Unnamed: 0
int64 1
1.06k
| Number
int64 0
1.05k
| Name_of_Covered_Entity
stringlengths 3
151
| State
stringlengths 2
2
| Business_Associate_Involved
stringlengths 3
77
⌀ | Individuals_Affected
int64 500
4.9M
| Date_of_Breach
stringlengths 8
24
| Type_of_Breach
stringclasses 29
values | Location_of_Breached_Information
stringlengths 5
123
| Date_Posted_or_Updated
stringlengths 10
10
| Summary
stringlengths 326
3.28k
⌀ | breach_start
stringlengths 10
10
| breach_end
stringlengths 10
10
⌀ | year
int64 2k
2.01k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | 0 | Brooke Army Medical Center | TX | null | 1,000 | 10/16/2009 | Theft | Paper | 2014-06-30 | A binder containing the protected health information (PHI) of up to 1,272 individuals was stolen from a staff member's vehicle. The PHI included names, telephone numbers, detailed treatment notes, and possibly social security numbers. In response to the breach, the covered entity (CE) sanctioned the workforce member and developed a new policy requiring on-call staff members to submit any information created during their shifts to the main office instead of adding it to the binder. Following OCR's investigation, the CE notified the local media about the breach. | 2009-10-16 | null | 2,009 |
2 | 1 | Mid America Kidney Stone Association, LLC | MO | null | 1,000 | 9/22/2009 | Theft | Network Server | 2014-05-30 | Five desktop computers containing unencrypted electronic protected health information (e-PHI) were stolen from the covered entity (CE). Originally, the CE reported that over 500 persons were involved, but subsequent investigation showed that about 260 persons were involved. The ePHI included demographic and financial information. The CE provided breach notification to affected individuals and HHS. Following the breach, the CE improved physical security by installing motion detectors and alarm systems security monitoring. It improved technical safeguards by installing enhanced antivirus and encryption software. As a result of OCR's investigation the CE updated its computer password policy. | 2009-09-22 | null | 2,009 |
3 | 2 | Alaska Department of Health and Social Services | AK | null | 501 | 10/12/2009 | Theft | Other Portable Electronic Device, Other | 2014-01-23 | null | 2009-10-12 | null | 2,009 |
4 | 3 | Health Services for Children with Special Needs, Inc. | DC | null | 3,800 | 10/9/2009 | Loss | Laptop | 2014-01-23 | A laptop was lost by an employee while in transit on public transportation. The computer contained the protected health information of 3800 individuals. The protected health information involved in the breach included names, Medicaid ID numbers, dates of birth, and primary physicians. In response to this incident, the covered entity took steps to enforce the requirements of the Privacy & Security Rules. The covered entity has installed encryption software on all employee computers, strengthened access controls including passwords, reviewed and updated security policies and procedures, and updated it risk assessment. In addition, all employees received additional security training.
| 2009-10-09 | null | 2,009 |
5 | 4 | L. Douglas Carlson, M.D. | CA | null | 5,257 | 9/27/2009 | Theft | Desktop Computer | 2014-01-23 | A shared Computer that was used for backup was stolen on 9/27/09 from the reception desk area of the covered entity. The Computer contained certain electronic protected health information (ePHI) of 5,257 individuals who were patients of the CE. The ePHI involved in the breach included names, dates of birth, and clinical information, but there were no social security numbers, financial information, addresses, phone numbers, or other ePHI in any of the reports on the disks or the hard drive on the stolen Computer. Following the breach, the covered entity notified all 5,257 affected individuals and the appropriate media; added technical safeguards of encryption for all ePHI stored on the USB flash drive or the CD used on the replacement computer; added physical safeguards by keeping new portable devices locked when not in use in a secure combination safe in doctor's private office or in a secure filing cabinet; and added administrative safeguards by requiring annual refresher retraining of CE staff for Privacy and Security Rules as well as requiring immediate retraining of cleaning staff in both Rules.
| 2009-09-27 | null | 2,009 |
6 | 5 | David I. Cohen, MD | CA | null | 857 | 9/27/2009 | Theft | Desktop Computer | 2014-01-23 | A shared Computer that was used for backup was stolen from the reception desk area, behind a locked desk area, probably while a cleaning crew had left the main door to the building open and the door to the suite was unlocked and perhaps ajar. The Computer contained certain electronic protected health information (ePHI) of 857 patients. The ePHI involved in the breach included names, dates of birth, and clinical information. Following the breach, the covered entity notified all affected individuals and the media, added technical safeguards of encryption for all ePHI stored on the USB flash drive or the CD used on the replacement computer, added physical safeguards by keeping new portable devices locked when not in use in a secure combination safe in doctor's private office or in a secure filing cabinet, and added administrative safeguards by requiring annual refresher retraining staff for Privacy and Security Rules as well as requiring immediate retraining of cleaning staff in both Rules, which has already taken place.
| 2009-09-27 | null | 2,009 |
7 | 6 | Michele Del Vicario, MD | CA | null | 6,145 | 9/27/2009 | Theft | Desktop Computer | 2014-01-23 | A shared Computer that was used for backup was stolen on 9/27/09 from the reception desk area of the covered entity. The Computer contained certain electronic protected health information (ePHI) of 6,145 individuals who were patients of the CE, The ePHI involved in the breach included names, dates of birth, and clinical information, but there were no social security numbers, financial information, addresses, phone numbers, or other ePHI in any of the reports on the disks or the hard drive on the stolen Computer. Following the breach, the CE: notified all 6,145 affected individuals and the appropriate media; added technical safeguards of encryption for all ePHI stored on the USB flash drive or the CD used on the replacement computer; all passwords are strong; all computers are password protected; added physical safeguards by keeping new portable devices locked when not in use in a secure combination safe in doctor's private office or in a secure filing cabinet; and added administrative safeguards by requiring annual refresher retraining of CE staff for Privacy and Security Rules as well as requiring immediate retraining of cleaning staff in both Rules, which has already taken place.
