DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More than 2,000 veterans had their PHI breached in April

Posted on May 16, 2016 by Dissent

Another site that reports on health data breaches tends to report on VA breaches in terms of percentage change from the previous month. DataBreaches.net does not do that because, frankly, there’s no consistent pattern or trend, and month-to-month comparisons don’t strike this blogger as particularly useful. Consider the stats from the last three months’ reports:

February Summary:

  • 817 VETERANS AFFECTED
  • 572 Notifications
  • 245 Credit Protection Services Offered
  • Of the total # of Veterans affected, 707 were in relation to protected health information incidents, reported to HHS in accordance with the HITECH Act.

March Summary:

  • 522 VETERANS AFFECTED
  • 288 Notifications
  • 234 Credit Protection Services Offered
  • Of the total # of Veterans affected, 417 were in relation to protected health information incidents, reported to HHS in accordance with the HITECH Act.

 April Summary: 

  • 2,556 VETERANS AFFECTED
  • 1,690 Notifications
  • 866 Credit Protection Services Offered
  • Of the total # of Veterans affected, 2,105 were in relation to protected health information incidents, reported to HHS in accordance with the HITECH Act

As suggested above, April was not a great month for the VA when it comes to breaches involving PHI. Their monthly report to Congress included four incidents that each affected more than 50 veterans. And that’s in addition to other mis-mailing incidents, the mis-handling incidents, and the mis-mailed Consolidated Mail Outpatient Pharmacy (CMOP) incidents. The following is a summary of these four larger incidents reported in April. Note that none of them involved electronic records:

FT Harrison, Montana VA: Mishandling 

A Vocational Rehabilitation and Employment (VR&E) representative sent an unencrypted email to a Veteran with an attachment that contained 162 other Veterans names and SSNs. The email was sent to a yahoo.com account. The recipient agreed to delete the email attachment, and 162 veterans were sent a letter offering credit protection services.

Bay Pines, Florida VA: Mishandling

A VA lawn maintenance worker found a Housing and Urban Development Veterans Affairs Supportive Housing (HUD VASH) Veteran contact list with information on 103 veterans outside. The employee stated she took the documents out of the building at 2:00 PM and noticed they were gone at 3:30 PM. It remains unknown how long the documents were on the lawn. VA Police conducted an exterior search of all the parking lots around the building and the wood line on the southern edge with negative results of further documents in the area. 103 Veterans were sent a HIPAA notification letter, and a privacy violation memo was issued. Service Management will propose appropriate disciplinary action for the employee involved in the privacy violation and staff will be educated about unauthorized logbooks.

Hines, IL VA: Mishandling 

A Prosthetics Program Support Assistant (PSA) reported that a package full of approximately 235 patients’ home-oxygen information was mailed from Madison VA on March 25, 2016, via USPS and never arrived. The 235 Veterans were sent a HIPAA notification letter due to Protected Health Information (PHI) being disclosed.

Las Vegas, NV VA: Mishandling

An unknown employee removed documents pertaining to Claims not approved, TORTS, and Billing. onto a public highway and were collected by unknown citizen and turned in. Investigation revealed that the documents had been placed on the roof of the employee’s car and fell off when the employee drove off.

The Privacy Officer is not able to verify how long the information was missing. The documents involve 28 Veterans with full name, address, Date of Birth and gender. Other documents involve 84 Veterans with full name and claim numbers.

The documents were in a regular envelope and not the required red locked bags and located nowhere near a VA facility.  28 Veterans were sent a letter offering credit protection services. A HIPAA notification letter was sent to 84 Veterans.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Kaufman County's data breach was their second one in three weeks
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
Category: Breach IncidentsExposureGovernment SectorHealth DataLost or MissingPaper

Post navigation

← Was chatting about marijuana on TheTreesNetwork hazardous to your privacy?
Ukrainian hacker admits hacks of MarketWired, PRN, and Business Wire press releases for securities fraud scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.