Data Breach at Medical Group Impacts 4.3 Million Patients

Aug. 26, 2013
Advocate Medical Group (AMG), part of the not-for-profit Downers Grove, Ill.-based integrated healthcare network, Advocate Health Care, had one of its administrative offices robbed in July, and computers with protected health information (PHI) were taken.

Advocate Medical Group (AMG), part of the not-for-profit Downers Grove, Ill.-based integrated healthcare network, Advocate Health Care, had one of its administrative offices robbed in July, and computers with protected health information (PHI) were taken.

AMG discovered that the computers contained the names, addresses, dates of birth and Social Security numbers of approximately 4.03 million patients. While it didn’t have medical records, it did have clinical information, such as the treating physicians and/or departments, diagnoses, medical record numbers, medical service codes, and health insurance data.

“The most important thing is that this issue has no impact on patient care,” Kevin McCune, M.D., Advocate Medical Group’s Chief Medical Officer, said in a statement. “Security is a top priority for our health care ministry. Nothing leads us to believe that the computers were taken for the information they contained or that any patient information has been used inappropriately.”

The 4.03 million patients are being notified and being offered free credit monitoring and identity theft protection. AMG says it has taken steps to reduce the possibility of this happening again. “While we are keenly focused on the investigation and security enhancements, everyone’s efforts right now are concentrated on our affected patients,” McCune said. “If one patient is impacted – that’s one too many.”

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...