DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: Three Sentenced in Orange County Health Department Identity Theft Scheme (update 1)

Posted on March 4, 2014 by Dissent

There’s a follow-up to a breach noted previously on this blog:

U.S. District Judge Roy B. Dalton, Jr. sentenced Delray Duncan, Gerald Williams, and Shanterica Smith to federal prison yesterday for identity theft. Specifically, the court sentenced Duncan to 42 months in federal prison, Williams to 54 months in federal prison, and Smith to 60 months in federal prison. All three were also ordered to pay restitution in the amount of $1 million. Each previously pleaded guilty for their roles in this case.

According to court documents, the Internal Revenue Service, the Federal Bureau of Investigation, and the United States Postal Inspection Service initiated an investigation after the Orange County Sheriff’s Office executed an unrelated search warrant and discovered a list of names, dates of birth, and Social Security numbers. Further investigation revealed that Williams and Smith worked at the Orange County Health Department (OCHD). Williams and Smith accessed personal identifying information (PII) of OCHD patients and provided that information to a third party who filed fraudulent tax returns in the names of those patients. Williams and Smith did not know each other while working at OCHD but ultimately provided the information to the same person. Williams provided the PII to Duncan who, in turn, provided the PII to others in order to file the fraudulent tax returns. Smith provided the PII directly to those responsible for filing fraudulent tax returns.

In total, Williams and Smith stole the identities of approximately 2,200 patients. Fraudulent tax returns totaling approximately $3.9 million were filed using the stolen PII. The investigation into those responsible for filing the fraudulent tax returns and those who obtained the proceeds from the fraudulently filed returns is ongoing.

This case was investigated by the Internal Revenue Service-Criminal Investigation, the Federal Bureau of Investigation, and the United States Postal Inspection Service. It was prosecuted by Assistant United States Attorney Shawn P. Napier.

SOURCE: U.S. Attorney’s Office, Middle District of Florida

Come to think of it, why haven’t we ever seen this on HHS’s public breach tool?  Time to email HHS again, I guess…

Updated March 26: I received a response to my inquiry to HHS, who confirmed that this breach was reported to them in December 2013, and they were working to correct the public breach tool. The Florida Dept. of Health had announced the breach publicly on October 30, right after being informed by law enforcement.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← Faxes containing patient data breached from Roper Hospital (Updated)
Ca: Privacy breach at London Shoppers Drug Mart stuns customer →

1 thought on “FL: Three Sentenced in Orange County Health Department Identity Theft Scheme (update 1)”

  1. Anonymous says:
    March 5, 2014 at 7:13 pm

    Thank you for sharing.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.