DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Tufts Health Plan notifies 70,320 members after vendor error exposes information in envelope window

Posted on March 1, 2018 by Dissent

Yes, it has happened again. Protected health information exposed in an envelope window. Why do entities still use envelopes with windows? Anyway, Tufts Health Plan explains in their notification of February 16, 2018:

Subject: Notice of Inadvertent Disclosure of Health Plan Information

What happened?

Tufts Health Plan uses a vendor to handle mailing of member identification (ID) cards. Between December 11, 2017 and January 2, 2018, the vendor mailed Tufts Medicare Preferred ID cards to Medicare Advantage members. The window of the envelope used for the mailing showed the Tufts Health Plan member ID number, in addition to the member’s name and address. The member ID number is not supposed to be visible in the address window of the envelope. Tufts Health Plan discovered the full extent of this error on January 18, 2018.

What is the member ID number?

Each member at Tufts Health Plan is assigned an ID number. The member ID number is not the member’s Social Security number or Medicare ID number.

What problem could this situation cause?

We have consulted with experts in the legal and fraud areas, and we have determined that this situation presents a very low risk to any member’s personal information. We have no indication that anyone other than the postal service would have been able to view the member ID number while the letter was in transit to the member. In the unlikely event that a member’s name and ID number are used by another person to receive services covered by Tufts Health Plan, the member will not be responsible for any charges.

What are we doing?

Since discovering the issue, we have been working with the vendor to ensure future mailings do not expose member ID numbers. The error has been fixed by the vendor. Also, our Customer Relations team has verification procedures in place to ensure that we will not provide confidential member information to anyone but the member or their authorized representative.

What you can do

This incident will not affect or change how our Tufts Medicare Preferred members receive benefits under their plan. For questions about this incident, we have a dedicated call center that members can contact at 1-855-269-6658.

We sincerely apologize for any concern this situation has caused. Please know that we deeply regret any worry or inconvenience.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: ExposureHealth DataPaperSubcontractor

Post navigation

← Former University of North Georgia employee accessed protected student data in Banner
QuadMed health records system issue affected onsite clinics of three clients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.