DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Michigan Department of Community Health notifying 2,595 individuals of breach

Posted on April 3, 2014 by Dissent

MDCH Notifying Individuals Regarding Protected Health Information Breach

For Immediate Release: April 3, 2014 

LANSING – The Michigan Department of Community Health (MDCH) recently became aware of a breach of protected health information under the Health Insurance Portability and Accountability Act (HIPAA) and is notifying 2,595 individuals and the Department of Health and Human Services regarding this breach.

On the evening of Jan. 30 or early morning Jan. 31, a laptop computer and flash drive were stolen from an employee of the State Long Term Care (LTC) Ombudsman’s Office. Information on the laptop was encrypted; however, data on the flash drive was not and contained sensitive information regarding participants that the LTC Ombudsman’s Office serves. The flash drive contained personal information about 2,595 living and deceased individuals, including names and addresses, and for some individuals, dates of birth. Of those, 1,539 records also included either a Social Security number or a Medicaid identification number.

“MDCH takes any potential breach of security with the utmost seriousness and sincerely regrets that this breach occurred,” said Nick Lyon, Chief Deputy Director of the MDCH. “We are working swiftly to notify any individuals who may have been impacted and with staff to tighten our security procedures going forward.”

The theft has been reported to the police, but, to date, the laptop and flash drive have not been recovered. MDCH learned about the breach on Feb. 3 and notified impacted individuals this week after reconstructing the data.

All individuals with data on the flash drive are being notified so that they can monitor their accounts and other financial affairs for any unauthorized use. MDCH is working with the LTC Ombudsman’s Office to offer credit monitoring services at no cost to people whose Social Security number or Medicaid number were compromised.  In addition, a credit file death suppression service is being offered to the families of deceased individuals to assist them in securing their deceased loved one’s credit file.

If you are an affected person, and wish to take action to protect yourself from potential identity thieves, you may place a fraud alert on your credit file.  A fraud alert tells creditors to contact you before they open any new accounts or change your existing accounts.  You can place a fraud alert on your credit file by calling any one of the three major credit bureaus:  Equifax: (800) 525-6285; Experian:  (888) 397-3742; Trans Union Corp. (800) 680?7289.

The State LTC Ombudsman program is reviewing its data security processes to prevent any future data breaches, and the MDCH is conducting additional training on data security, in particular portable electronic devices, for the Ombudsman’s office and MDCH employees. Affected individuals or the family members of deceased individuals affected by this breach may contact the LTC Ombudsman’s Office for more information at [email protected].


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
  • "Pompompurin" taken into custody after violating conditions of pre-sentencing release on bond (1)
Category: Uncategorized

Post navigation

← Sutherland Healthcare identifies additional patients to notify of breach (UPDATED)
UK: Hospital data sold without patients' consent to boost profits of private drugs companies →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.