Identity theft in the US in 2013 (so far)

January 30, 2013 |

The Privacy Rights Clearing House performs the valuable task of advising on privacy issues, considering and acting on complaints and recording privacy breaches.

In 2013 alone the Clearing house recorded 27 breaches involving 22,031 records.  Those breaches are categorised and described as:

January 26, 2013 Wilton Brands LLC, www.wilton.com
Woodridge, Illinois
BSR HACK Unknown
Customers who made purchases on www.wilton.combetween October 8, 2012 and January 8, 2013 may have had their credit or debit card information exposed.  A Wilton service provider discovered the issue on or around January 8, 2013.  A malicious user accessed the website information and payment card numbers, expiration dates, and security codes may have been exposed.  Customer names, addresses, and telephone numbers are also at risk.This incident is in addition to the hacking incident that took place between July and October of 2012.  That incident was reported on December 12, 2012.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 24, 2013 Brentwood Primary Care Clinic
Jacksonville, Florida
MED INSD 261
A dishonest intern was caught using a cell phone to illegally photograph patient Social Security numbers and names.  The photos were then sent to another person; presumably for fraudulent activity.  The office intern was charged with fraudulent use of personal identification information. It is unclear when the breach was discovered since the photos were taken between May 7 and June 19.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 261

January 24, 2013 Eastern Illinois University
Charleston, Illinois
EDU DISC 430 (No SSNs or financial information reported)
At least 65 students received information about the grade point average of 430 students during early January 2013.  The breach occurred when a spreadsheet that contained the information and the E-number of 430 students was accidentally made available online.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 22, 2013 NECA/IBEW Family Medical Care Plan
Rockville, Maryland
MED DISC Unknown
NECA/IBEM Family Medical Care Plan (FMCP) participants received disclosure documents related to benefits coverage and modifications.  The outside of the envelopes in which the documents arrived displayed participant Social Security numbers.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 18, 2013 Stanford School of Medicine, Lucile Packard Children’s Hospital
Palo Alto, California
MED PORT Unknown
Those with questions may call 1-855-731-6016.The January 9 theft of a laptop from a physician’s car may have exposed sensitive information.  The laptop may have contained some combination of patient names, dates of birth, and contact information.UPDATE (01/22/2013): A total of 57,000 patients are being notified. Medical information and medical record numbers were exposed.  A limited number of patients had their contact information exposed.  Most of the information on the laptop was from 2009.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 17, 2013 St. Mark’s Medical Center
La Grange, Texas
MED HACK 2,988
An employee’s computer was found to contain malware.  The malware infection began on May 21, 2012 and was discovered on November 15, 2012.  Files stored on the computer contained billing information with patient names, Social Security numbers, account numbers, medical record numbers, dates of birth, gender, treatment dates, insurance provider names, and account balances.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 2,988

January 12, 2013 Zaxby’s
Athens, Georgia
BSR HACK Unknown
Over 108 Zaxby’s restaurants experienced a breach related to customer credit and debit cards.  A number of people experienced credit card fraud and an investigation led to Zaxby’s as a common point of purchase.  Suspicious files were found on Zaxby’s system during the subsequent investigation.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 12, 2013 Florida Department of Juvenile Justice
Tallahassee, Florida
GOV PORT 100,000 (No SSNs or financial information reported)
A press release can be found here: http://www.djj.state.fl.us/news/press-releases/press-release-detail/2013/01/11/information-security-breach-reported-at-djjA mobile device that contained both youth and employee records was reported stolen on January 2, 2013.  Over 100,000 records were on the device and may have been exposed.  The device was taken from a Department of Juvenile Justice office and was neither encrypted nor password-protected.  Department of Juvenile Justice policy requires such devices to be encrypted.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 12, 2013 Florida Department of Juvenile Justice
Tallahassee, Florida
MED STAT Unknown
On September 6, 2012 it was reported that three computers that contained information from the Florida Department of Juvenile Justice were stolen from an apartment site earlier in the week.  A television was also taken at the time of the theft.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 11, 2013 EJ Phair Brewing Company and Alehouse
Concord, California
BSR HACK Unknown
Customers who used credit or debit cards at EJ Phair discovered fraudulent chargers on their payment cards.  A hacker or hackers managed to access and misuse payment card numbers once they ran through EJ Phair’s system.  It appears that customers who used cards at the location between September and late November of 2012 may have been affected.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 10, 2013 City of Macon Georgia
Macon, Georgia
GOV STAT Unknown
A computer repair shop bought used computers on govdeals.com in 2011.  The computers were found to have information from city employees when they were removed from storage on January 5.  Social Security numbers, pension information, and other personal information from Macon police officers were on the computers.  Information from local businesses that was used for city purposes was also on the computers.  A total of 39 hard drives, two servers, and two CPUs were purchased and may have contained sensitive information.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 10, 2013 KTSU Texas Southern University
Houston, Texas
EDU INSD Unknown
Texas Southern University’s radio station KTSU gave a volunteer position to a person with a criminal history of credit card fraud.  The volunteer was later arrested for allegedly using the radio station’s donation drive to steal credit card information.  The dishonest volunteer faces up to 300 counts of credit card fraud for attempting to misuse the information on donor pledge sheets.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 10, 2013 Office of Dr. Sandra Bujanda-Wagner
Aurora, Colorado
MED PHYS Unknown
Employees accidentally threw out hundreds of patient records.  The dental records were found by someone looking through a dumpster and the incident was reported to a local news team.  Names, Social Security numbers, dates of birth and addresses were exposed. Employees from Bujanda-Wagner’s office came to recover the documents.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

