DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Attorney for doctors in WDH privacy breach disputes AG's finding

Posted on December 19, 2009 by Dissent

Adam D. Krauss continues to update us on this case:

An attorney for two doctors impacted by the privacy breach at Wentworth-Douglass Hospital says the Office of the Attorney General would have found WDH had to notify patients if the state knew a rogue employee accessed patients’ social security numbers and sensitive insurance policy data.

Charles Grau, a Concord attorney representing Drs. Cheryl Moore and Glenn Littell, said the state based its review on a summary of the audit conducted after the 13-month breach without considering images of computer screens showing the specific data fields viewed by the ex-WDH employee.

The employee accessed more than 1,100 patients records on file at the hospital’s pathology lab about 1,800 times from May 2006 to June 2007 after she was transferred from the lab, the doctors say.

James Boffetti, who leads the AG’s consumer protection and antitrust bureau, said on Thursday that there was “insufficient information” to conclude the breach fits the definition of a security breach as defined by RSA 359-C: 19.

Read more on Fosters.com.

This case is raising a number of questions and is making WDH “look bad” in terms of not contacting patients or families of deceased patients. Even if one gives WDH the full benefit of any doubt as to their motives and determinations, I think this case is a useful reminder that “when in any doubt, notify.” Insider breaches are one of the biggest challenges in security. In this case, where there was no financial fraud, I still think it would have been best for the hospital to notify everyone, reassure them that they were not at any known risk of fraud (if that is a reasonable belief), that their records are being reviewed and corrected, and any other steps the hospital is taking to reduce the risk of a similar breach in the future.

If you give people information, don’t try to minimize, give them a phone number to call if they are concerned or have questions, and are responsive, a breach doesn’t have to leave your reputation damaged. In fact, as I commented about Johns Hopkins on a few occasions, their forthright handling of breaches may actually instill more trust in patients who know that if something happens, the hospital will be “up front” with them.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← AU: New privacy guidelines for health practitioners on disclosing genetic information
Apres le breach, yet another call for greater cooperation to fight data theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.