DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Eight months after laptop theft, Oceans Acquisitions notifies patients

Posted on February 6, 2016 by Dissent

Strike 1: Storing PHI on inactive or terminated patients on a mobile device.
Strike 2: Leaving a laptop with unencrypted PHI in an unattended car.
Strike 3: Not knowing you had PHI on the stolen laptop.

If this was baseball, I’d call Oceans Acquisitions out. But it’s not, so…

As seen on TXheadlines.com: an explanation for the Oceans Acquisitions report to HHS. Apparently this is another case of a laptop with PHI being stolen from an employee’s car. Note that the theft was in April, 2015, but Oceans Acquisition did not realize the laptop contained PHI until “recently.” Again, as part of risk assessment and HIPAA compliance, entities need to know what data they are storing and where.

Notification of Potential Data Breach
In December 2015, Oceans Acquisitions, Inc. began notifying patients in the Abilene area about a possible data security breach that may have resulted in exposure of a limited amount of protected health information (PHI). The potential exposure occurred when a laptop was stolen from an employee’s car. The laptop stored emails that potentially contained PHI such as names, dates of birth, medical record numbers, diagnoses, payer information and admission dates. No patient social security numbers or bank account information was included in the emails. Upon learning PHI may have been present on the device, Oceans immediately took steps to identify the individuals with the potential to be impacted. Although the laptop was stolen April 9, 2015, only recently, during an unrelated systems review did Oceans learn the device contained PHI. In May 2015, Oceans validated that all portable devices and laptops have encryption technology active and in use. While there is no indication the personal information has been acquired or used, free identity protection resources are being provided to individuals who may have been impacted. Because it is possible the PHI contained on the laptops may have been improperly accessed, federal and state law requires Oceans to notify potentially affected patients of this incident. This notice in print media is being provided as notification to individuals for whom Oceans has out-of-date contact information and therefore cannot be notified via letter. If you believe you have been affected, you should review your credit reports for accounts or creditor inquiries that you do not recognize. Individuals who believe they may have been impacted or who have questions can call a dedicated toll-free help line at (877) 747-5168.
Location: ReporterNews.com | Publication date: 02/05/16
According to their report to HHS, 659 patients were affected.

No related posts.

Category: Health DataTheftU.S.

Post navigation

← Gyft Notifies Affected Users of Security Incident
LabMD’s answering brief captures how ridiculous FTC’s case was, and is →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.