DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana covered entities discover that their documents storage and secure destruction vendor dumped records improperly

Posted on June 2, 2020 by Dissent

I know the arguments against holding covered entities for auditing and monitoring their business associates periodically for compliance with any contracts, but when you don’t hold covered entities really accountable for checking that their vendors or business associates are living up to their contracts, stuff like this happens.  And it can go on for years.

On May 28, St. Joseph Health System notified its patients of a data security incident involving Central Files, Inc:

Central Files, Inc. (“Central Files”) was entrusted to provide secure record storage and destruction, during the respective time periods below, for the following South Bend-area entities (the “South Bend Entities”) which publish this notice:

– Saint Joseph Health System (1999-2013)
– Allied Physicians of Michiana (1995-2007)
– New Avenues (June 2004-December 2015)
– South Bend Medical Foundation (2009-2015)
– Goshen Emergency Physicians, LLC / Elkhart Emergency Physicians, Inc. (2002-2010)
– Michiana Hematology Oncology (2002-2004)
– Cardiology Associates, Inc. (“CAI”) (March 1, 2007-November 30, 2013). CAI and its records were acquired by Beacon Health System in December 2013 and CAI was subsequently dissolved

The records entrusted to Central Files included sensitive and legally-protected information about these organizations’ patients, clients, and/or employees. Central Files was paid to destroy certain records, and was supposed to securely store the remaining records until transfer to a subsequent records storage company.

Between April 1 and April 9, 2020, the South Bend Entities were alerted that confidential documents which had been entrusted to Central Files for secure storage and destruction were discovered improperly dumped in an unsecure South Bend-area location sometime before April 1, 2020 and several more times until May 15, 2020.

So this wasn’t a one-off, it seems. But when did it start?  In 1995?  In 2019?  This year?  Did any of the entities ever go on site at Central Files to observe the secure storage they were paying for?  I’m not shaming them if they didn’t, because I’ve never been on-site at the firm that provides secure storage for my patient records. And while I observe secure shredding of some records, there are times when the firm shreds them there and sends me a certification that they were securely shredded. But do I really know for sure that happened? If I’m honest, then no, I don’t really know for sure.

h/t, Becker’s Hospital Review.  

Update/Note:  As Patrick points out in Comments, Central Files Inc. was sold in 2015. So who took responsibility for the transfer or the records and/or the disposal of the records then and since then?

notice-of-improper-disposal-of-records-incident-for-website-posting-052820

Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
Category: Breach IncidentsCommentaries and AnalysesHealth DataOf NotePaperSubcontractor

Post navigation

← Agromart’s data up for auction while threat actors read — and publish — their victim’s emails about the attack
Judge Pushes Back Accused LinkedIn Hacker’s Trial One Last Time Over COVID-19 Concerns →

2 thoughts on “Indiana covered entities discover that their documents storage and secure destruction vendor dumped records improperly”

  1. Patrick says:
    June 2, 2020 at 5:01 pm

    This is strange. Central Files was acquired by another company in 2015. It doesn’t exist and hasn’t existed in five years. https://www.insideindianabusiness.com/story/30443127/major-records-storage-company-adds-south-bend-business

    It strikes me that these records were either not included in the acquisition for some reason (possibly because they we supposed to be destroyed) or the acquiring company missed a facility. I suspect that the storage location was abandoned and no one was in the building until it was scheduled for demolition or re-occupancy.

    That said, whoever was responsible for records at St. Joseph Health System has some explaining to do.

    1. Dissent says:
      June 2, 2020 at 8:16 pm

      Right. If you look at the dates in the notification, for each entity it shows that Central File’s arrangement/involvement ended in 2015. But what did Central Files tell its clients back in 2015, or what arrangements were made, and what did the covered entities require or do?

      And why, when you look up James Linder on LinkedIn, does it show he currently lists himself as CEO of Central Files, Inc., a position he has held since May, 1986?

      There’s a lot of explaining that needs to happen…. and I’ll be curious to see what, if anything, OCR does.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.