DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Medical Informatics sued by multiple states over 2015 breach

Posted on December 4, 2018 by Dissent

A 2015 hack of Medical Informatics stayed in the headlines for quite a while because it compromised the data, including health information, of 3.9 million people.  In addition to suits filed by consumers, state attorneys general have also sued the business associate, as Dave Gong reports:

Fort Wayne-based Medical Informatics Engineering Inc. failed to secure their computer systems, resulting in a data breach, which compromised the data of more than 3.9 million people, a 12-state lawsuit filed by Indiana Attorney General Curtis Hill alleges.

[…]

Other states involved in the litigation are Arizona, Arkansas, Florida, Iowa, Kansas, Kentucky, Louisiana, Minnesota, Nebraska, North Carolina and Wisconsin. Indiana’s portion was filed in the U.S. District Court for the Northern District of Indiana.

When looking at the claims, keep in mind 2015 standards.

“Defendants failed to implement basic industry-accepted data security measures to protect individuals’ health information from unauthorized access,” the lawsuit states. “Defendants set up a generic ‘tester’ account called ‘testing’ with a shared password of ‘testing.’ In addition to being easily guessed, these generic accounts did not require a unique user identification and password in order to gain remote access.”

According to the lawsuit, the company did not put in place an active security system to alert employees to possible hacking attempts. Additionally, the lawsuit contends that the company did not encrypt sensitive personal information within its own computer system, “a protection that, had it been employed, would have rendered the data unusable.”

Curiously, perhaps, the HHS breach tool lists the Medical Informatics breach under archived incidents or incidents older than 24 months, but they show no web description or outcome of any investigation.  Assuming for now that they even opened an investigation into this incident, is this still under investigation by HHS?

Read more on The Journal Gazette.


Related:

  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception?
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
Category: Health DataSubcontractorU.S.

Post navigation

← Caribbean Island Properties “pillaged” by TheDarkOverlord
Over 20,000 PCs infected with new ransomware strain in China →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.