DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Tufts Health Plan notifies 70,320 members after vendor error exposes information in envelope window

Posted on March 1, 2018 by Dissent

Yes, it has happened again. Protected health information exposed in an envelope window. Why do entities still use envelopes with windows? Anyway, Tufts Health Plan explains in their notification of February 16, 2018:

Subject: Notice of Inadvertent Disclosure of Health Plan Information

What happened?

Tufts Health Plan uses a vendor to handle mailing of member identification (ID) cards. Between December 11, 2017 and January 2, 2018, the vendor mailed Tufts Medicare Preferred ID cards to Medicare Advantage members. The window of the envelope used for the mailing showed the Tufts Health Plan member ID number, in addition to the member’s name and address. The member ID number is not supposed to be visible in the address window of the envelope. Tufts Health Plan discovered the full extent of this error on January 18, 2018.

What is the member ID number?

Each member at Tufts Health Plan is assigned an ID number. The member ID number is not the member’s Social Security number or Medicare ID number.

What problem could this situation cause?

We have consulted with experts in the legal and fraud areas, and we have determined that this situation presents a very low risk to any member’s personal information. We have no indication that anyone other than the postal service would have been able to view the member ID number while the letter was in transit to the member. In the unlikely event that a member’s name and ID number are used by another person to receive services covered by Tufts Health Plan, the member will not be responsible for any charges.

What are we doing?

Since discovering the issue, we have been working with the vendor to ensure future mailings do not expose member ID numbers. The error has been fixed by the vendor. Also, our Customer Relations team has verification procedures in place to ensure that we will not provide confidential member information to anyone but the member or their authorized representative.

What you can do

This incident will not affect or change how our Tufts Medicare Preferred members receive benefits under their plan. For questions about this incident, we have a dedicated call center that members can contact at 1-855-269-6658.

We sincerely apologize for any concern this situation has caused. Please know that we deeply regret any worry or inconvenience.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Government will 'robustly defend' compensation claims from Afghans put at risk by data breach
Category: ExposureHealth DataPaperSubcontractor

Post navigation

← Former University of North Georgia employee accessed protected student data in Banner
QuadMed health records system issue affected onsite clinics of three clients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004
  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.