| 2009-09-27 | null | 2,009 |
8 | 7 | Joseph F. Lopez, MD | CA | null | 952 | 9/27/2009 | Theft | Desktop Computer | 2014-01-23 | A shared Computer that was used for backup was stolen on 9/27/09. The Computer contained certain electronic protected health information (ePHI) of 952 patients. Following the breach, the covered entity notified all 952 affected individuals and the appropriate media; added technical safeguards of encryption for all ePHI stored on the USB flash drive or the CD used on the replacement computer; added physical safeguards by keeping new portable devices locked when not in use in a secure combination safe in doctor's private office or in a secure filing cabinet; and added administrative safeguards by requiring annual refresher retraining of staff for Privacy and Security Rules.
| 2009-09-27 | null | 2,009 |
9 | 8 | Mark D. Lurie, MD | CA | null | 5,166 | 9/27/2009 | Theft | Desktop Computer | 2014-01-23 | A shared Computer that was used for backup was stolen on 9/27/09 from the reception desk area of the covered entity. The Computer contained certain electronic protected health information (ePHI) of 5,166 individuals who were patients of the CE, The ePHI involved in the breach included names, dates of birth, and clinical information, but there were no social security numbers, financial information, addresses, phone numbers, or other ePHI in any of the reports on the disks or the hard drive on the stolen Computer. Following the breach, the CE: notified all 5,166 affected indiv's and the appropriate media; added technical safeguards of encryption for all ePHI stored on the USB flash drive or the CD used on the replacement computer; all passwords are strong; all computers are password protected; added physical safeguards by keeping new portable devices locked when not in use in a secure combination safe in doctor's private office or in a secure filing cabinet; and added administrative safeguards by requiring annual refresher retraining of CE staff for Privacy and Security Rules as well as requiring immediate retraining of cleaning staff in both Rules, which has already taken place.
| 2009-09-27 | null | 2,009 |
10 | 9 | City of Hope National Medical Center | CA | null | 5,900 | 9/27/2009 | Theft | Laptop | 2014-01-23 | A laptop computer was stolen from a workforce member's car. The laptop computer contained the protected health information of approximately 5,900 individuals. Following the breach, the covered entity encrypted all protected health information stored on lap tops. Additionally, OCR's investigation resulted in the covered entity improving their physical safeguards and retraining employees.
| 2009-09-27 | null | 2,009 |
11 | 10 | The Children's Hospital of Philadelphia | PA | null | 943 | 10/20/2009 | Theft | Laptop | 2014-01-23 | null | 2009-10-20 | null | 2,009 |
12 | 11 | Cogent Healthcare of Wisconsin, S.C. | TN | null | 6,400 | 10/11/2009 | Theft | Laptop | 2014-04-23 | A laptop was stolen from a locked office at the Aurora St. Lukes Medical Center. The laptop contained protected health information pertaining to 6,400 individuals. The information included patient names, dates of birth, social security numbers, medical record numbers, and in some cases diagnosis codes. In response to the theft, the hospital implemented several corrective action measures, including accelerated efforts to encrypt all laptop hard drives, improved physical locks on the office where the theft occurred, staff training regarding the appropriate use and storage of devices containing ePHI, and encryption of portable flash drives and Blackberry devices. | 2009-10-11 | null | 2,009 |
13 | 12 | Universal American | NY | Democracy Data & Communications, LLC ( | 83,000 | 11/12/2009 | Other | Paper | 2014-01-23 | In its breach report and during the course of OCR's investigation, the covered entity advised that it took various corrective actions to prevent a reoccurrence of the breach. Specifically, the covered entity conducted a risk assessment which revealed that the breach posed a significant risk of financial, reputational, or other harm to the 83,000 members. The covered entity sent notification letters to 83,000 members apologizing for the breach and offered a year of free credit monitoring and a $25,000 insurance policy against identity theft ($10,000 for New York residents). The covered entity also provided training to its call centers on November 29, 2009 to answer inquiries from callers concerned about the breach. In addition, media outlets were contacted to alert of a breach in states in which more than 500 members were impacted by the breach. The covered entity advised that media outlets were identified based on location of membership impacted, as well as ensuring it was a major media outlet and press releases were sent to 21 major media outlets on December 18, 2009. The covered entity also created and implemented a new policy titled 'Personal Health Information and Personal Identifiable Information Data Security and Handling Policy Acknowledgement Form' that centralized all data requests through a 'Team Track' which is an internal electronic submission request that ensures all PHI requested data receives the sign off of the Privacy Officer and Security Officer prior to release. Further, the covered entity also provided a mandatory annual computer-based training to all staff in May 2010.
| 2009-11-12 | null | 2,009 |
14 | 13 | Kern Medical Center | CA | null | 596 | 10/31/2009 | Theft | Other | 2014-01-23 | null | 2009-10-31 | null | 2,009 |
15 | 14 | Keith W. Mann, DDS, PLLC | NC | Rick Lawson, Professional Computer Services | 2,000 | 12/8/2009 | Hacking/IT Incident | Desktop Computer, Network Server, Electronic Medical Record | 2014-01-23 | null | 2009-12-08 | null | 2,009 |
16 | 15 | Detroit Department of Health and Wellness Promotion | MI | null | 10,000 | 10/22/2009 | Theft | Other Portable Electronic Device | 2014-01-23 | null | 2009-10-22 | null | 2,009 |
17 | 16 | Detroit Department of Health and Wellness Promotion | MI | null | 646 | 11/26/2009 | Theft | Laptop, Desktop Computer | 2014-01-23 | A desktop and four laptop computers were stolen from the covered entity's locked facility. The protected health information involved in the breach included names, addresses, dates of birth, social security numbers, types of services received, and Medicare/Medicaid numbers.Following the breach, the covered entity installed new office door locks with assigned keys, installed security cameras with alarms, and physically secured computers to desks. The covered entity now stores billing information in its patient management system, and it ensured that no electronic protected health information was stored locally. Additionally, OCR's investigation resulted in the covered entity providing training to workforce members regarding the incident
| 2009-11-26 | null | 2,009 |
18 | 17 | University of California, San Francisco | CA | null | 610 | 9/22/2009 | Other | E-mail | 2014-01-23 | null | 2009-09-22 | null | 2,009 |
19 | 18 | Daniel J. Sigman MD PC | MA | null | 1,860 | 12/11/2009 | Theft | Other Portable Electronic Device, Other, Electronic Medical Record | 2014-01-23 | Computer backup tapes containing EPHI for the office practice management program including electronic medical records were stolen from the home of the practice manager on December 11, 2009. The breach affected approximately 1,860 patients. The protected health information on the tapes contained patients' names, addresses, telephone numbers, dates of birth, insurance information, social security numbers and medical record information. Following the breach, Sigman took the following voluntary corrective actions: (1) upgraded software application for backup security; implemented a new external backup system in case the server goes down; (2) encryption software was implemented for data contained on both its backup tapes and network storage device; (3) revised its security policy for transporting backup media; backup tapes must now be stored in a lockbox within a locked office in its facility; the revised policy also prohibits the movement of backup tapes from the facility as well as restricts access to the tapes to designated workforce; (4) employees were retrained on the policies and procedures in place and received training on the new policies and procedures for safeguarding backup tapes; (5) notified affected individuals and the media.
