Burglars Steal Server at Clinic

40,000 Californians notified of breach
Burglars Steal Server at Clinic
A total of 40,000 patients have been notified of a breach stemming from a burglary at a California eye care clinic in which an unencrypted server was stolen.

The April 2 burglary occurred at Silicon Valley Eyecare Optometry and Contact Lenses, Santa Clara, Calif. The server contained the practice's patient database, including names, addresses, phone numbers, and, in some cases, Social Security numbers, e-mail addresses, birth dates, family member names, insurance information and health information.

Local police have arrested one unnamed suspect in the case, who confessed to the crime, the practice reports. Security cameras showed two burglars entering through a window, and the search continues for the second intruder. But so far, authorities have no evidence that fraud has been committed using the data.

The practice notified patients, as well as federal regulators, as required under the HITECH Act Breach Notification Rule. It had backup data for all the information on the server stored off-site.

The practice is advising all its patients to monitor their insurance statements for errors, place a fraud alert on the credit files and monitor their credit reports.

In the wake of the incident, the practice has boosted physical security, storing the server in a locked safe bolted to the floor.


About the Author

Howard Anderson

Howard Anderson

News Editor, ISMG

Anderson is news editor of Information Security Media Group and was founding editor of HealthcareInfoSecurity and DataBreachToday. He has more than 40 years of journalism experience, with a focus on healthcare information technology issues. Before launching HealthcareInfoSecurity, he served as founding editor of Health Data Management magazine, where he worked for 17 years, and he served in leadership roles at several other healthcare magazines and newspapers.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.