DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Family Practice Center discloses a breach from October 2021

Posted on July 9, 2022 by Dissent

DataBreaches really and truly does not understand how entities can take so long to investigate some breaches before disclosing them.  If HHS feels that seven months from the first detection of an attack to notification is reasonable or acceptable, then let it change the regulations. If it is not acceptable and HHS wants entities to…

Read more

Associated Eye Care Partners, LLC discloses vendor breach. Can you guess which vendor?

Posted on July 9, 2022 by Dissent

One of the breach notices that showed up in routine searches this morning was from Associated Eye Care Partners, LLC (“AEC”). The first sentence of the notification letter was: We are contacting you to inform you of a data incident experienced by a third-party vendor for Associated Eye Care Partners, LLC (“AEC”).   My mind…

Read more

Bits ‘n pieces, Saturday edition

Posted on July 9, 2022 by Dissent

The following are four more incident reports DataBreaches has noted. It is not yet clear whether some of them involve patient data or not. CAROLINA BEHAVIORAL HEALTH ALLIANCE in North Carolina has been notifying law enforcement, state regulators, and patients about a ransomware attack they detected on March 20, the day after it began. Covered…

Read more

NY: Mattituck School District targeted in ransomware attack Wednesday

Posted on July 8, 2022 by Dissent

Melissa Azofeifa and Joe Werkmeister report: The Mattituck-Cutchogue School District was the latest Long Island district to be the target of a ransomware attack. Superintendent Shawn Petretti issued a statement Friday saying an investigation into the attack is in its early stages. From the district’s statement: “On Wednesday, July 6, our school district became the…

Read more

WY: Former Employee Inappropriately Accessed Cheyenne Regional Medical Center Patient Health Records

Posted on July 8, 2022 by Dissent

Phoenixville Hospital was just one of two reports this week involving employees behaving badly by accessing patient files without a legitimate purpose. On July 6, Cheyenne Regional Medical Center in Wyoming revealed that a former employee had inappropriately accessed several patients’ personal health records between August 31, 2020, and May 26, 2022. In this case,…

Read more

PA: Phoenixville Hospital notifying patients after discovering improper EMR access by employee

Posted on July 8, 2022 by Dissent

Despite employers’ best efforts, some employees will just continue to try to snoop in patient files. This time, a covered entity discovered the wrongdoing via their own internal monitoring. Phoenixville Hospital, operated by Tower Health, reports that a recent review detected that an employee had accessed a patient’s electronic medical records (EMR) without any apparent…

Read more
  • Previous
  • 1
  • …
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • …
  • 1,914
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.