DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CardioNet reports two breaches involving laptop theft (?) and other breaches newly revealed on HHS's breach tool

Posted on March 22, 2012 by Dissent

Sometimes it takes a while for me to track down details on a breach after seeing it mentioned on HHS’s breach tool.  And sometimes, it’s just too late. A case in point is an entry for Flex Physical Therapy in Washington, where apparently 3,100 patients were affected by a computer theft on December 30, 2011.  But by the time HHS posted the breach on February 24, the substitute notice Flex had placed in the media had already expired.  All that remains was a clause indicating it was an office burglary that snared three computers, one of which contained patient data.

Here are some other breaches recently posted to HHS’s breach tool that I didn’t know about and for which I can find no documentation or substitute notice on the Internet at this time:

  • Delta Dental, CA,,”11,646″, 12/22/2011 – 12/23/2011, Unauthorized Access/Disclosure,Paper
  • Department of Medical Assistance Services, VA,”ACS, Affiliated Computer Services, Inc.“, “1,444”, 11/02/2011 – 11/16/2011, Unauthorized Access/Disclosure,Paper
  • Medco Health Solutions, Inc., NJ, “1,287”, 11/30/2011, Unauthorized Access/Disclosure,Paper
  • Indiana Internal Medicine Consultants,IN, “20,000”, 2/11/2012, Theft,Laptop
  • CardioNet, Inc,PA,”1,300″, 11/10/2011,Theft, Laptop
  • CardioNet, Inc,PA, 728, 12/29/2011,Theft,Laptop

Also newly revealed was a breach at Georgetown University Hospital, but they kindly sent me the information, so they are not included in this list of our ignorance.

CardioNet did not respond to an inquiry asking about the two separate incidents that seem to have involved stolen laptops with unencrypted PHI.   At the present time, absent a response from them, these events will get coded as stolen laptops in databases, although I would prefer to get confirmation from them in light of my concerns about the accuracy of HHS’s breach tool.    I think those of us who track healthcare sector breaches also want to know whether the laptops were supposed to have been encrypted but weren’t, or whether CardioNet had no policy in place requiring encryption of all devices.  I imagine HHS will get into those issues in their investigation and I’ll eventually get some answers when I obtain information from HHS under Freedom of Information, but it would be nice to have information sooner rather than later.


Related:

  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • North Country Healthcare responds to Stormous's claims of a breach
  • Texas Enacts Electronic Health Record Data Localization Law
Category: Health Data

Post navigation

← Anonymous Launch #Operation Imperva
peruanosonline.com hacked and massive account leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)
  • Bank of America Refused To Reimburse Georgia Customer After Hackers Hit Account. Then a News Station Showed Up.
  • NCERT Issues Advisory on “Blue Locker” Ransomware Targeting Pakistan’s Key Institutions
  • Scattered Spider has a new Telegram channel to list its attacks
  • SC: Spartanburg County hit by cyberattack, some online services disrupted
  • Pakistan Petroleum thwarts ransomware attempt, says no critical data compromised
  • ShinyHunters sent Google an extortion demand; Shiny comments on current activities
  • Air France and KLM alert customers to data breach on external platform
  • Samourai CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill Pled Guilty to Operating a Money Transmitting Business, Samourai Wallet, That Transmitted Over $200 Million in Criminal Proceeds

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.