DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Uncategorized

HHS corrects entry for LANAP & Implant Center breach

Posted on September 11, 2014 by Dissent

There’s been an interesting update to HHS’s breach tool for the entry concerning a breach reported by Dr. David DiGiallorenzo of the LANAP & Implant Center in Williamsport, Pennsylvania. I had first noted the breach in December 2013, and then provided an update here. When the breach was added to HHS’s breach tool, I noted the addition and commented on…

Read more

D&J Optical sues former employees for misappropriation of patient/proprietary information

Posted on September 11, 2014 by Dissent

D&J Optical in Alabama reported a breach to HHS that appears to have involved a hacking/IT incident on November 15, 2013. It is not clear when they first reported the breach to HHS, but it was only added to HHS’s breach tool on August 25. The incident reportedly affected 1,100 patients. In attempting to investigate the…

Read more

Midwest Women's Healthcare Specialists breach may have affected over 1,300 patients

Posted on September 11, 2014 by Dissent

HHS has added the May breach involving Midwest Women’s Healthcare Specialists in Missouri, where “dozens, possibly hundreds” of former patients’ records were found blowing in the wind outside Research Hospital. The HHS entry indicates that 1,376 patients were possibly affected and/or notified of   the improper disposal of their records.  

Read more

Update on Cottage Health System breach

Posted on September 11, 2014 by Dissent

In December 2013, I reported on a breach involving Cottage Health System. In their notification to patients, which I included in that post, Cottage Health indicated that about 32,500 patients had their information exposed when a vendor removed security controls on a server. That vendor was later identified as InSync. On September 4 of this year,…

Read more

HHS breach tool: When "theft" doesn't mean what you think it means

Posted on September 11, 2014 by Dissent

In May 2011, I noted a breach that had appeared on HHS’s public breach tool involving Community Action Partnership of Natrona County, WY. An update to that breach was added to the breach tool on September 3 that suggests that the original breach coding by the covered entity as “theft, desktop computer” could have misled some…

Read more

Investigation closed: Diversified Resources, Inc.

Posted on September 11, 2014 by Dissent

In October 2011, I noted that HHS had added an incident to the breach tool for which I could find no additional information: “Diversified Resources, Inc.”,GA, 863, 8/11/2011, Theft, Laptop On September 4, 2014, HHS added a summary to the entry, indicating that its investigation is now closed: “Diversified Resources, Inc.”,GA,””,863,08/11/2011,Theft,Laptop,09/04/2014,” A password protected, but…

Read more
  • Previous
  • 1
  • …
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • …
  • 412
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.