DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PruittHealth Home Health – Low County notifies patients after office burglary

Posted on May 13, 2016 by Dissent

For the fourth time in less than three years, a PruittHealth entity has reported an incident to HHS that affected more than 500 patients. This time, it’s PruiittHealth Home – Low Country in South Carolina.  From their public notice:

Beaufort, South Carolina, April 8, 2016 – PruittHealth Home Health – Low Country, a provider of home health services in the Beaufort, South Carolina area, is committed to its patients’ privacy and to compliance with applicable federal and state regulations. The purpose of this notice is to comply with 45 C.F.R. § 164.406, which requires the notification of media outlets serving the State or jurisdiction of a breach of unsecured protected health information involving more than 500 residents of a State or jurisdiction.

On the night of March 2, 2016, the offices of PruittHealth Home Health – Low Country were broken into by thieves. The perpetrators broke the glass of the front door and entered the offices. Nothing was stolen but petty cash. The thieves had the opportunity to access all of the medical records kept in the office, although it does not appear that any medical records were taken or even disturbed. The types of personal information that could have been accessed include things like patient names, addresses, social security numbers, dates of birth, dates of service, location of service, and other clinical information. Again, there is no indication that any of this information was actually accessed by the perpetrators.

The Beaufort Police Department and PruittHealth’s Privacy Officer, Joan Chapman, were notified of the incident on March 3, 2016. PruittHealth Home Health – Low Country continues to cooperate fully with the Beaufort Police Department investigation to apprehend the perpetrators. PruittHealth Home Health – Low Country has safeguards in place to protect the privacy and security employee and patient information. As a result of this incident, we are taking additional steps to secure our office.

All potentially affected patients have been notified by PruittHealth’s Privacy Officer via notification letter by first class mail. This notice included detailed information on how to contact the major credit bureaus and place an alert or a security freeze on their credit files. The PruittHealth Privacy Officer is also available to call with questions related to the incident. Individuals may call (678) 533-6437 from 9:00 until 5:00 with questions or call toll-free at any time at 1-800-222-0321 and request a return call from the Privacy Officer.

So any risk assessment would likely put this at low-risk, and some may be wondering why PruittHealth even reported it, but for HITECH.  The incident was reported to HHS as impacting 1,500 and involving paper records.

 


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Health DataOtherU.S.

Post navigation

← Data breach affecting more than 50,000 reported by Medical Colleagues of Texas
IG Uncovers Data Breach at GSA’s 18F →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.