DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TN: Alive Hospice notifies patients or next of kin after discovering unauthorized access to an employee’s email account

Posted on July 4, 2019 by Dissent

NASHVILLE, Tenn., July 3, 2019 /PRNewswire/ — On or around May 6, 2019, Alive Hospice became aware of unusual activity related to an employee’s email account. Alive Hospice immediately took steps to respond to and investigate this activity and change the user’s password. Based on this review, Alive Hospice determined that an unauthorized individual(s) gained access to the employee’s email account. Alive Hospice commenced a comprehensive investigation to determine the nature and scope of the incident and identify what personal information may have been present in the affected emails.

Through the investigation, which included working with third-party forensic investigators, Alive Hospice determined that an unauthorized individual(s) gained access to a single Alive Hospice employee email account between May 4, 2019, and May 6, 2019. While, to date, the investigation has found no evidence of actual or attempted misuse of data, we did determine that the email account affected by this incident contained certain personal information which may include name, contact information, date of birth, Social Security number, driver’s license, credit/debit card number, medical history information, treatment and prescription information, physician information, medical record number, Medicaid/Medicare number, health insurance information, and/or username/email and password information.

Alive Hospice places the highest priority on the confidentiality, privacy, and security of the personal information in its care.  Cyberattacks are increasingly occurring in healthcare and other industries, so Alive Hospice is constantly monitoring for security concerns and implementing measures to strengthen its system and protect the security of information. While Alive Hospice has stringent security measures in place to protect information, it is taking steps to implement additional safeguards to further protect the security of information. Additionally, Alive Hospice has put in place resources to assist potentially affected individuals.

On July 3, 2019, Alive Hospice began mailing notice letters to individuals and next of kin, as appropriate, whose information may have been present in the affected email account.  Alive Hospice has offered these individuals access to credit monitoring and identity restoration services for one year without charge.  Alive Hospice also is encouraging individuals to remain vigilant against incidents of identity theft and fraud, to review account statements, and to monitor credit reports and explanation of benefits forms for suspicious activity.  Alive Hospice’s notification to individuals includes information on obtaining a free credit report annually from each of the three major credit reporting bureaus by visiting www.annualcreditreport.com, calling 877-322-8228, or contacting the three major credit bureaus directly at: Equifax, P.O. Box 105069, Atlanta, GA, 30348, 800-525-6285, www.equifax.com; Experian, P.O. Box 2002, Allen, TX 75013, 888-397-3742, www.experian.com; TransUnion, P.O. Box 2000, Chester, PA 19016, 800-680-7289, www.transunion.com. Individuals may also find information regarding identity theft, fraud alerts, security freezes and the steps they may take to protect their information by contacting the credit bureaus, the Federal Trade Commission or their state Attorney General.  The Federal Trade Commission can be reached at: 600 Pennsylvania Avenue NW, Washington, DC 20580; www.identitytheft.gov; 1-877-ID-THEFT (1-877-438-4338); and TTY: 1-866-653-4261.  Instances of known or suspected identity theft should also be reported to law enforcement or the individual’s state Attorney General.  Alive Hospice has provided notice of this incident to the U.S. Department of Health and Human Services, as well as required state regulators.

Alive Hospice has set up a dedicated assistance line to answer questions regarding this incident. Individuals who have questions about the incident are encouraged to call 1-800-939-4170 (toll free), Monday through Friday from 8 am – 7 pm Central Time.

SOURCE Alive Hospice


Related:

  • How a hacking gang held Italy’s political elites to ransom
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Kaufman County's data breach was their second one in three weeks
Category: HackHealth DataU.S.

Post navigation

← MYOB in payslip privacy bungle
‘Silence’ hackers hit banks in Bangladesh, India, Sri Lanka, and Kyrgyzstan →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.