DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information

Posted on September 9, 2011 by Dissent

WISH reports:

The Indiana University School of Medicine is warning thousands of people that their medical records could have been breeched after someone stole a laptop back in August.

The medical school reports the laptop, stolen Aug. 16, contained records of 3,192 individuals that included name, age, sex, diagnosis, medical record number and in 178 cases, social security numbers.

Read more on WISH.

A notice on the school’s web site, linked from their home page states:

Notice on Possible Patient Record Breach

September 9, 2011

INDIANAPOLIS — On September 2, the Indiana University School of Medicine began sending letters to 3,192 individuals that the theft of a password-protected, computer laptop may have compromised their confidential patient information. The laptop, belonging to a physician in the school’s Department of Surgery, contained information, such as name, age, sex, diagnosis, medical record number, and in 178 instances, the individual’s Social Security number. The information was being used for research purposes.Although the laptop computer was password protected, there is a possibility that the information could be accessed by a computer specialist with enough time and resources.

The disappearance of the laptop, apparently stolen from the physician’s vehicle on Tuesday, August 16, 2011, was immediately reported to law enforcement.

The IU School of Medicine is providing detailed information to those who might be affected by this incident at medicine.iu.edu/research/media-alert-faqs/, including suggestions how affected individuals may protect themselves from the possible unauthorized use of their personal information.

The IU School of Medicine and the IU Department of Surgery deeply regret this incident and are taking steps and security measures to minimize the likelihood of future incidents.

So why wasn’t IU informed of the theft until more than two weeks later?  That’s not good.

According to the FAQ’s on the breach, the laptop held data on some patients going back to 1980, not all of whom may have been directly asked to permit their data to be used for research purposes.  I do not mention this to suggest that IU did anything illegal, but merely to note that some people may never have consented to the researcher having their name and other information.

IU acknowledged that errors were made:

… the computer laptop was password protected and stored behind a locked door – but it should have been stored using “encryption,” a process that makes it extremely difficult for a third person to see and/or the information should have been “de-identified,” a process that removes any way to link it to an individual.

While acknowledging that errors were made, I note that IU did not offer those affected any free credit monitoring services – even, apparently, the 178 individuals whose SSN were involved.

Category: Health Data

Post navigation

← TX: Methodist Hospital employee stole cancer patients' information for payday loan fraud
Indiana University School of Medicine notifies patients of stolen laptop containing personal and medical information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.