| 2009-12-11 | null | 2,009 |
20 | 19 | Massachusetts Eye and Ear Infirmary | MA | null | 1,076 | 11/10/2009 | Theft | Other | 2014-01-23 | null | 2009-11-10 | null | 2,009 |
21 | 20 | BlueCross BlueShield Association | DC | Service Benefits Plan Administrative Services Corp | 3,400 | 10/26/2009 | Theft | Paper | 2014-06-30 | The covered entity's (CE) business associate (BA) incorrectly updated contract holders' addresses and mailed protected health information (PHI) to the wrong address of approximately 3,400 individuals. The PHI involved included demographic information, explanations of benefits, clinical information, and diagnoses. The breach incident involved a BA and occurred prior to the September 23, 2013, compliance date. Upon discovery of the breach, the CE obtained assurances that the BA took steps to enforce the requirements of the BA agreement. Specifically, the BA updated its processes and created an incident tracking report. In addition, a contract was executed for a new vendor to handle mail address verification. Following OCR's investigation, the BA improved its code review process to catch the system error that caused this incident and instituted a manual quality review process. OCR verified that the CE had a proper BA agreement in place that restricted the BA's use and disclosure of PHI and required the BA to safeguard all PHI.
| 2009-10-26 | null | 2,009 |
22 | 21 | BlueCross BlueShield Association | DC | Merkle Direct Marketing | 15,000 | 10/7/2009 | Theft | Paper | 2014-04-24 | The covered entity's (CE) business associate (BA) mailed protected health information (PHI) of approximately 15,000 individuals to incorrect addresses due to an error in its quarterly address update process. The mailing contained demographic information, explanations of benefits, clinical information, and diagnoses. Upon discovery of the breach, the CE collected the returned mail and verified that it had not been delivered, and updated its HIPAA policies and procedures. Following OCR's investigation, the CE was able to recover all or nearly all of the misdirected envelopes. | 2009-10-07 | null | 2,009 |
23 | 22 | Kaiser Permanente Medical Care Program | CA | null | 15,500 | 12/1/2009 | Theft | Other Portable Electronic Device, Other | 2014-01-23 | null | 2009-12-01 | null | 2,009 |
24 | 23 | Blue Island Radiology Consultants | IL | United Micro Data | 2,562 | 12/9/2009 | Theft | Other | 2014-06-30 | The covered entity's (CE's) business associate (BA) mailed a package to the CE that was supposed to contain a backup data tape and compact disc containing protected health information (PHI); however, the tape was not in the package when delivered. Approximately 2,000 individuals were affected by the breach. The PHI included demographic, financial, and clinical information. The CE provided breach notification to affected individuals, HHS, and the media. Following the breach, the CE revised its procedures for back up data storage instead of sending tapes via the mail. Following OCR's investigation, the CE continued to reevaluate ways to enhance administrative, physical, and technical safeguards.
| 2009-12-09 | null | 2,009 |
25 | 24 | Goodwill Industries of Greater Grand Rapids, Inc. | MI | null | 10,000 | 12/15/2009 | Theft | Other | 2014-01-23 | On December 15, 2009, a safe was stolen from Goodwill's off-site facility, which contained five unencrypted back-up tapes. The breach affected approximately 10,000 individuals. The protected health information involved in the breach included full names, addresses, dates of birth, reasons for referral, dates of service, miscellaneous demographics, and, in some cases, Social Security numbers. The covered entity moved the off-site storage of back-up tapes to a new site controlled by Goodwill. The tapes are now kept in a commercial grade safe with a combination lock. The actions taken by Goodwill prior to OCR's formal investigation brought the covered entity into compliance.
| 2009-12-15 | null | 2,009 |
26 | 25 | Children's Medical Center of Dallas | TX | null | 3,800 | 11/19/2009 | Loss | Other Portable Electronic Device, Other | 2014-01-23 | null | 2009-11-19 | null | 2,009 |
27 | 26 | Concentra | TX | null | 900 | 11/19/2009 | Theft | Laptop | 2014-01-23 | null | 2009-11-19 | null | 2,009 |
28 | 27 | Ashley and Gray DDS | MO | null | 9,309 | 1/10/2010 | Theft | Desktop Computer | 2014-01-23 | null | 2010-01-10 | null | 2,010 |
29 | 28 | Advocate Health Care | IL | null | 812 | 11/24/2009 | Theft | Laptop | 2014-01-23 | On November 24, 2009, an Advocate nurse's laptop computer was stolen. The missing laptop computer contained the protected health information of approximately 812 individuals. The protected health information involved in the breach included name, address, dates of birth, social security numbers, insurance information, medication, and diagnoses. Following the breach, Advocate specifically addressed mobile device security and accepted use. Additionally, OCR's investigation resulted in Advocate workforce members that use mobile devices are now required to fill out and submit an acknowledgment form that establish proper administrative, technical, and physical security safeguards.
