DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

(UPDATE 2 ): MO: Poplar Bluff Regional Medical Center notifying patients after tornado hits secure records service provider

Posted on April 25, 2020 by Dissent

I read relatively few reports of breaches due to weather-related events, floods, or fires, but when I do see them, I try to post them. This one involves a business associate that provides secure records services. A tornado struck their building in Tennessee on March 3.  The disaster impacted patients in Missouri. As Poplar Bluff Regional Medical Center explains in the notice on their website:

This notice provides information regarding a potential inappropriate disclosure of personal information due to a tornado that struck a building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee on March 3, 2020. STAT is based in Waupaca, Wisconsin and provides various secure record services to healthcare entities. Poplar Bluff Regional Medical Center contracts with STAT to scan paper documents into the hospital’s electronic medical record system and for secure destruction of records.

Regrettably, the records stored in the building damaged by the tornado contained medical records, which may have included personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications, and/or other types of information typically found in a medical record. As a result of the tornado, personal information may have been potentially exposed to others.

STAT immediately notified Poplar Bluff Regional Medical Center on March 3, 2020 of this incident. Hospital representatives visited the site right away and began working with STAT in the aftermath of the tornado to locate medical records, and to secure the remaining records on the site.

Poplar Bluff Regional Medical Center was able to confirm the majority of records remained in the remnants of the building. In an effort to prevent unauthorized access and disclosure of records involved, a tall fence was erected around the property and two security guards were posted 24 hours a day, seven days a week. The contents of the building remained secure while the recovery of records was assessed. All records that remained in the building were deemed unsalvageable and the records were securely destroyed.

At this time, Poplar Bluff Regional Medical Center has no evidence the information has been or will be used in a way that would cause financial harm. A letter will be mailed to individuals whose information may have been involved in the breach with information about how to enroll in credit monitoring services provided free of charge to potentially affected individuals.

We sincerely apologize for this incident and regret any inconvenience it may cause. Should you have questions or concerns regarding this matter, please do not hesitate to contact us at (855) 465-5157. For information on preventing identity theft or to report suspicious activity, contact the Federal Trade Commission at 1(877) 438-4338 or get free information at www.ftc.gov.


Update 1:  Bayfront Health Port Charlotte and Bayfront Health Punta Gorda in Florida have issued comparable statements to their patients about this incident. This incident is not on HHS’s breach tool as yet.

Update 2: Community Health Systems, which owns and Wilkes-Barre General Hospital and Moses Taylor Hospital in Scranton, Pennsylvania who were also affected by the incident. According to a media report, less than 2500 patients at both hospitals were impacted.

Category: Health DataLost or MissingPaperSubcontractorU.S.

Post navigation

← Mercy Health says nurse was fired for violating privacy of multiple patients not for talking to the media
South Korean and US payment card details worth nearly $2M up for sale in the underground →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.