www.hipaajournal.com Open in urlscan Pro
64.91.246.83  Public Scan

Submitted URL: https://t.co/zx0QJ2V0RZ
Effective URL: https://www.hipaajournal.com/resources-for-human-development-wellstar-health-central-vermont-eye-care-announce-data-breaches/
Submission: On April 18 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.hipaajournal.com/

<form role="search" method="get" id="searchform" class="searchform" action="https://www.hipaajournal.com/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input value="" placeholder="Search" name="s" id="s" type="text">
    <input id="searchsubmit" value="Search" type="submit">
  </div>
</form>

POST /resources-for-human-development-wellstar-health-central-vermont-eye-care-announce-data-breaches/#wpcf7-f20176-o1

<form action="/resources-for-human-development-wellstar-health-central-vermont-eye-care-announce-data-breaches/#wpcf7-f20176-o1" method="post" class="wpcf7-form init" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="20176">
    <input type="hidden" name="_wpcf7_version" value="5.5.6">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f20176-o1">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response" value="">
  </div>
  <p class="title">HIPAA<br>Compliance<br>Checklist</p>
  <p class="subtitle">Simple Guidelines<br>Immediate PDF Download</p>
  <div class="form_fields">
    <p><label> <span id="wpcf7-625d5b0413bfa-wrapper" class="wpcf7-form-control-wrap email-wrap" style="display:none !important; visibility:hidden !important;"><input type="hidden" name="email-time-start" value="1650285316"><input type="hidden"
            name="email-time-check" value="4"><label for="wpcf7-625d5b0413bfa-field" class="hp-message">Please leave this field empty.</label><input id="wpcf7-625d5b0413bfa-field" class="wpcf7-form-control wpcf7-text" type="text" name="email"
            value="" size="40" tabindex="-1" autocomplete="new-password"></span> </label></p>
    <p><label> <span class="wpcf7-form-control-wrap text-583"><input type="text" name="text-583" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
            placeholder="Name *"></span></label></p>
    <p><label> <span class="wpcf7-form-control-wrap email-837"><input type="email" name="email-837" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true"
            aria-invalid="false" placeholder="Work Email *"></span> </label></p>
    <p><label> <span class="wpcf7-form-control-wrap tel-253"><input type="tel" name="tel-253" value="" size="40" class="wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel" aria-required="true"
            aria-invalid="false" placeholder="Phone *"></span> </label></p>
    <p><input type="submit" value="Download FREE Checklist Now" class="wpcf7-form-control has-spinner wpcf7-submit"><span class="wpcf7-spinner"></span></p>
  </div>
  <p class="small">Immediate Access</p>
  <p class="small"><a href="https://www.hipaajournal.com/privacy-policy/" data-wpel-link="internal">Privacy Policy</a></p>
  <input type="hidden" class="wpcf7-pum" value="{&quot;closepopup&quot;:false,&quot;closedelay&quot;:0,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-3147" method="post" data-id="3147" data-name="Default sign-up form">
  <div class="mc4wp-form-fields">
    <div class="newsletter_signup" style="text-align: center; padding-bottom: 0;">
      <!-- <p class="heading" style="color: #484848; font-size: 24px; line-height: 30px; font-weight: 400; margin: 20px 0 20px;">Free Weekly Newsletter</p> -->
      <p class="details" style="margin-bottom: 0; font-weight: 600;color: #ff6c69;font-size: 18px;">Receive weekly HIPAA news directly via email</p>
      <p class="newsletterct" style="text-align: center; color: #f2f2f2;font-size: 16px;line-height: 22px;">HIPAA News<br> Regulatory Changes<br> Breach News<br> HITECH News<br> HIPAA Advice</p>
      <div style="margin: 10px 20px 0;">
        <p>
          <input required="required" placeholder="Your email address" name="EMAIL" type="email" style="width:180px;">
        </p>
        <p>
          <input type="submit" value="Free Subscription" style="margin: 0;
	margin-top: 10px;
	font-size: 12px;
	display: inline-block;
	margin-right: 0;
	margin-bottom: 0;
	white-space: nowrap;
	line-height: 1em;
	position: relative;
	outline: none;
	overflow: visible;
	cursor: pointer;
	-moz-user-select: none;
	-webkit-user-select: none;
	-khtml-user-select: none;
	user-select: none;
	font-family: 'Helvetica',Arial,sans-serif;
	text-decoration: none;

