Risk
10/15/2009
03:47 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Laptop Theft Nets Data On 800,000 Doctors

The stolen laptop contained personal data on nearly every physician in the country.

The theft of a laptop belonging to an employee of an insurance trade group has put hundreds of thousands of physician around the country at risk of identity theft.

The laptop, belonging to an employee of the Blue Cross and Blue Shield Association (BCBSA), was stolen from a car in late August, according to reports in the Boston Globe and the Chicago Tribune. It contained a database listing the business and personal information of about 800,000 doctors.

There were about 732,000 practicing physicians in the U.S. at the end of 2007, according to a spokesperson for the American Medical Association.

The BCBSA, which represents various Blue Cross health groups across the U.S., did not immediately respond to a request for comment.

A spokesperson for the American Medical Association confirmed that the organization had been warning physicians about the breach.

"The AMA is advising physicians to be on guard for potential identify theft as a result of a breach of physician personal data at BlueCross BlueShield Association (BCBSA)," said AMA President J. James Rohack, M.D. in an statement. "The AMA has met with BCBSA to express our concerns and learn what steps are being taken to protect physicians in the wake of this information breach."

Rohack said that BlueCross Blue Shield Plans will offer credit monitoring services to affected physcians and he urged doctors to keep an eye out for fraud arising from the breach. He said that the AMA is working with BCBSA to decide on additional steps that can be taking to mitigate the risk of identity theft.

The Blue Cross and Blue Shield Association reportedly told the Tribune that the employee in question had violated corporate policy by transferring the data to a personal laptop. According to the Globe's account, Blue Cross-Blue Shield maintains the data in encrypted form on its servers, but the employee copied the data after it had been decrypted.

Only a portion of the physician records in the database -- 16% to 20% -- on the stolen laptop include a social security number as an identifier. No patient data is believed to be involved.

This bMighty Webcast explores how midsize businesses can keep their laptops secure. It happens Thursday, Oct. 15, 2009. Find out more and register.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio