DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Health Data

Omnicell databreach affects over 8,500 patients in New Jersey

Posted on January 2, 2013 by Dissent

And yet another organization — South Jersey Healthcare — has come forward to say that their patients were affected by the Omnicell breach discussed previously on this blog. According to The Daily Journal, 8,555 of their patients were affected. Interestingly, The Daily Journal describes the device as a laptop. All other coverage has been silent…

Read more

Update on Omnicell stolen device breach: 56,000 Sentara patients impacted

Posted on January 2, 2013 by Dissent

When an electronic device with unencrypted patient information was stolen from the unattended vehicle of an Omnicell employee, the University of Michigan Health System notified 3,997 of their patients, but there were other hospitals that were not named at the time. Thanks to WVEC, we now know 56,000 Sentara Healthcare patients  treated between Oct. 18 and…

Read more

HHS announces first HIPAA breach settlement involving less than 500 patients

Posted on January 2, 2013 by Dissent

I was hoping we’d get more information about this settlement and now HHS has provided it. As I had suspected, the Hospice of North Idaho breach affected fewer than 500 patients.  And as a commenter suggested, the fine was because they had no risk analysis nor policies for mobile device security. From HHS’s press release:…

Read more

Reducing insider breaches – what works?

Posted on January 2, 2013 by Dissent

Over the past year, I’ve had the opportunity to talk to a number of people in different organizations who are concerned with insider breaches in the health care sector.  One of those people is Kurt Long, CEO and Founder of FairWarning, a firm that provides patient privacy monitoring (privacy breach detection) systems. So, here’s a…

Read more

Gibson General Hospital notifies 29,000 patients after laptop stolen from an employee's home

Posted on December 28, 2012 by Dissent

Brad Conaway reports that Gibson General Hospital has mailed letters to 29,000 patients informing them that their name, address, Social Security number and/or clinical information may have been on a laptop stolen from an employee’s home on November 27. Unfortunately, as the hospital explains in its statement and FAQ, the hospital cannot determine with any…

Read more

Brigham and Women’s Hospital statement regarding the theft of a computer

Posted on December 28, 2012 by Dissent

I recently noted that HHS’s breach tool had revealed some breaches we hadn’t known about.  One of them was from Brigham & Women’s Hospital in Massachusetts.  I contacted them to request a copy of their statement or press release, and was told that because there were less than 500 patients affected in Massachusetts, they had…

Read more
  • Previous
  • 1
  • …
  • 930
  • 931
  • 932
  • 933
  • 934
  • 935
  • 936
  • …
  • 1,424
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.