	display: inline-block;

	color: #ffffff;
	font-family: Helvetica, sans-serif;
	font-weight: 400;
	padding: 1em 1.4em;
	line-height: 1em;
	text-decoration: none;
	text-align: center;
	white-space: nowrap;
	border: none;
	
	letter-spacing: 0.2em;
	
	background-color: #e51b33;">
        </p>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1650285316"><input type="hidden" name="_mc4wp_form_id" value="3147"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

Navigation Menu
 * HIPAA Compliance News
 * Practical HIPAA
   * HIPAA Training Requirements
   * HIPAA Risk Assessment
   * HIPAA Certification
   * HIPAA Software
   * Business Associate Agreements
   * HIPAA Compliance Officer
   * HIPAA Password Requirements
   * HIPAA and HR
   * HIPAA and SaaS
   * HIPAA and MSPs
   * HIPAA Compliance Verification
 * HIPAA Compliance Checklist
 * HIPAA Laws
   * What is a HIPAA Violation?
   * HIPAA Audit Checklist
   * HIPAA Penalties
   * HIPAA Violation Fines
   * HIPAA Privacy Rules
   * HIPAA Retention Requirements
   * HIPAA Civil Penalties
   * HITECH Act
   * HIPAA Social Media Rules
   * Common HIPAA Violations
   * What is PHI?
   * Breaking HIPAA Rules
   * New HIPAA Regulations
 * Free HIPAA Training
 * Resources
 * About HIPAA Journal

 * HIPAA Compliance News
 * Practical HIPAA
   * HIPAA Training Requirements
   * HIPAA Risk Assessment
   * HIPAA Certification
   * HIPAA Software
   * Business Associate Agreements
   * HIPAA Compliance Officer
   * HIPAA Password Requirements
   * HIPAA and HR
   * HIPAA and SaaS
   * HIPAA and MSPs
   * HIPAA Compliance Verification
 * HIPAA Compliance Checklist
 * HIPAA Laws
   * What is a HIPAA Violation?
   * HIPAA Audit Checklist
   * HIPAA Penalties
   * HIPAA Violation Fines
   * HIPAA Privacy Rules
   * HIPAA Retention Requirements
   * HIPAA Civil Penalties
   * HITECH Act
   * HIPAA Social Media Rules
   * Common HIPAA Violations
   * What is PHI?
   * Breaking HIPAA Rules
   * New HIPAA Regulations
 * Free HIPAA Training
 * Resources
 * About HIPAA Journal


RESOURCES FOR HUMAN DEVELOPMENT, WELLSTAR HEALTH & CENTRAL VERMONT EYE CARE
ANNOUNCE DATA BREACHES

Home » HIPAA Breach News » Resources for Human Development, WellStar Health &
Central Vermont Eye Care Announce Data Breaches

Posted By HIPAA Journal on Apr 13, 2022

Share this article on:

 * Facebook
 * Twitter
 * LinkedIn


RESOURCES FOR HUMAN DEVELOPMENT REPORTS BREACH AFFECTING 46,673 INDIVIDUALS

The Philadelphia, PA-based national human services nonprofit organization,
Resources for Human Development (RHD), has recently confirmed that a hard drive
containing the protected health information of 46,673 individuals has been
stolen. The theft occurred on or around January 27, 2022, and was discovered by
RHD on February 16, 2022.

The hard drive was used for its Point-to-Point program in Exton, PA, and
contained information such as names, Social Security Numbers, drivers’ license
numbers, financial account information, payment card information, dates of
birth, prescription information, diagnosis information, treatment information,
treatment providers, health insurance information, medical information,
Medicare/Medicaid ID numbers, employer identification numbers, electronic
signatures, usernames and passwords of clients and staff members.

