DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Healthcare Employee Indicted for Involvement in Stolen Identity Tax Refund Fraud Scheme and Unauthorized Disclosure of Patient Information

Posted on March 11, 2016 by Dissent

Another one of those all-too-infrequent criminal cases for violations of HIPAA, tacked on to the usual charges….

A Montgomery, Alabama resident self-surrendered earlier today after she was indicted March 3 on one count of multi-object conspiracy to commit identity theft and wire fraud, two counts of possessing 15 or more unauthorized access devices, two counts of aggravated identity theft and one count of wrongful disclosure of personally identifiable health information, announced Acting Assistant Attorney General Caroline D. Ciraolo of the Justice Department’s Tax Division and U.S. Attorney George L. Beck Jr., of the Middle District of Alabama.

According to court documents, Alana Wells worked at a healthcare company from June 2011 through August 2013, where she had access to patient information protected from disclosure under the Health Insurance Portability and Accountability Act of 1996.  She is alleged to have stolen the names, dates of birth and social security numbers of patients from her employer’s database and provided these identities to Fredrick Hill. Hill then provided the stolen personal identification information to Christopher Davis, who, along with others, used it to file fraudulent federal tax returns with the Internal Revenue Service (IRS) requesting tax refunds.

If convicted, Wells faces a statutory maximum sentence of five years in prison on the conspiracy charge, 10 years in prison for each count of access device fraud, one year in prison for the charge of wrongful disclosure of personally identifiable health information, and a mandatory minimum sentence of two years in prison for each count of aggravated identity theft, which will be in addition to any other term of imprisonment she receives.  She also faces substantial monetary penalties and restitution.

An indictment merely alleges that crimes have been committed.  Defendants are presumed innocent until proven guilty beyond a reasonable doubt.

Acting Assistant Attorney General Ciraolo and U.S. Attorney Beck commended special agents of IRS-Criminal Investigation, who investigated the case and Trial Attorneys Jason H. Poole, Kathryn A. Kimball and Michael C. Boteler of the Tax Division and Assistant U.S. Attorney Jonathan S. Ross of the Middle District of Alabama, who are prosecuting this case.

Additional information about the Tax Division and its enforcement efforts may be found on the division’s website.

SOURCE: Department of Justice

From online sources, it appears that Wells filed for bankruptcy in December, 2011. I can find nothing online freely available that would indicate where she worked.


Related:

  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
Category: Health DataID TheftInsiderTheftU.S.

Post navigation

← Another intriguing development concerning Tiversa, Inc.
And the phishes just keep on coming…. for your W-2 data →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.