DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stolen flash drive compromises 2,374 Oneida Tribe of Indians of Wisconsin dental patients’ information

Posted on April 23, 2016 by Dissent

Akanksha Jayanthi reports that Oneida Health Center in Wisconsin has reported a data breach after a flash drive containing details of patients’ dental information was stolen.

The health center, which serves a federally recognized tribe of Onedia people in the Oneida Nation, reported the theft to law enforcement Feb. 17, the same day the flash drive was stolen. The flash drive has not been recovered.

This incident was reported to HHS on April 15th as “Oneida Tribe of Indians of Wisconsin.” A notice in the official newspaper for the tribe reads:

The Oneida Nation is providing this public notification in compliance with federal law. On February 17, 2016 a flash drive containing the limited details of dental patient information was internally stolen from our dental offices at the Oneida Health Center located at 525 Airport Drive, on the Oneida Reservation.

The theft was discovered the same day and law enforcement was immediately notified. Since that time, the police and internal investigation have been ongoing. Although law enforcement investigated the situation, the flash drive has not been recovered.

It has been determined that the flash drive contained the following limited dental information for 2700 patients seen between 02/07/15 through 02/17/16:

Name
Dental patient identification number
Date(s) of visited (between the above dates)
Dental insurance identification number, if applicable.

Although the dental information taken was extremely limited and there is no information to suggest it was used or disclosed for inappropriate purposes, there are various steps affected individuals (and the public, generally) are able to take to protect themselves from medical identity theft, or identify theft:

Various warning signs of identity theft and steps to take if information is lost/ stolen is located at: https://www.identitytheft.gov/;

The warning signs for medical identity theft are also located at: https://www.consumer.ftc.gov/articles/0171-medical-identity-theft.

We recommend affected individuals notify their dental insurance company, if applicable, of this incident because the dental insurance identification number was involved. Dental Insurers may be able to place the identification number on a list of compromised numbers, etc.

If affected individuals have broader concerns regarding their information, they may also contact one of the three major credit bureaus (below) to place a fraud alert on their credit report. Once one credit bureau confirms the fraud alert, the other two credit bureaus will automatically be notified to place alerts. All three reports will be sent free of charge:

Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA, 30374-0241

Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 9532, Allen, TX 75013

TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790

Affected individuals and the general public are reminded of the importance of safeguarding personal information in all forms of media and to use diligence if receiving inquiries requesting personal information.

To prevent a reoccurrence of this type of isolated internal incident, we are implementing the following measures: Reviewing and implementing administrative procedures regarding the use of flash drives and implementing appropriate technological safeguards concerning their security and storage.

Notification in accordance with federal law has been provided to affected individuals. Throughout the entire investigation, there has been no information developed to suggest that our patient dental information was used or disclosed for inappropriate purposes.

Please note- this isolated incident did not involve any other personal identifying data, financial information, social security information, claims information, or any other diagnosis/ treatment information. The information taken was limited to very specific dental information and did not involve information from any other departments within the Oneida Health Center. If you feel you may have been affected by this incident and have questions or concerns, please contact Dave Larson, Director of Ancillary Services, at (920)869-2711 or email [email protected] at your earliest convenience.


Related:

  • Pro-Russian hackers target Belgian telecom websites in DDoS attack
  • Nevada Refused to Pay Cyberattack Ransom as Systems Sat Compromised for Months
  • Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says
  • Two years after an audit highlighted significant concerns, North Salem Central School District leaves sensitive student data at risk
  • University of Pennsylvania says it wasn't hacked after a vulgar email was sent to campus community. They were wrong (1)
  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
Category: Health DataTheftU.S.

Post navigation

← Tampa International Airport infosecurity breach spurred probe
COMELEC hacking should be treated as a serious national security problem →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.