| 2009-11-24 | null | 2,009 |
30 | 29 | The Methodist Hospital | TX | null | 689 | 1/18/2010 | Theft | Other | 2014-01-23 | An unencrypted laptop computer was stolen from the covered entity's unlocked testing office. The laptop computer contained the protected health information of approximately 689 individuals. The protected health information involved in the breach included names, dates of birth, Social Security numbers, and the age, gender, race, and medication information of affected individuals. Following the breach, the covered entity restricted the storage of electronic protected health information to network drives. Additionally, OCR's investigation resulted in the covered entity improving their physical safeguards and in retraining employees.
| 2010-01-18 | null | 2,010 |
31 | 30 | University of California, San Francisco | CA | null | 7,300 | 11/30/2009 | Theft | Laptop | 2014-01-23 | null | 2009-11-30 | null | 2,009 |
32 | 31 | Carle Clinic Association | IL | null | 1,300 | 1/13/2010 | Theft | Other, Paper | 2014-01-23 | null | 2010-01-13 | null | 2,010 |
33 | 32 | Educators Mutual Insurance Association of Utah | UT | Health Behavior Innovations (HBI) | 5,700 | 12/27/2009 | Theft | Other | 2014-01-23 | null | 2009-12-27 | null | 2,009 |
34 | 33 | University Medical Center of Southern Nevada | NV | null | 5,103 | 10/31/2009 | Theft | Paper | 2014-01-23 | Between the dates of July 31, 2009 and November 19, 2009, a former UMC volunteer faxed patient face sheets to an attorney who used the sheets to contact prospective clients. Although UMC only had proof of two disclosures, it chose to notify all 5,301 individuals that could have been affected by the breach. The protected health information involved in the breach included names, addresses, dates of birth, social security numbers, and diagnoses. Following the breach, UMC conducted an internal investigation, notified all 5,301 individuals, notified the media, and notified the Secretary. Additionally, UMC reformulated face sheets so that they no longer include full social security numbers and provided all possible affected individuals with a year of free credit monitoring. As a result of this breach, at least one person has been indicted on one count of conspiracy to illegally disclose personal health information in violation of the HIPAA
| 2009-10-31 | null | 2,009 |
35 | 34 | Center for Neurosciences | AZ | null | 1,100 | 12/15/2009 | Theft | Laptop | 2014-01-23 | null | 2009-12-15 | null | 2,009 |
36 | 35 | Brown University | RI | Blue Cross Blue Shield of RI | 528 | 12/11/2009 | Other | Paper | 2014-01-23 | On January 5, 2010, BCBSRI was notified that a 16 page report pertaining to Brown University's health plan was impermissibly disclosed to two other BCBSRI agents. The reports contained the PHI of approximately 528 individuals. The PHI involved: first and last names, dates of service, cost of medical care provided, and member identification numbers. Following the breach, BCBSRI recovered the reports, received written assurances that any electronic copies of the reports were deleted, notified affected individuals of the breach, implemented new procedure for all outgoing correspondence, and is in the process of auditing all affected members' claim history to ensure no fraud.
| 2009-12-11 | null | 2,009 |
37 | 36 | MMM Heath Care Inc. | PR | MSO of Puerto Rico, Inc. | 1,907 | 2/4/2010 | Theft | Paper | 2014-06-03 | The covered entity's (CE) business associate (BA) erroneously merged two lists which led to the disclosure of protected health information (PHI) of 1,907 individuals. The PHI included names, internal identification numbers, and the number of emergency room visits. Upon discovery of the breach, the CE's BA established a quality control process in order to ensure adequate safeguards for that letters that are sent by mail. As a result of OCR's investigation, the CE created and implemented additional policies and procedures for quality control of mailings. The CE also provided training to all staff on its revised privacy and security policies and procedures.
| 2010-02-04 | null | 2,010 |
38 | 37 | PMC Medicare Choice | PR | MSO of Puerto Rico | 605 | 2/4/2010 | Theft | Paper | 2014-06-03 | The covered entity's (CE) business associate (BA) erroneously merged two lists which led to the disclosure of protected health information (PHI) of 605 individuals. The PHI included names, internal identification numbers, and the number of emergency room visits. Upon discovery of the breach, the CE's BA established a quality control process in order to ensure adequate safeguards for that letters that are sent by mail. As a result of OCR's investigation, the CE created and implemented additional policies and procedures for quality control of mailings. The CE also provided training to all staff on its revised privacy and security policies and procedures.
| 2010-02-04 | null | 2,010 |
39 | 38 | Cardiology Consultants/Baptist Health Care Corporation | FL | null | 8,000 | 12/19/2009 | Theft | Desktop Computer | 2014-06-30 | A desktop computer that contained the e-PHI of approximately 8,000 individuals was stolen from the covered entity's (CE) locked medical suite. The PHI involved in the breach included names, dates of birth, medical record numbers, ultrasound information, exam dates, and reasons for the ultrasound. The computer that was stolen used proprietary software and a special electronic key to access the PHI. The CE provided breach notification to affected individuals, HHS, and the media and posted substitute notification on its website. Following the breach, the CE worked with law enforcement to identify the possible suspect. The CE upgraded its facility access controls to include proximity card readers for every location that stores PHI. As a result of OCR's investigation the CE updated its risk analysis and carried out additional risk management activities.
| 2009-12-19 | null | 2,009 |
40 | 39 | State of TN, Bureau of TennCare | TN | null | 3,900 | 12/23/2009 | Theft | Paper | 2014-06-24 | The covered entity (CE) mailed the wrong information to 3,900 individuals based on a corrupted data file it received from a state agency. The types of PHI involved were names, dates of birth, social security numbers, member identification numbers, and in some cases, diagnoses, treatments, conditions, and medications. Following the breach, the CE immediately fixed the corrupted file and mailed corrected letters. The CE provided breach notification to HHS, the media, and affected individuals and provided substitute notification by posting on its website. It also offered affected individuals one year of free credit monitoring and comprehensive credit services. The CE also worked with the state agency to implement a new procedure to improve safeguards for PHI. OCR obtained assurances that the CE implemented the corrective action listed above.
