DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana covered entities discover that their documents storage and secure destruction vendor dumped records improperly

Posted on June 2, 2020 by Dissent

I know the arguments against holding covered entities for auditing and monitoring their business associates periodically for compliance with any contracts, but when you don’t hold covered entities really accountable for checking that their vendors or business associates are living up to their contracts, stuff like this happens.  And it can go on for years.

On May 28, St. Joseph Health System notified its patients of a data security incident involving Central Files, Inc:

Central Files, Inc. (“Central Files”) was entrusted to provide secure record storage and destruction, during the respective time periods below, for the following South Bend-area entities (the “South Bend Entities”) which publish this notice:

– Saint Joseph Health System (1999-2013)
– Allied Physicians of Michiana (1995-2007)
– New Avenues (June 2004-December 2015)
– South Bend Medical Foundation (2009-2015)
– Goshen Emergency Physicians, LLC / Elkhart Emergency Physicians, Inc. (2002-2010)
– Michiana Hematology Oncology (2002-2004)
– Cardiology Associates, Inc. (“CAI”) (March 1, 2007-November 30, 2013). CAI and its records were acquired by Beacon Health System in December 2013 and CAI was subsequently dissolved

The records entrusted to Central Files included sensitive and legally-protected information about these organizations’ patients, clients, and/or employees. Central Files was paid to destroy certain records, and was supposed to securely store the remaining records until transfer to a subsequent records storage company.

Between April 1 and April 9, 2020, the South Bend Entities were alerted that confidential documents which had been entrusted to Central Files for secure storage and destruction were discovered improperly dumped in an unsecure South Bend-area location sometime before April 1, 2020 and several more times until May 15, 2020.

So this wasn’t a one-off, it seems. But when did it start?  In 1995?  In 2019?  This year?  Did any of the entities ever go on site at Central Files to observe the secure storage they were paying for?  I’m not shaming them if they didn’t, because I’ve never been on-site at the firm that provides secure storage for my patient records. And while I observe secure shredding of some records, there are times when the firm shreds them there and sends me a certification that they were securely shredded. But do I really know for sure that happened? If I’m honest, then no, I don’t really know for sure.

h/t, Becker’s Hospital Review.  

Update/Note:  As Patrick points out in Comments, Central Files Inc. was sold in 2015. So who took responsibility for the transfer or the records and/or the disposal of the records then and since then?

notice-of-improper-disposal-of-records-incident-for-website-posting-052820
Category: Breach IncidentsCommentaries and AnalysesHealth DataOf NotePaperSubcontractor

Post navigation

← Agromart’s data up for auction while threat actors read — and publish — their victim’s emails about the attack
Judge Pushes Back Accused LinkedIn Hacker’s Trial One Last Time Over COVID-19 Concerns →

2 thoughts on “Indiana covered entities discover that their documents storage and secure destruction vendor dumped records improperly”

  1. Patrick says:
    June 2, 2020 at 5:01 pm

    This is strange. Central Files was acquired by another company in 2015. It doesn’t exist and hasn’t existed in five years. https://www.insideindianabusiness.com/story/30443127/major-records-storage-company-adds-south-bend-business

    It strikes me that these records were either not included in the acquisition for some reason (possibly because they we supposed to be destroyed) or the acquiring company missed a facility. I suspect that the storage location was abandoned and no one was in the building until it was scheduled for demolition or re-occupancy.

    That said, whoever was responsible for records at St. Joseph Health System has some explaining to do.

    1. Dissent says:
      June 2, 2020 at 8:16 pm

      Right. If you look at the dates in the notification, for each entity it shows that Central File’s arrangement/involvement ended in 2015. But what did Central Files tell its clients back in 2015, or what arrangements were made, and what did the covered entities require or do?

      And why, when you look up James Linder on LinkedIn, does it show he currently lists himself as CEO of Central Files, Inc., a position he has held since May, 1986?

      There’s a lot of explaining that needs to happen…. and I’ll be curious to see what, if anything, OCR does.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.