DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Parkland employee fired after theft of thousands of patient records (updated)

Posted on November 18, 2011 by Dissent

Matt Peterson reports:

Authorities are investigating the theft of thousands of patient records at Parkland Memorial Hospital, allegedly by a former employee.

The theft, which came to light in September, led to the firing of the employee, who worked as a registrar in the hospital and had access to patient files for his job.

The employee, who is not being named, also owns a home health care agency and officials believe he used the information to contact patients as potential clients.

Further investigation by the Dallas County Hospital District police revealed that the employee had inappropriately accessed more than 2,000 patient records.

The personal information of 1,311 patients was contained in the stolen reports. This information includes patient name, age, gender, Medicare coverage, phone number and date of birth.

Of the 1,311 records that contained patient information, 232 of them also included the Social Security numbers of the patients.

Parkland officials have notified all impacted patients and are paying for them to enroll in a credit monitoring service for one year.

Source: Dallas Morning News.

This is the second blog entry this week relating to an insider data breach where the motivation was presumably trade secrets/competitive advantage.  The first case was Berkeley HeartLab, which appears to be an expensive breach in terms of litigation costs, settlement, compliance, and breach notification and mitigation services to affected patients. In this case, the motivation is not competitive as much as having/gaining leads to a potential client pool, I would imagine.

I note that there’s no mention of any arrest at this point.   Will this man be charged criminally under HIPAA or under Texas law, or both?  If the investigation bears out the details reported so far, I hope he is charged.

Updated December 9:  When this incident was reported to HHS, they indicated that 2,464 patients were affected.


Related:

  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
  • They were victims of a massive data breach in 2009. Interior Health denied it for a decade.
  • Watsonville Community Hospital had a data breach -- or two. It would be helpful to know which.
Category: Health Data

Post navigation

← APEC committee alerted to possible data breach (updated)
Owner of tax preparation business pleads guilty to using stolen identity information for fraudulent tax refunds →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.