to find or obtain addresses for all those they are obligated to notify. In those cases, they may do what Humboldt IPA did — post a substitute notice on their website or a legal notice in local media.

Humboldt IPA’s subsitute notice says, “We were unable to locate all the addresses of the individuals whose information was involved. As a result, we are issuing this public notice to inform all potentially impacted individuals.”

But how would anyone know to look at their website or read their notice and  think it might apply to them if they didn’t already know that their provider uses that business associate? 

Even if there was a list of provider names on Humboldt’s notice (which there wasn’t), most people would not know to look at that notice.  So are all the providers also posting notices on their websites to alert patients or former patients of this incident? Should they be?


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsCommentaries and AnalysesHealth DataHIPAASubcontractorU.S.

Post navigation

← California Teenager Sentenced to 48 Months in Prison for Nationwide Swatting Spree
Elon Musk’s DOGE Posts Classified Data On Its New Website →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.