| 2009-12-23 | null | 2,009 |
41 | 40 | Lucille Packard Children's Hospital | CA | null | 532 | 1/11/2010 | Other | Desktop Computer | 2014-01-23 | null | 2010-01-11 | null | 2,010 |
42 | 41 | University of New Mexico Health Sciences Center | NM | null | 1,900 | 2/8/2010 | Other | Desktop Computer | 2014-01-23 | null | 2010-02-08 | null | 2,010 |
43 | 42 | Advanced NeuroSpinal Care | CA | null | 3,500 | 12/30/2009 | Theft | Network Server | 2014-04-22 | A computer containing the electronic protected health information (ePHI) of 3,500 individuals was stolen from the office of a covered entity (CE). The ePHI included patient names, addresses, dates of birth, social security numbers, driver's licenses, claims information, diagnoses, and conditions. As a result of the loss, the CE upgraded the alarm system and replaced the server housing and storage security lock-up. The CE also notified affected individuals, the media, appropriate government agencies, and law enforcement. In addition, the CE established an office-based hotline to assist affected individuals. As a result of OCR's investigation, the CE has implemented regularly scheduled security risk analyses and has installed window bars, roll down shutters, four video surveillance cameras, and other physical security measures to prevent theft. | 2009-12-30 | null | 2,009 |
44 | 43 | Aspen Dental Care P.C. | CO | null | 2,500 | 10/4/2009 | Theft | Other | 2014-06-30 | A computer hard drive containing encrypted patient records was stolen from the covered entity's (CE) safe. The hard drive contained clinical and demographic information of approximately 2,500 patients. Following the breach, the CE provided additional training to its staff. OCR obtained assurances that the CE implemented the corrective action listed above.
| 2009-10-04 | null | 2,009 |
45 | 44 | Shands at UF | FL | null | 12,580 | 1/27/2010 | Theft | Laptop | 2014-01-23 | A laptop containing certain information collected on approximately 12,580 individuals referred to Shands at UF GI Clinical Services was stolen from the private residence of an employee. The stolen information included patient names, social security numbers, and medical record numbers. As a result of the incident, the employee was counseled by her supervisor, issued written corrective action with a 3-day suspension, and provided additional HIPAA training. OCR reviewed Shands at UF's most recent Risk Analysis and Risk Management Plans and they revealed no high risk findings related to encryption, workstation use, or physical security. OCR's investigation found that Shands at UF has implemented appropriate technical safeguards, such as secure VPN network connections and network storage for workforce usage, encrypted USB portable flash drives, and PGP whole disk encryption.
| 2010-01-27 | null | 2,010 |
46 | 45 | Wyoming Department of Health | WY | null | 9,023 | 12/2/2009 | Unauthorized Access/Disclosure | Network Server | 2014-01-23 | null | 2009-12-02 | null | 2,009 |
47 | 46 | Thrivent Financial for Lutherans | WI | null | 9,500 | 1/29/2010 | Theft | Laptop | 2014-01-23 | On January 29, 2010, there was a break-in at one of the Thrivent's offices and five laptop computers were stolen; four of the five laptops were recovered. The missing laptop computer contained the protected health information of approximately 9,400 individuals. The protected health information involved in the breach included name, address, date of birth, social security number, prescription drugs, medical condition, age, weight, etc. Thrivent provided OCR with additional controls to remedy causes of security breach at various stages of implementation. The actions taken by the CE prior to OCR's formal investigation brought the CE into compliance.
| 2010-01-29 | null | 2,010 |
48 | 47 | North Carolina Baptist Hospital | NC | null | 554 | 2/15/2010 | Theft | Paper | 2014-01-23 | null | 2010-02-15 | null | 2,010 |
49 | 48 | Montefiore Medical Center | NY | null | 625 | 2/20/2010 | Theft | Laptop | 2014-06-03 | An unencrypted laptop computer containing the electronic protected health information (ePHI) of 625 individuals was stolen from the covered entity's (CE) mobile dental van. The ePHI included names, dates of birth, medical record numbers and dental x-rays. Upon discovery of the breach, the CE filed a police report and provided breach notification to HHS, the media and affected individuals. As a result of OCR's investigation, the CE revised its procedures so that all ePHI is stored in a data center, rather than the mobile dental van laptop. In addition, the CE encrypted all mobile dental van laptops and improved physical security for the van. The CE developed a new policy on ePHI security and retrained all staff. OCR obtained assurances that the CE implemented the corrective action listed above. | 2010-02-20 | null | 2,010 |
50 | 49 | Ernest T. Bice, Jr. DDS, P.A. | TX | null | 21,000 | 2/20/2010 | Theft | Other Portable Electronic Device, Other | 2014-01-23 | Three unencrypted external back-up drives were stolen from a safe in the covered entity's locked office. The laptop computer contained the protected health information of approximately 21,000 individuals. The protected health information involved in the breach included names, addresses phone numbers, dates of birth, social security numbers, insurance information, and treatment histories. Following the breach, the covered entity moved back-up data offsite and encrypted all workstations. Additionally, OCR's investigation resulted in the covered entity improving their physical safeguards and in retraining employees.
| 2010-02-20 | null | 2,010 |
51 | 50 | Lee Memorial Health System | FL | null | 3,800 | 1/29/2010 | Other | Paper | 2014-01-23 | The covered entity sent postcards to approximately 3,800 patients, which listed the patients' demographic information, and a statement that read, 'Your Physician Has Moved,' with a name and description of the practice, Infectious Disease Specialist. The types of PHI involved were demographic and clinical information. Voluntary actions taken prior to OCR's investigation include the issuance of sanctions and review of policies and procedures.
