DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WA: Social Security Numbers of 20,000 Swedish Med. Ctr. employees exposed on the web for 9 weeks

Posted on July 20, 2011 by Dissent

Carol M. Ostrom reports:

Swedish Medical Center is alerting nearly 20,000 current and former employees that their personal information — including Social Security numbers — was accidentally made accessible on the Internet for a nine-week period.

Read more on Seattle Times.

A notice to employees, on an internal page of the medical center’s web site reads:

July 20, 2011
Notice: Accidental Disclosure of Employee Data

SEATTLE, July 20, 2011 – Swedish today announced that it has begun notifying 19,799 current and former employees that some of their personal information was inadvertently made accessible from the Internet for a nine-week period between mid-April 2011 and June 17, 2011. The disclosed information included first and last names and Social Security numbers.

Affected individuals include some, but not all, employees who worked at Swedish during all or part of the following years: 1994, 1995, 2002, 2003, 2004 and 2006. It does not affect employees who worked for Swedish Physician Division during that time period.

There is no evidence that any data has been used for identity theft or other illicit purposes. In addition, the information is no longer accessible online, as it was immediately removed upon learning of the accidental disclosure. Swedish is taking measures to support the affected individuals, including engaging an experienced firm specializing in personal data security to assist the individuals at no charge.

Swedish has contracted with Kroll, Inc., the world’s leading risk consulting company, to provide affected individuals free access to its ID TheftSmart™ service via packets mailed to them. Swedish leaders are encouraging the affected individuals to be vigilant and to contact Kroll if they notice any unusual activity.

“We take our responsibility to protect employee information very seriously,” emphasizes Joanne Suffis, Swedish vice president of Human Resources. “This incident was highly unusual, and we sincerely apologize for any concern or inconvenience it may cause current and former staff members and their families.”

Swedish has not used Social Security numbers as the employee ID since 2004 and has policies on employee use of Swedish information systems and remote access. Additional staff education is being conducted and further measures are being deployed to help prevent future occurrences.

“While it may be impossible for any large organization to completely eliminate mistakes like this, we are taking all necessary steps to review and strengthen internal procedures to ensure Swedish provides the highest level of employee data security,” says Suffis.

Estimated delivery date of letters to affected individuals is between Friday, July 22 and Monday, July 25. Swedish has established a phone line through Kroll. Anyone with questions is welcome to call 1-855-294-2544. Thank you for your patience.

Category: Breach IncidentsExposureHealth DataU.S.

Post navigation

← (Follow-up) Doctor named and blamed for patient files found in Regina dumpster; Dickson recommends prosecution
(Update) Yellowstone County website hack did expose personal information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.