DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Texas Health Resources notifying patients about incident in 2017 that affected multiple entities

Posted on April 14, 2018 by Dissent

Texas Health Resources is notifying fewer than 4,000 patients about an email incident last year. They were reportedly asked to delay notification for law enforcement purposes, and were told that this was part of a larger incident affecting multiple entities across the country. Now what larger incident would that be?

Texas Health Resources is committed to protecting the security and confidentiality of our patients’ information. Regrettably, this notice is about an incident involving some of that information.

On January 17, 2018, law enforcement advised us that an unauthorized third party may have gained access to some Texas Health email accounts in October 2017. Law enforcement indicated this was part of a larger incident affecting multiple entities across the country and did not just affect Texas Health entities and patients. They asked that we refrain from contacting our patients, so as not to impede the law enforcement investigation.

We respected law enforcement’s request and began our own internal investigation, including hiring a leading forensic firm to assist us.

The investigation determined that some patients’ information may have been in the affected email accounts, and may have included patients’ names, medical record numbers, dates of birth, addresses, insurance information, clinical information, and in some instances Social Security numbers and driver’s license and state identification numbers. Law enforcement has now indicated we could notify our patients regarding this incident.

This incident affected certain Texas Health patients that received care and treatment primarily in 2017.  It did not affect all Texas Health patients.

We have no indication that any information has been misused in any way. However, in an abundance of caution, we mailed letters to affected patients on April 13, 2018, and established a dedicated call center to answer any questions they may have. For those patients whose Social Security numbers were included, we are offering one year of free credit monitoring. We recommend affected patients review any statements they receive from their health insurer. If patients see charges for services they did not receive, please contact the insurer immediately. If you believe you are affected and have not received a letter by May 1, 2018, please call 855-331-3705, Monday through Friday, between 8 a.m. and 8 p.m. Central Time.

We deeply regret any inconvenience or concern this may cause our patients. To help prevent something like this from happening in the future, Texas Health is continuously working to implement safeguards and enhance information security monitoring.​​

Category: HackHealth Data

Post navigation

← College Consultants’ Client Information Was Exposed on Web Servers
Blue Shield of California notifies members of privacy breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.