DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Doctor Who Stole Personal Information of Nearly 100,000 NRAD Associates Patients Arrested

Posted on December 4, 2014 by Dissent

There’s an update to the NRAD Associates breach (see also updates here).  From the Nassau County District Attorney’s Office today:

Nassau County, NY – December 4, 2014 – Nassau County District Attorney Kathleen Rice and the Nassau County Police Department announced the arrest of a Great Neck doctor responsible for stealing the protected personal and health information of tens of thousands of patients of NRAD Medical Associates, which has multiple locations in Nassau and Queens.

James Kessler, 38, was arrested today by the NCPD Crimes Against Property Squad and issued a Desk Appearance Ticket charging him with the following crimes:

  • Unauthorized Use of a Computer (an A misdemeanor)
  • Unlawful Duplication of Computer Related Material in the 2nd Degree (a B misdemeanor)
  • Petit Larceny (an A misdemeanor)

Kessler is due to appear in First District Court in Hempstead on Jan. 6, 2015 to be arraigned. If convicted of the top charge, he faces a maximum sentence of one year in jail.

“Physicians are regularly entrusted with the health and well-being of their patients, so the abuse of trust in this case is particularly outrageous,” DA Rice said. “New York State’s privacy and larceny statutes should be reformed so they can apply to more kinds of personally identifying information; in the meantime, my office will continue to work with partners like the NCPD to make the protection of personal data a priority and hold lawbreakers accountable for their actions.”

“Identity theft and theft of personal information is one of the greatest economic threats our citizens face,” Acting Police Commissioner Thomas Krumpter said. “The NCPD takes these crimes very seriously and works collaboratively with the DA’s office to ensure suspects are arrested and prosecuted.”

DA Rice said that between about Jan. 17 and April 24, Kessler, a radiologist employed at NRAD, improperly accessed the NRAD computer system and duplicated and possessed the protected personal and health information for 96,998 patients.

Upon discovering the breach in April, NRAD notified the U.S. Dept. of Health and Human Services as required by law and in June, sent notification letters to all of the patients affected stating that their protected information had been improperly accessed by one of NRAD’s physicians.

The case was referred to DA Rice’s office and the NCPD CAP Squad by patients who received NRAD’s letters. A joint investigation by DA Rice’s office and the CAP Squad revealed that in April, Kessler connected an external hard drive to his assigned NRAD computer and copied onto it patient information from the NRAD network.

A search warrant uncovered Kessler’s hard drive containing approximately 97,000 NRAD patient records, as well as NRAD patient billing system dates, NRAD corporate credit card information, corporate marketing materials, and NRAD IT information.

Despite stealing personal identifying information of approximately 97,000 patients, current New York State personal identification information statutes (Penal Law § 190.81-83) do not cover the information found to be in Kessler’s possession. The patient records consisted of personally identifying and medical information, but not financial information. Though there is no indication that Kessler used any of the information stolen to open accounts, make purchases, or obtain property in the names of NRAD patients, the victims of this identity theft were given the opportunity by NRAD to protect their credit.

Assistant District Attorney Diane Peress, chief of DA Rice’s Economic Crimes Bureau, and ADA Leemor Peled, are prosecuting the case. Kessler is represented by Elizabeth Kase, Esq.; John Kase, Esq.; and Michael Soshnick, Esq. NRAD is represented by the law firm of Ruskin Moscou Faltischek.

The charges are merely accusations and the defendant is presumed innocent until and unless found guilty.

This case points out the weakness in NYS’s statute, as he could only be charged with misdemeanors. And while we now know the date range for the breach, we still have no information on what his motivation was in copying the information.


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← Alleged Heartbleed hacker faces more charges in Canada Revenue Agency case
Banks: Credit Card Breach at Bebe Stores (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.