| 2010-01-29 | null | 2,010 |
52 | 51 | Laboratory Corporation of America/Dynacare Northwest, Inc. | WA | null | 5,080 | 2/12/2010 | Theft | Laptop | 2014-01-23 | A laptop computer was stolen from a workforce member's car. The laptop computer contained the protected health information of approximately 5080 individuals. The protected health information involved in the breach included names, addresses, dates of birth, Social Security numbers, and lab results. Following the breach, the covered entity encrypted all laptop computers.
| 2010-02-12 | null | 2,010 |
53 | 52 | Mount Sinai Medical Center | FL | null | 2,600 | 3/9/2010 | Theft | Laptop | 2014-01-23 | null | 2010-03-09 | null | 2,010 |
54 | 53 | Griffin Hospital | CT | null | 957 | 2/4/2010 | Hacking/IT Incident | Network Server | 2014-01-23 | null | 2010-02-04 | null | 2,010 |
55 | 54 | Hypertension, Nephrology, Dialysis and Transplantation, PC | AL | null | 2,465 | 3/6/2010 | Theft | Laptop | 2014-01-23 | null | 2010-03-06 | null | 2,010 |
56 | 55 | Reliant Rehabilitation Hospital North Houston | TX | Computer Program and Systems, Inc. (CPSI) | 768 | 2/9/2010 | Unauthorized Access/Disclosure | E-mail | 2014-01-23 | null | 2010-02-09 | null | 2,010 |
57 | 56 | Laboratory Corporation of America / US LABS / Dianon Systems, Inc | AZ | null | 2,773 | 2/18/2010 | Theft | Other Portable Electronic Device | 2014-01-23 | null | 2010-02-18 | null | 2,010 |
58 | 57 | University of Pittsburgh Student Health Center | PA | null | 8,000 | 3/11/2010 | Theft, Loss | Paper | 2014-01-23 | null | 2010-03-11 | null | 2,010 |
59 | 58 | Providence Hospital | MI | null | 83,945 | 2/4/2010 | Other | Other | 2014-01-23 | null | 2010-02-04 | null | 2,010 |
60 | 59 | VHS Genesis Lab Inc. | IL | null | 6,800 | 1/10/2010 | Loss | Paper | 2014-01-23 | null | 2010-01-10 | null | 2,010 |
61 | 60 | John Muir Physician Network | CA | null | 5,450 | 2/4/2010 | Theft | Laptop | 2014-01-23 | null | 2010-02-04 | null | 2,010 |
62 | 61 | Beatrice Community Hospital and Health Center | NE | McKesson Information Solutions, LLC | 660 | 3/19/2010 | Other | Paper | 2014-01-23 | null | 2010-03-19 | null | 2,010 |
63 | 62 | Pediatric Sports and Spine Associates | TX | null | 955 | 2/10/2010 | Theft | Laptop | 2014-01-23 | An unencrypted laptop was stolen from an employee's vehicle. The laptop contained the protected health information of approximately 955 individuals. The protected health information involved in the breach included names, addresses, dates of birth, social security numbers, diagnoses, medications and other treatment information. Following the discovery of the breach, the covered entity revised policies, retrained staff and implemented additional physical and technical safeguards including encryption software. The covered entity also removed the stolen laptop's access to the server, sanctioned the involved employee, notified the affected individuals and notified the local media.
| 2010-02-10 | null | 2,010 |
64 | 63 | Affinity Health Plan, Inc. | NY | null | 344,579 | 11/24/2009 | Theft | Other | 2014-05-28 | null | 2009-11-24 | null | 2,009 |
65 | 64 | Tomah Memorial Hospital | WI | null | 600 | 3/19/2010 | Other | Other | 2014-01-23 | null | 2010-03-19 | null | 2,010 |
66 | 65 | Praxair Healthcare Services, Inc. (Home Care Supply in NY) | CT | null | 54,165 | 2/18/2010 | Theft | Laptop | 2014-01-23 | A laptop computer was stolen from the covered entity's office by a former employee after it had been damaged. The laptop computer contained the PHI of approximately 54,165 individuals. The computer contained a limited amount of PHI, including client names and one or more of the following: addresses, phone numbers, social security numbers, insurance provider names and policy numbers, medical diagnostic codes or medical equipment. Following the breach, the covered entity notified all affected individuals, the media, and HHS of the breach. Additionally, the covered entity completed its laptop encryption project to cover all PHI stored on computers in the office. Additionally, OCR's investigation resulted in the covered entity reinforcing the requirements of HIPAA to its employees.
| 2010-02-18 | null | 2,010 |
67 | 66 | Massachusetts Eye and Ear Infirmary | MA | null | 3,594 | 2/19/2010 | Theft | Laptop | 2014-01-23 | null | 2010-02-19 | null | 2,010 |
68 | 67 | Blue Cross & Blue Shield of Rhode Island | RI | null | 12,000 | 12/20/2009 | Theft | Paper | 2014-06-30 | A covered entity (CE) donated a file cabinet containing the protected health information (PHI) of 12,000 individuals before cleaning it out. The PHI included members' names, addresses, telephone numbers, social security numbers, and Medicare identification numbers. The covered entity (CE) provided breach notification to HHS, the affected individuals, and media, and offered all affected individuals free credit monitoring for a period of one year. Following the breach, the CE sanctioned the employees involved in the incident and held a mandatory training regarding the HIPAA Privacy and Security Rule for all departments involved in the breach. The CE also revised the policy for office moves. OCR obtained assurances that the CE implemented the corrective action listed above.
| 2009-12-20 | null | 2,009 |
69 | 68 | South Carolina Department of Health and Environmental Control | SC | null | 2,850 | 2/17/2010 | Improper Disposal | Paper | 2014-01-23 | null | 2010-02-17 | null | 2,010 |
70 | 69 | St. Joseph Heritage Healthcare | CA | null | 22,012 | 3/6/2010 | Theft | Desktop Computer | 2014-01-23 | 22 computers were stolen from Clinical Management Service office.Five of the stolen computers contained the protected health information of approximately 22,012 individuals. The protected health information involved in the breach included name, date of birth, social security number, referral number, encounter number, facility, member ID, diagnosis, procedure, and/or diagnosis code. As a result of this incident, St. Joseph notified the potentially affected individuals, notified the local media, installed security cameras, re-trained employees, and installed encryption software on all laptops and Computers enterprise-wide. OCR's investigation resulted in the covered entity improving their physical and technological safeguards and retraining employees.
