DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NE: Complete Family Medicine advises patients of burglary

Posted on April 30, 2018 by Dissent

From their public notice:

On March 1, 2018, the offices of Complete Family Medicine, LLC were burglarized. Later the same day, Complete Family Medicine discovered that the perpetrators stole numerous items including a computer component of a medical device used to conduct EKGs and uncashed patient checks that were stored in a locked safe. Law enforcement was notified and immediately began an investigation. Some, but not all, of the checks were later recovered. To date, the computer has not been recovered.

The stolen computer contained information about patients who had an EKG performed at Complete Family Medicine including first and last names, dates of birth, and EKG images. Information on the computer did not include financial information, social security numbers, or patient addresses. The stolen checks contained information including first and last name, address, and bank account information.

Complete Family Medicine has sent letters to all impacted individuals for whom the practice has valid addresses by U.S. mail. The letters contain important information about steps individuals can take to prevent medical identity theft or fraud. Complete Family Medicine recommends the following actions as good practice for individuals concerned about misuse of their health care information:

  • Closely monitor any Explanation of Benefits or EOB sent by an insurance company other entity that pays medical bills and contact your health care provider if anything looks suspicious.
  • Request a copy of current medical records from each health care provider and report any errors or suspicious information.
  • Request an accounting of disclosures which lists the times health information has been shared for certain activities.

For those individuals whose bank account information was involved, Complete Family Medicine has arranged for a one-year enrollment in an online credit monitoring service (myTrueIdentity) provided by TransUnion Interactive, a subsidiary of TransUnion, one of the three nationwide credit reporting companies. Instructions on how to enroll in this free service are included in the letters sent to affected individuals whose bank account information was compromised.

To learn whether your information was included in the breach or to ask questions, please contact the Complete Family Medicine office manager, Lisa Ackerman, by phone at 308-696-2273 or by e-mail at [email protected]. Due to the nature of the incident and to further mitigate risk to patients, callers will be asked to provide additional identifiers so that Complete Family Medicine can accurately verify a callers identity.

Complete Family Medicine is reviewing its policies and procedures to determine if any changes are necessary to its physical security or how information is maintained. We deeply regret any inconvenience this incident may have caused patients and their families.

Published in the North Platte Telegraph North Platte, Nebraska April 28, 2018 May 1, 2018.

Category: Health DataPaperTheftU.S.

Post navigation

← A former hacker reveals what he’s learned about cybersecurity
Supreme Court to rule in Google referrer header privacy settlement case →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Lower Merion School District says a data breach was caused by a computer glitch
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.