Attorneys General Reach Settlements for Health Data Breaches Affecting Millions

Attorneys general from 33 states have recently reached settlements concerning three significant health data breaches, which collectively impacted nearly 2 million individuals. These breaches underscore the critical importance of safeguarding protected health information (PHI) and personal data. The settlements, which address violations of state consumer protection laws and the Health Insurance Portability and Accountability Act (HIPAA), aim to hold the responsible companies accountable while providing measures to prevent future breaches.

Breach Case 1: Inmediata Software Coding Flaw

The first breach case revolves around a software coding flaw by Inmediata, a clearinghouse based in Puerto Rico. This flaw exposed sensitive PHI belonging to approximately 1.5 million individuals. The breach not only violated HIPAA regulations but also state consumer protection laws. The consequences of this coding flaw were severe, highlighting the need for heightened data security measures.

Breach Case 2: Personal Touch Home Care Ransomware Attack

Personal Touch Home Care, a Long Island-based home healthcare firm, experienced a ransomware attack that compromised the data of almost 317,000 patients and employees. This ransomware attack, a form of cyber extortion, had severe consequences for the affected individuals and demonstrated the vulnerability of healthcare organizations to malicious cyber threats. The settlement with Personal Touch aims to address both HIPAA violations and state consumer protection laws.

Settlement terms for Inmediata

As part of the settlement, Inmediata is required to implement a comprehensive information security program that includes various safeguards. This includes specific requirements for code review and crawling controls to prevent similar vulnerabilities in the future. Additionally, Inmediata must develop a robust incident response plan, including policies and procedures for consumer notification letters. To ensure compliance, the company will undergo annual third-party security assessments for five years. These terms are intended to enhance Inmediata’s data security practices and prevent future breaches that could compromise sensitive health information.

Details of the Personal Touch Home Care settlement

The settlement between Personal Touch Home Care and the New York Attorney General involves a thorough investigation into the ransomware attack. It was discovered that an employee unknowingly opened a file containing malware attached to a phishing email. This action granted unauthorized access to Personal Touch’s network, allowing the hacker to collect patient and employee records from an unencrypted server. The compromised data, which dates back decades, included confidential personal and health information such as names, addresses, Social Security numbers, medical treatments, and financial details. The investigation revealed that Personal Touch failed to maintain reasonable data security safeguards to protect patient and employee data, putting thousands of individuals at risk.

Additional breach incident at Personal Touch

During the investigation into the Personal Touch breach, it was revealed that the company’s employees were also affected by a third-party breach, resulting in the compromise of personal information, including Social Security numbers. This discovery further emphasized the urgent need for robust data security measures and comprehensive protocols to prevent breaches from external sources.

Settlement requirements for Falcon

Another company involved in the breach settlement is Falcon. As part of their settlement agreement with the attorney general’s office, Falcon is required to pay a penalty of $100,000 to the state of New York. Moreover, Falcon must ensure the use of encryption and implement proper access controls when handling private information. These requirements aim to strengthen data security practices and protect individuals’ sensitive information against potential breaches.

The recent settlements reached by attorneys general in response to health data breaches demonstrate the significance of data security and the potential consequences of failing to uphold HIPAA regulations and state consumer protection laws. These breaches, caused by software flaws and ransomware attacks, have compromised the privacy and security of millions of individuals. It is crucial for organizations to proactively implement robust information security protocols, processes, and employee training to prevent and mitigate breaches. By holding companies accountable and imposing stringent settlement terms, attorneys general are reinforcing the importance of protecting sensitive health data and personal information. Ongoing efforts are needed to ensure the security and privacy of individuals’ data, safeguarding against potential breaches now and in the future.

Explore more

Can You Spot a Deepfake During a Job Interview?

The Ghost in the Machine: When Your Top Candidate Is a Digital Mask The screen displays a perfectly polished professional who answers every complex technical question with surgical precision, yet a subtle, unnatural flicker near the jawline suggests something is deeply wrong. This unsettling scenario became reality at Pindrop Security during an interview with a candidate named “Ivan,” whose digital

Data Science vs. Artificial Intelligence: Choosing Your Path

The modern job market operates within a high-stakes environment where digital transformation has accelerated to a point that leaves even seasoned professionals questioning their specialized trajectory. Job boards are currently flooded with titles that seem to shift shape by the hour, creating a confusing landscape for those entering the technology sector. One listing calls for a data scientist with deep

How AI Is Transforming Global Hiring for HR Professionals?

The landscape of international recruitment has undergone a staggering metamorphosis that effectively erased the traditional borders once separating regional labor markets from the global economy. Half a decade ago, establishing a presence in a foreign market required exhaustive legal frameworks, exorbitant capital investment, and months of administrative negotiations. Today, the operational reality is entirely different; even nascent organizations can engage

Who Is Winning the Agentic AI Race in DevOps?

The relentless pressure to deliver software at breakneck speeds has pushed traditional CI/CD pipelines to a breaking point where manual intervention is no longer a sustainable strategy for modern engineering teams. As organizations navigate the complexities of distributed cloud systems, the transition from rigid automation to fluid, autonomous operations has become the defining challenge for the current technological landscape. This

How Email Verification Protects Your Sender Reputation?

Maintaining a flawless digital communication channel requires more than just compelling copy; it demands a rigorous defense against the invisible erosion of subscriber data that threatens every modern marketing department. Verification acts as a critical shield for the digital infrastructure of an organization, ensuring that marketing efforts actually reach the intended recipients instead of vanishing into the ether. This process