DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Fresno physician notifying patients after office burglary

Posted on August 3, 2015 by Dissent

Lawyers for Olartino Dyoco, M.D., a physician in California, are notifying his patients that some of their information was on computers stolen during an office burglary. The burglary was discovered on June 2. The stored billing information included:

Names and addresses,  birth dates, telephone numbers, insurance numbers, treatment codes, and billing information”

The incident was reported to the Fresno Police Department; their report number 15-38894.

The notification letter, a copy of which was submitted to the California Attorney General’s Office, makes a somewhat interesting claim, however:

The circumstances that resulted in this breach were unforeseeable,

Why?

In any event, according to his lawyers, Dr. Dyoco

has heightened procedures and safeguards to prevent a recurrence of this situation. He added levels of encryption to his computer systems, and advised his staff with regard to security training anything to avoid this situation in the future.

“Added levels of encryption?” Was there any encryption at all? If there was encryption but it was not NIST-grade, then he would have had to report this, but it’s not clear from the letter whether there was any encryption to begin with.

Patients (or their parents) having questions can call the doctor’s lawyer, Christian Koster, of Schuering Zimmerman & Doyle, LLP, at the toll-free number provided in the notification letter.

Comment:

All in all, this letter would have come across much better, in my opinion, if it had been written as coming directly from the doctor, with an apology coming directly from him for the inconvenience and worry his patients may now experience. What do you think?

 


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Health DataTheftU.S.

Post navigation

← Tremco, Inc. notifying employees about lost laptop
IL: Batavia Container sues former employee for trade secrets theft →

2 thoughts on “Fresno physician notifying patients after office burglary”

  1. Leighann Ford says:
    August 4, 2015 at 10:37 am

    I also found the “heightened procedures and safeguards” interesting. With the exception of requiring employees to take laptops home each night or lock them to their desk, how would Security Training prevent a burglary in the future?

    And shouldn’t credit monitoring have been mentioned since billing info was potentially accessed?

    1. Dissent says:
      August 4, 2015 at 12:30 pm

      Credit monitoring isn’t necessary unless SSN are involved. If it’s card numbers/bank acct numbers that were stored, then just call the bank and alert them so they can cancel the acct and reissue new number, or they can flag the account to watch for suspicious activities.

      That said, it would have been helpful for the notification to indicate what types of billing info were involved and to advise patients more specifically as to what steps to take.

      Also, what about the risk of medical identity theft if insurance numbers were stored with names and DOB? Where’s the mitigation/advice for that risk?

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.