DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HealthCare Partners Notifies Patients of Breach of Unsecured Personal Information

Posted on June 9, 2011 by Dissent

From their press release, dated June 3:

HealthCare Partners notified 15,727 patients of a breach of unsecured personal patient protected health information after discovering, on Monday, April 18, 2011, the theft of nineteen new computers from the medical group’s offices at 675 Arroyo Parkway in Pasadena and at 2600 Redondo Avenue in Long Beach. HealthCare Partners immediately notified the local police departments at both locations.

Some of HealthCare Partners’ patients’ medical information was stored on those computers, including names, addresses, birth dates, medical record numbers, health plan ID numbers, and treating physician names, as well as information about diagnoses, treatment plans, progress notes, prescriptions, referrals, and authorizations. The thieves also stole a safe from the Redondo Avenue office containing 16 checks written by patients to HealthCare Partners and credit card receipts for 60 patients. The credit card receipts did not include full credit card numbers.

HealthCare Partners believes that the risk of harm to these patients is low because the police investigation and HealthCare Partners’ investigation of the incident indicate that the items were stolen for their monetary value and not for the information on them. Nonetheless, in an abundance of caution, the notice HealthCare Partners has sent to the affected patients includes detailed information about identity theft protection, including precautions to minimize the risk of inappropriate use of the information.

HealthCare Partners is also offering an identity protection service from an outside vendor at no cost. The service, which includes $1,000,000 identity theft insurance coverage and fraud resolution services, will monitor credit and provide credit alerts by telephone. It also includes special services to detect fraud against children. The identity protection service will be valid for one (1) year from the date patients register.

HealthCare Partners, in conjunction with local law enforcement, is continuing to diligently investigate this crime and to pursue recovery of the stolen items. HealthCare Partners implements comprehensive security measures and policies to prevent the loss of private data including encrypting laptop disk drives, Internet firewalls, and secure data transmissions to partners. HealthCare Partners will take additional steps to protect the privacy and security of its patients’ health information against physical theft as occurred in this incident.

HealthCare Partners has trained staff available for patients to call with any questions related to the data breach. Patients may call 877.427.9288, Monday-Friday, from 8 am to 5 pm Pacific Time, with questions about this incident. In addition, patients may visit the HealthCare Partners website at www.HealthCarePartners.com for further information.

“HealthCare Partners understands the importance of safeguarding our patients’ personal information and takes that responsibility very seriously,” said Robert Margolis, MD, HealthCare Partners Chairman and CEO. “We will do all we can to work with our patients whose personal information may have been compromised to help minimize any potential impact of this situation on them. We regret that this incident has occurred, and we are committed to preventing such occurrences in the future. We appreciate the support and understanding our patients have shown at this time.”

Comment: I really, really hate these self-serving risk assessment statements and “abundance of caution” claims entities make in breach notices. Regardless of how low they think the risk is, they could be wrong. Statements such as the ones made in this press release are self-serving and may decrease the individual’s likelihood of taking steps to protect themselves. Could entities be right in hypothesizing that the theft is opportunistic for the value of hardware? Sure. But we’ve already seen cases in which such statements were made and people did access and misuse the data. Just tell people what happened and what they can do to protect themselves, please.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsHealth DataTheftU.S.

Post navigation

← (update) The number of credit card fraud victims linked to Murphy Oil gas station climbs
VA Caribbean Healthcare System to Provide Free Credit Monitoring to Veterans →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.