DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bon Secours Notifying Patients of Information Security Breach

Posted on May 31, 2013 by Dissent

The Bon Secours Hampton Roads Health System posted this notice on Wednesday:

 Bon Secours Hampton Roads Health System officials announced today that they are proactively contacting former patients via letters on behalf of Bon Secours Mary Immaculate Hospital to inform them of an electronic medical records security breach. The health system has contracted the services of Kroll Advisory Solutions to offer access to identity theft safeguards at no charge to the patients contacted.    Patients may call Kroll at 1-866-599-7347 8:00 a.m. to 5:00 p.m. (Central Time) Monday – Friday, for additional information on how to enroll in this service. A membership number provided in the letter will be needed to activate the service.

During an April 2013 audit of a patient’s medical record, the health system identified suspicious access that prompted an investigation. The investigation revealed that two members of the patient care team accessed patients’ medical records in a manner that was inconsistent with their job functions and hospital procedures, and inconsistent with the training they received regarding appropriate access of patient medical records.

The information accessed by these employees included one or more of the following: (i) patient name; (ii) dates and times of service; (iii) provider and facility names; (iv) internal hospital medical record and account numbers, which may have included social security number; (v) date of birth; and (vi) treatment information, such as diagnosis, medications and vital signs.

The health system became concerned that the access to the medical records possibly indicated unlawful behavior and contacted law enforcement to assist with the investigation. Local and federal law enforcement agencies have formed The Peninsula Task Force to work with Bon Secours to thoroughly investigate this matter and to determine if any patient information may have been used illegally. The employees involved in this incident have been terminated.

SOURCE: Bon Secours

The breach was reported yesterday by Daily Press, who reports that 5,000 patients may be impacted.  A spokesperson also informed the paper that the hospital “has been using electronic medical records since April 2012, and this was the first instance of any reportable security issues.”  That may be true as far as it goes, but the Bon Secours Hampton Roads Health System has had other insider breaches:

  • In September 2008, we learned that an employee in Bon Secours DePaul Medical Center’s emergency room had stolen patient information to use in a fraud scheme. She had accessed patient information “frequently” over a 7-month period;
  • In February 2009, we learned that an emergency room clerk at Bon Secours Memorial Regional Medical Centre had stolen patient information for a fraud scheme; and
  • In October 2012, a former employee of Bon Secours Hospital was sentenced for his role in an ID theft ring.

So maybe this was the first insider data theft involving EMR at Bon Secours Mary Immaculate Hospital, but it’s not the health system’s first insider breach.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Health Data

Post navigation

← Myanmar Government Sites attacked for OpMyanmar
@th3j35t3r Strikes Again, Sites downed for Distributing Inspire Magazine →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.