January 8, 2013 Morgan Road Middle School
Hephzibah, Georgia
EDU PORT Unknown
An unencrypted flash drive was stolen from a teacher’s car.  It contained student Social Security numbers and other information.
Information Source:
Databreaches.net
records from this breach used in our total: 0

January 8, 2013 Charlotte-Mecklenburg Schools
Charlotte, North Carolina
EDU PHYS 80
An employee working in human resources was robbed while transporting information between school districts.  The employee stopped for lunch and discovered that personnel files containing names, Social Security numbers, addresses, dates of birth, and driver’s license numbers had been stolen from their car.
Information Source:
Databreaches.net
records from this breach used in our total: 80

January 8, 2013 Texas Department of Health and Human Services
Austin, Texas
MED INSD Unknown
A dishonest employee was arrested on suspicion of misusing client information to apply for credit cards.  The dishonest employee was able to pose as different clients seeking immunizations and other services.  She was charged with fraudulent use or possession of identifying information and credit card abuse.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

January 7, 2013 Centric Group, LLC
St. Louis, Missouri
BSR UNKN Unknown
It is not clear if this breach is related to the August 2010 theft of a laptop from Centric Software in Campbell, California.Those with questions may call 1-800-416-4601.Anyone who purchased items on www.accesscatalog.com using a credit card may have been affected by a breach that began in August 2010.  An unauthorized party may have obtained names, credit or debit card numbers, expiration dates, and payment card verification codes.  Centric Group learned of the incident on or around December 13, 2012.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 7, 2013 Office of Dr. Calvin L. Schuster
Reedley, California
MED STAT 532 (No SSNs or financial information reported)
Those with questions may call Dr. Schuster’s office at 1-855-638-1443.A computer was stolen during an office burglary that occurred sometime around November 5, 2012.  The computer contained patient names, dates of birth, and a minimal amount of patient medical information.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 7, 2013 Woodwinds Hospital
Woodbury, Minnesota
MED INSD Unknown
An employee kept 200 pages of confidential information in an effort to prove that Woodwinds Hospital was trying to conceal evidence of medical misconduct.  The employee was discharged in 2010 for reasons unrelated to removing the information.  She claims to have taken them home after being ordered to destroy any information related to incidents that could damage Woodwinds Hospital’s reputation.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

January 6, 2013 Oldcastle APG, Inc.
Atlanta, Georgia
BSR PORT 5,083
A laptop was stolen from an employee’s car on or around December 10.  APG employees may have had their names, Social Security numbers, bank account information, and other information exposed.
Information Source:
Databreaches.net
records from this breach used in our total: 5,083