| 2010-03-06 | null | 2,010 |
71 | 70 | Medical Center At Bowling Green | KY | null | 5,148 | 3/24/2010 | Theft | Other Portable Electronic Device, Other | 2014-01-23 | null | 2010-03-24 | null | 2,010 |
72 | 71 | GENERAL AGENCIES WELFARE BENEFITS PROGRAM | TN | TOWERS WATSON | 1,874 | 2/5/2010 | Loss | Other | 2014-01-23 | null | 2010-02-05 | null | 2,010 |
73 | 72 | UnitedHealth Group health plan single affiliated covered entity | MN | null | 735 | 3/2/2010 | Theft | Other, Paper | 2014-01-23 | null | 2010-03-02 | null | 2,010 |
74 | 73 | South Texas Veterans Health Care System | TX | null | 1,430 | 9/30/2009 | Loss, Improper Disposal | Paper | 2014-01-23 | null | 2009-09-30 | null | 2,009 |
75 | 74 | Rockbridge Area Community Services | VA | null | 500 | 3/12/2010 | Theft | Laptop, Desktop Computer | 2014-01-23 | null | 2010-03-12 | null | 2,010 |
76 | 75 | Emergency Healthcare Physicians, Ltd. | IL | Millennium Medical Management Resources, Inc. | 180,111 | 2/27/2010 | Theft | Other Portable Electronic Device, Other | 2014-01-23 | null | 2010-02-27 | null | 2,010 |
77 | 76 | VA Eastern Colorado Health Care System | CO | null | 649 | 1/19/2010 | Theft | Paper | 2014-06-19 | A covered entity's (CE's) employee placed paper records containing protected health information (PHI) in an unsecured box that was left undiscovered in a public parking garage for four days. The box contained the PHI of 649 patients. The PHI included treatment records, productivity reports, coding information, names, medical treatments, conditions, diagnoses, and social security numbers. Upon discovery of the breach, the CE notified the affected individuals and provided credit protection to those whose social security numbers had been breached. The CE provided OCR with copies of its breach prevention policies and procedures. Following OCR's investigation, the employee who left the records resigned from her position and the CE improved its breach response procedures. | 2010-01-19 | null | 2,010 |
78 | 77 | Miami VA Healthcare System | FL | null | 568 | 1/19/2010 | Loss | Paper | 2014-01-23 | null | 2010-01-19 | null | 2,010 |
79 | 78 | Heriberto Rodriguez-Ayala, M.D. | TX | null | 4,200 | 4/3/2010 | Theft | Laptop | 2014-01-23 | null | 2010-04-03 | null | 2,010 |
80 | 79 | Georgetown University Hospital | DC | null | 2,416 | 3/26/2010 | Theft, Other | E-mail, Other Portable Electronic Device | 2014-01-23 | An employee of the covered entity emailed protected health information (PHI) to an offsite research office (which is not itself a covered entity) in violation of the review preparatory to research protocol. The research office stored the electronic information on an external hard drive that was later stolen. The device contained the PHI of 2,416 individuals. The PHI involved in the breach included names, dates of birth, and clinical information. In response to this incident, the covered entity terminated transmission of the PHI to this research office and gave the responsible employee a verbal warning and counseling. Additionally, the covered entity undertook a review of all research affiliations involving PHI of hospital patients to confirm that appropriate documentation and procedures are in place.
| 2010-03-26 | null | 2,010 |
81 | 80 | Silicon Valley Eyecare Optometry and Contact Lenses | CA | null | 40,000 | 4/2/2010 | Theft | Network Server | 2014-01-23 | null | 2010-04-02 | null | 2,010 |
82 | 81 | Loma Linda University Health Care | CA | null | 584 | 4/4/2010 | Theft | Desktop Computer | 2014-01-23 | null | 2010-04-04 | null | 2,010 |
83 | 82 | Veterans Health Administration | DC | Heritage Health Solutions | 656 | 4/22/2010 | Theft | Laptop | 2014-01-23 | null | 2010-04-22 | null | 2,010 |
84 | 83 | State of New Mexico Human Services Department, Medical Assistance Division | NM | DentaQuest | 9,600 | 3/20/2010 | Theft | Laptop | 2014-01-23 | null | 2010-03-20 | null | 2,010 |
85 | 84 | Oconee Physician Practices | SC | null | 653 | 5/9/2010 | Theft | Laptop | 2014-01-23 | null | 2010-05-09 | null | 2,010 |
86 | 85 | University of Rochester Medical Center and Affiliates | NY | null | 2,628 | 4/19/2010 | Other | Paper | 2014-01-23 | null | 2010-04-19 | null | 2,010 |
87 | 86 | Omaha Construction Industry Health and Welfare Plan | NE | DeBoer & Associates | 800 | 1/11/2009 | Theft | Laptop | 2014-01-23 | null | 2009-01-11 | null | 2,009 |
88 | 87 | City of Charlotte, NC (Health Plan) | NC | null | 5,220 | 2/3/2010 | Loss | Other | 2014-01-23 | null | 2010-02-03 | null | 2,010 |
89 | 88 | VA North Texas Health Care System | TX | null | 4,083 | 5/4/2010 | Improper Disposal | Paper | 2014-01-23 | null | 2010-05-04 | null | 2,010 |
90 | 89 | Rainbow Hospice and Palliative Care | IL | null | 1,000 | 4/12/2010 | Theft | Laptop | 2014-01-23 | An employee's laptop was stolen out of her bag while she was making an admission visit in a patient's home. The evidence showed that although the covered entity had a policy of encrypting and password-protecting its computers, this particular computer did not require a password most of the time. The invoices contained the protected health information (PHI) of approximately 1,000 individuals. The PHI stored on the laptop included names, addresses, dates of birth, phone numbers, Social Security numbers, Medicare numbers, electronic health records and commercial insurance information. Following the breach, the covered entity notified its clients of the incident, placed notice on its website and in The Daily Herald, sanctioned the employee for changing the security settings on the laptop in question, and established stringent computer security guidelines, and retrained its staff in the new requirements, with the intention of preventing a similar event from occurring again.