RHD said it engaged outside forensics specialists to investigate the extent of
the breach and ensure the security of its offices and computer servers. Training
has also been provided to employees on best practices for protecting
confidential information.


LOCKBIT RANSOMWARE GANG CLAIMS DATA STOLEN FROM TAGUE FAMILY PRACTICE

The LockBit ransomware gang claims to have gained access to the systems of Tague
Family Practice in St. Louis, MO, and exfiltrated sensitive data, some of which
contained patients’ personal and protected health information.

A sample of the stolen data has been uploaded onto the gang’s data leak
site. According to Databreaches.net, which was able to access a sample of the
data, the data included claims and billing-related information. The data was
uploaded to the leak site on March 17, 2022.

At this stage, Tague Family Practice has not confirmed a data breach has
occurred and the incident has not appeared on the HHS’ Office for Civil Rights
breach portal.


EMAIL BREACH CONFIRMED BY WELLSTAR HEALTH

Atlanta, GA-based Wellstar Health has recently confirmed that employee email
accounts were accessed by unauthorized individuals who may have accessed or
obtained patient information. Wellstar Health learned about the security breach
on February 7, 2022, with the forensic investigation confirming that the breach
was limited to two email accounts. No other systems were compromised.

The email accounts were discovered to have been compromised between December 6,
2021, and January 3, 2022. Upon discovery of the breach, the email accounts were
immediately disabled and secured. A review of the accounts confirmed they
contained protected health information such as employee names, medical record
numbers, Internal account numbers, and laboratory information. No evidence was
found to indicate any patient information was misused.

It is currently unclear how many patients have been affected.


CENTRAL VERMONT EYE CARE REPORTS HACKING INCIDENT AFFECTING 30,000 PATIENTS

A hacking incident has recently been reported by the Rutland, VT-based
ophthalmology practice, Central Vermont Eye Care. The exact nature of the
hacking incident is unclear at this stage; however, it has been confirmed that
unauthorized individuals potentially gained access to the protected health
information of up to 30,000 patients. Notification letters were sent to those
individuals on April 6, 2022.

This post will be updated when further information becomes available.

Author: Steve Alder has many years of experience as a journalist, and comes from
a background in market research. He is a specialist on legal and regulatory
affairs, and has several years of experience writing about HIPAA. Steve holds a
B.Sc. from the University of Liverpool.

Share This Post On
 * Google
 * Facebook
 * Twitter
 * LinkedIn

Search for:

HIPAA
Compliance
Checklist

Simple Guidelines
Immediate PDF Download

Please leave this field empty.









Immediate Access

Privacy Policy



ABOUT HIPAA JOURNAL

HIPAA Journal provides the most comprehensive coverage of HIPAA news anywhere
online, in addition to independent advice about HIPAA compliance and the best
practices to adopt to avoid data breaches, HIPAA violations and regulatory
fines. HIPAA Journal's goal is to assist HIPAA-covered entities achieve and
maintain compliance with state and federal regulations governing the use,
storage and disclosure of PHI and PII.

RECENT NEWS

 * Urgent Team Holdings Reports Breach of the PHI of 166,600 Individuals
 * Microsoft Sinkholes Notorious ZLoader Botnet
 * SuperCare Health Sued Over 318,000-Record Data Breach
 * JekyllBot:5 Vulnerabilities Allow Hackers to Take Control of Aethon TUG
   Hospital Robots
 * Resources for Human Development, WellStar Health & Central Vermont Eye Care
   Announce Data Breaches

FREE WEEKLY NEWSLETTER

Receive weekly HIPAA news directly via email

HIPAA News
Regulatory Changes
Breach News
HITECH News
HIPAA Advice



Leave this field empty if you're human:


Email Never Shared
Cancel Any Time

Privacy Policy

 * Advertising and Sponsorship
 * Submit Press Releases
 * Newsletter Subscription
 * Terms and Conditions
 * Privacy Policy
 * Site Map

Copyright © 2014-2022 HIPAA Journal. All rights reserved.