January 4, 2013 Reyes Beverage Group
Rosemont, Illinois
BSR DISC Unknown
Those with questions may call Reyes Holdings Ethics Hotline at (888) 295-6392 or email ethicshotline@reyesholdings.comA report containing the names and Social Security numbers of a group of Reyes Beverage Group’s California employees was accidentally sent to the personal email address of an employee of Reinhart Foodservice.  Reinhart Foodservice is a Reyes Holdings company as well.  It is unclear how the email was accidentally sent and why it ended up in the personal email of an employee at a different division.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 4, 2013 Healing Hearts
Jacksonville, North Carolina
MED INSD Unknown
The owner of a group of childcare services pleaded guilty to defrauding Medicaid of $8 million.  She and a co-defendant targeted medicaid recipients in order to enroll them in a program and make fraudulent Medicaid claims for mental and behavioral health services.  Additionally, the owner pleaded guilty to misusing at least one therapist’s credentials in order to make the claims for mental and behavioral health services.  The scheme took place between 2008 and 2012.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 3, 2013 Mission Hospital, St. Joseph Health
Mission Laguna Beach, California
MED PORT Unknown
Someone called Mission Hospital on August 28, 2012 and claimed that he found a flash drive with sensitive patient information in his garage.  The flash drive was returned to Mission Hospital via mailed envelope on September 11, 2012.  Patients who received services at Mission Hospital between September and November of 2008 may have had their information exposed. The notice that was sent to patients was dated September 14, 2012.  It appears that a contractor or employee misplaced the unencrypted flash drive.The flash drive contained names, medical record numbers, and account numbers. Additionally, the flash drive may have contained some combination of date of admission, age, birth date, vital readings, physical examination, gender, race, name of physician, medical history, past and current treatment and illnesses, history of substance use, family history, lab tests and results, imaging tests and results, body weight, physician notes on patient, care plan, employment status and employer, prognosis, diagnosis, treatment recommendations, allergies, medications, comments about patient’s appearance, patient health complaint, symptoms, reason for referral, and reason for admission information.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

January 3, 2013 King Drug & Home Care
Owensboro, Kentucky
MED PORT 13,619
An employee reported that a portable hard drive was missing on November 23, 2010.  The device had last been seen sometime around November 19.  The data on the device included information from before July 31, 2009.  Client names, Social Security numbers, medical record numbers, account numbers, dates of service, race, insurance carriers and insurance numbers, addresses, phone numbers, sex, dates of birth, diagnosis information, allergies, initial referral forms, patient assessments/plans of care, physician orders and/or delivery ticket information may have been on the hard drive.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 13,619

January 2, 2013 Rosenthal Collins Group
Chicago, Illinois
BSF HACK Unknown
Anyone who suspects they were a victim of identity theft because of this incident should report it to Rosenthal Collins Group at creditprotection@rcgdirect.com.An unauthorized intrusion was detected on the morning of Tuesday November 27.  The unauthorized access began on November 26 and access to the breached web application was immediately shut down upon discovery.  Customers who completed Rosenthal Collins Group account forms online may have had their names, Social Security numbers, addresses, dates of birth, range of net worth and income, bank names, passwords for accessing the web application, and email addresses exposed.
Information Source:
California Attorney General
records from this breach used in our total: 0

January 2, 2013 Mid America Health, Inc. (MAH)
Greenwood, Indiana
MED PORT Unknown
The location of the breach is listed as the corporate headquarters of MAH.Those with questions or concerns may contact the MAH Compliance Department at 1-855-224-0004.The theft of a laptop resulted in the exposure of patient information.  Names, Social Security numbers, dates of birth, residential facility names, and digital oral x-ray images may have been exposed.  Specific details of the case are being withheld until the breach investigation has concluded.
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

January 2, 2013 Hospice of North Idaho (HONI)
Hayden, Idaho
MED PORT 441 (No SSNs or financial information reported)
Read the full agreement between HHS and HONI here: http://www.hhs.gov/ocr/privacy/hipaa/enforcement/examples/honi-agreement.pdfThe June 2010 theft of an unencrypted laptop from an employee’s car resulted in the exposure of patient information.  The HHS Office for Civil Rights investigated the breach and found that HONI had not conducted a risk analysis to safeguard electronic protected health information.  It was also discovered that HONI did not meet a HIPAA Security Rule that required them to have policies or procedures in place to address mobile device security.  HONI agreed to pay the U.S. Department of Health and Human Services’ (HHS) $50,000 regarding potential Health Insurance Portability and Accountability Act of 1996 Security Rule violations.  HONI also began taking extensive steps to improve their HIPAA Privacy and Security compliance program since the June 2010 breach.

 

 

 

Leave a Reply