DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

ZOLL notifying 277,319 patients of vendor data exposure incident

Posted on March 20, 2019 by Dissent

ZOLL Medical Corporation, an Asahi Kasei Group Company, develops and markets medical devices and software solutions. A press release on March 18 described an incident that impacted what they describe as “some patients’ personal and medical information.”

On January 24, 2019,  ZOLL discovered that some email archived by an unnamed third-party service provider had been exposed during a server migration. The vendor believes that the exposure occurred between November 8, 2018 and December 28, 2018.

At this point, ZOLL is not aware of any fraud or identity theft to any individual as a result of this exposure. The vendor has since confirmed that all information has now been secured.

Information that may have been exposed includes patient names, addresses, dates of birth, and limited medical information. A small percentage of patients also had Social Security numbers exposed.

ZOLL takes the privacy and security of patient information very seriously. Upon learning of the incident, ZOLL immediately initiated an internal review and retained a leading independent forensics firm to conduct a thorough investigation of the incident. Law enforcement and federal and state agencies have been notified to give them the opportunity to further investigate.

Further, ZOLL is taking steps to review its process for managing third party vendors and confirmed that the impacted vendor has also taken actions to help prevent against similar incidents in the future.

ZOLL is offering free credit and identity monitoring services for one year to impacted patients where available. As an added precaution, ZOLL is providing impacted patients with information on additional steps that may help to guard against fraud or identity theft.

ZOLL sincerely regrets any inconvenience or concern this incident may cause. If you have any questions or need any additional information, please do not hesitate to contact 1-833-231-3358.

Pennsylvania-headquartered ZOLL, LLC reported this incident to HHS as impacting 277,319 patients.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
Category: ExposureHealth DataSubcontractorU.S.

Post navigation

← HIV data leak: Mikhy Farrera Brochez pleads not guilty in US court
Lithuanian Man Pleads Guilty To Wire Fraud For Theft Of Over $100 Million In Fraudulent Business Email Compromise Scheme →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied
  • More than 1 million patients affected by DaVita ransomware attack; those are preliminary numbers
  • Cisco discloses data breach impacting Cisco.com user accounts
  • Scattered Spider is NOT quiet. They’re just under another name now.
  • Exclusive: Brosix and Chatox promised to keep your chats secured. They didn’t.
  • Cencora & The Lash Group reach $40M settlement in data breach class action
  • Thai hospital fined 1.2 million baht for data breach via snack bags
  • Follow-up: Qilin responds to claims by affiliate and leak by competitor
  • Dutch Prosecution Service begins phased system reboot after cyberattack
  • New York Upgrades Its Firewall Against Cyberattacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.