At Chicago Rush Medical Center, an employee of one of the hospital system’s billing processing vendors, has exposed patients’ data. The details included names, addresses, social security numbers and health insurance information. The file was shared with an unauthorized party and affected about 45,000 Medical Center clients.
There was no medical data compromised. Although the leakage happened in May 2018, the incident was discovered only on January 22. The details were stated in a financial filing on February 12 and on February 25 the patients whose data was breached got an email from the Center commenting the situation.
It is not clear whether a document was shared accidentally or maliciously, the human factor is the reason why the personal data was leaked.
Rush claims that the contract with the vendor has been suspended and that the internal procedures and contracting processes are now being reviewed.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!