DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

In yet another long gap to notification, a covered entity notifies patients of a May 2021 cyberattack

Posted on July 19, 2022 by Dissent

On May 5, 2021, Benson Health in North Carolina (formerly known as Benson Area Medical Center) discovered that it was the target of a cyberattack. According to their notification dated July 7, 2022,  they immediately launched an investigation, engaged a law firm specializing in cybersecurity and data privacy, and engaged third-party forensic specialists to assist.

“That investigation identified a data set that may have been accessed by the unauthorized person,” they write, so they then “retained data mining experts to perform an extensive and comprehensive review of the data set and identify individuals whose personal information was in that data set.”

They did not say when the data set was first identified or when they first retained data mining experts, but the latter’s investigation reportedly concluded on June 7, 2022.

So more than one year after detecting an attack, Benson Health first learned who had protected health information possibly accessed?

DataBreaches was alerted to this breach notification by a reader, “Soap,” who commented that it “kind of really sucks to wait a year and two months to notify patients whose Social Security number and health information may have been accessed.”

DataBreaches agrees.

And wait for it, because here it comes:

At this time, Benson Health does not have any evidence to indicate that any of your personal information has been or will be misused as a result of this incident. Nevertheless, Benson Health decided to notify you of this incident out of an abundance of caution.

Was notification required by HIPAA, HITECH, or any state law(s)?

And if a purpose of notification is so that patients can take steps to protect themselves, then a gap to notification from detection of more than one year is not really acceptable or an “abundance of caution,” is it?

The concerns raised here are not specific to Benson Health. DataBreaches has been raising these issues for years and will continue to publicly urge HHS to enforce the regulations on timeframe to notify HHS and those affected or to seek their amendment if the regulations are unrealistic and are not going to be enforced.

 


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsCommentaries and AnalysesHealth DataU.S.

Post navigation

← BJC HealthCare settles class action litigation
Desorden is back, declares an attack on MISTINE Better Way Thailand Company →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.