| 2010-04-12 | null | 2,010 |
91 | 90 | Cincinnati Childrens Hospital Medical Center | OH | null | 60,998 | 3/27/2010 | Theft | Laptop | 2014-01-23 | null | 2010-03-27 | null | 2,010 |
92 | 91 | Occupational Health Partners | KS | null | 1,105 | 5/12/2010 | Theft | Laptop | 2014-01-23 | null | 2010-05-12 | null | 2,010 |
93 | 92 | AvMed, Inc. | FL | null | 1,220,000 | 12/10/2009 | Theft | Laptop | 2014-06-30 | Two laptop computers with questionable encryption (each containing the electronic protected health information (ePHI) of 350,000 individuals) were stolen from the covered entity's (CE) premises. The types of ePHI involved included demographic and clinical information, diagnoses/conditions, medications, lab results, and other treatment data. After discovering the breach, the CE reported the theft to law enforcement and worked with the local police to recover the laptops. As a result of OCR's investigation, the CE developed and implemented new policies and procedures to comply with the Security Rule. The CE also provided breach notification to all affected individuals, HHS, and the media and placed an accounting of disclosures in the medical records of all affected individuals. | 2009-12-10 | null | 2,009 |
94 | 93 | UnitedHealth Group health plan single affiliated covered entity | MN | null | 16,291 | 1/26/2010 | Other | Paper | 2014-01-23 | Paper correspondence to certain members in UnitedHealth's prescription drug plans were in advertently sent to the incorrect temporary address due to a database administration error. Approximately 16,291 individuals were affected by the breach. UnitedHealth member's name, plan number and in some instances, date of birth and/or limited medical information. United Health reported that it stopped using PDI's proprietary database for address updates and made outbound verifications calls to members to get accurate temporary addresses. United Health reported that it revised its address update process.
| 2010-01-26 | null | 2,010 |
95 | 94 | Lincoln Medical and Mental Health Center | NY | Siemens Medical Solutions, USA, Inc | 130,495 | 3/24/2010 | Theft | Other | 2014-06-19 | The covered entity's business associate (BA), Siemens Medical Solutions USA, Inc., shipped seven unencrypted compact disks (CDs) that contained the electronic protected health information (ePHI) of 130,495 individuals to the covered entity (CE), Lincoln Medical and Mental Health Center. The CD's, containing back-up data, were lost in transit. The ePHI included names, addresses, social security numbers, medical record numbers, health plan information, dates of birth, dates of admission and discharge, diagnostic and procedural codes, and driver's license numbers. The CE provided breach notification to affected individuals, HHS, and the media. Upon discovery of the breach, the CE directed the BA to cease using the shipping service as a means of transporting the CDs. As a result of OCR's investigation, the BA adopted a procedure to encrypt CDs. The CE also implemented a procedure for a senior employee of the BA to physically deliver the encrypted CDs to the CE. The breach incident involved a BA and occurred prior to the September 23, 2013, compliance date. OCR verified that the CE had a proper BA agreement in place that restricted the BA's use and disclosure of PHI and required the BA to safeguard all PHI. | 2010-03-24 | null | 2,010 |
96 | 95 | Nihal Saran, MD | MI | null | 2,300 | 5/2/2010 | Theft | Laptop | 2014-01-23 | A password protected laptop computer containing protected health information (PHI) was stolen from Dr. Saran's personal residence. The laptop contained the PHI of approximately 2,300 individuals. The PHI stored on the laptop included patients' names, addresses, dates of birth, Social Security numbers, insurance information, and diagnoses. Following the breach, Dr. Saran notified the Northville Township Police Department of the theft, contacted the individuals reasonably believed to have been affected by the breach, sent a notice of the breach to the Detroit Free Press and the Monroe News, and installed encryption software for its billing software.
| 2010-05-02 | null | 2,010 |
97 | 96 | University of Louisville Research Foundation, Inc., DBA The Kidney Disease Program | KY | null | 708 | 10/1/2008 | Hacking/IT Incident | Network Server | 2014-01-23 | null | 2008-10-01 | null | 2,008 |
98 | 97 | St. Jude Children's Research Hospital | TN | null | 1,745 | 4/19/2010 | Loss | Laptop | 2014-01-23 | null | 2010-04-19 | null | 2,010 |
99 | 98 | TennCare | TN | DentaQuest | 10,515 | 3/20/2010 | Theft | Laptop | 2014-06-20 | A car containing an unencrypted laptop computer was stolen from West Monroe Partners, a contractor for the covered entity's (CE) business associate (BA), DentaQuest. The laptop stored a database containing the electronic protected health information (ePHI) of approximately 76,000 individuals, including data on 10,515 of the CE's members. The types of PHI involved in the breach included names, social security numbers, dates, and certain provider identification numbers. The CE and BA worked together to provide breach notification to affected individuals and the media, and offered free credit monitoring and enhanced credit services to affected individuals for one year. The CE reported the breach to HHS and provided substitute notification on its website. The BA implemented procedures to ensure that any third party laptops connecting to its network employ disk encryption. Further, the BA established a policy to prohibit contractors from storing PHI on laptops. The breach incident involved a BA and occurred prior to the September 23, 2013, compliance date. OCR verified that the CE had a proper BA agreement in place that restricted the BA's use and disclosure of PHI and required the BA to safeguard all PHI.
| 2010-03-20 | null | 2,010 |
100 | 99 | The Children's Medical Center of Dayton | OH | null | 1,001 | 4/22/2010 | Other | E-mail | 2014-01-23 | null | 2010-04-22 | null | 2,010 |