Email asking how health care nonprofit handles personal data contained personal data

Share this article:

A document inadvertently attached to a Hope Community Resources (HCR) email survey contained the personal information for thousands of people.

Ironically, the survey asked clients, among other questions, how they believed the Alaska nonprofit handles their sensitive health care information.

How many victims? All 3,700 disabled HCR clients, several of them minors.

What type of personal information? Names, addresses, and dates of birth.

What happened? The file was attached to an email survey that was sent out to collect information that the facility planned to use toward obtaining a health accreditation.   

What was the response? HCR was alerted of the incident Aug. 19, when the email was sent, and immediately took action. It attempted to recall any emails prior to delivery and asked those who opened the email to delete it. HCR is notifying everyone who has been affected.

Quote: “We plan to notify everyone involved and will be sending out an apology letter to everyone who had their personal information disclosed in the attachment,” said Tonya Rambow, HCR chief of staff.

Source: alaskadispatch.com, Alaska Dispatch, “Email accident violates privacy of thousands of Hope Community clients,” Aug. 20, 2013.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

POLL

More in The Data Breach Blog

Tampa General Hospital breach impacts hundreds of patients

Tampa General Hospital is notifying 675 patients that their personal information may have been accessed, without authorization, by a former employee.

George Mason University travel system targeted for malware attack

The incident could have exposed the names and Social Security numbers of users, although no evidence has surfaced to suggest that's the case.

Central Utah Clinic notifies over 30K patients of potential HIPAA breach

The clinic is warning patients of a potential breach after an unauthorized party accessed a server.