DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

For NYC Health & Hospitals Corporation, 2011 wasn't a great year for data security, Part 1

Posted on November 10, 2014 by Dissent

It seems that 2011 was not exactly a stellar year for the NYC Health & Hospitals Corporation (“HHC”) for data security.

The first HHC incident was the 2011 breach involving the theft of backup tapes with information on 1.7 million patients. HHC did not incur any monetary penalties for that breach.

The second incident, not previously known to this site, also occurred in 2011, but was only added to HHS’s database this past week.

HHS’s log entry for the incident looks like this:

New York City Health & Hospitals Corporation,NY,””,10058,07/01/2011,Unauthorized Access/Disclosure,Paper,11/07/2014,

So why is a breach that impacted over 10,000 patients in 2011 first showing up now in HHS’s database? It turns out that the answer is that HHC only first discovered the breach in August of this year and only first notified patients in October of this year.

A statement posted October 10, 2014 on HHC’s website reads:

The New York City Health and Hospitals Corporation (HHC) this week began to notify 10,058 patients who received services at four now-closed clinics in Brooklyn about the possible disclosure of some of their personal or protected health information (PHI) when records were improperly stored in boxes in an enclosed employee parking garage at the East New York Diagnostic and Treatment Center. A sample notification to the affected patients at (1) the Howard Houses Child Health Center; (2) the Brevoort Houses Child Health Clinic; (3) the Fifth Avenue Child Health Clinic and (4) the Brownsville Child Health Clinic is attached.

There is no evidence to suggest that the files were accessible to the general public or that the protected health information in the files has, in fact, had been improperly accessed by any person or entity. Nonetheless, the records were stored in a manner that HHC staff without authority to access such records could have accessed them.

In an abundance of caution, HHC has taken decisive steps to protect the individuals who are potentially affected, by immediately securing and removing the boxes of records and properly storing them, and timely notifying the required federal oversight agency.

HHC, through third party vendor AllClear ID, Inc. is offering free credit monitoring and identity protection services for one year to those patients whose medical records were stored in the garage. HHC has also set up a toll-free hotline, 1-866-979-2599, to provide additional information. Notifications will also be posted on the HHC website and will be distributed to numerous New York area news outlets.

Personal health information can include name, address, diagnosis, medications, treatment regimen, medical record number, and social security number.

HHC has taken immediate measures to prevent a reoccurrence of this incident by increasing the number of security and privacy walk-throughs it conducts at its facilities and by ensuring that the HHC workforce is reminded of the importance of managing PHI in a safe and secure manner and of reporting any incidents where that is not the case.

So that was their second incident in 2011. But it turns out there was third incident. Follow me to the next post.


Related:

  • Maintenance Note
  • CISA Alert: Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
  • System Status Note
  • System Status Note
  • System Status Note
  • Fraudster's fake data breach claims should remind media to be careful what we report
Category: Uncategorized

Post navigation

← Terminated employee continued to access Bon Secours' patients' billing information
For NYC Health & Hospitals Corporation, 2011 wasn't a great year for data security, Part 2 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.