Risk
7/8/2011
07:21 AM
50%
50%

WellPoint Fined $100,000 For Data Breach

Insurer admits being late to notify Indiana officials that records of 32,000 applicants were vulnerable for months.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
WellPoint, the nation's largest private health insurer, has agreed to pay a $100,000 fine to the state of Indiana for a data breach that left personal information of about 32,000 people exposed.

Indiana Attorney General Greg Zoeller reached a settlement with Indianapolis-based WellPoint and subsidiary Anthem Blue Cross and Blue Shield on June 23 and announced the resolution this week.

According to the settlement, WellPoint admitted that personal information of some applicants for insurance coverage in Indiana--including Social Security numbers, health records, and financial information--was accessible online between Oct. 23, 2009, and March 8, 2010, and that the company failed to contact the AG's office at the time it notified affected members of the breach. A 2009 Indiana law requires companies to notify the state of certain data breaches.

In addition to the fine, which Indiana can apply to a fund that supports victims of identity theft, WellPoint has agreed to pay for up to two years of credit monitoring and other protection to affected Indiana residents and to reimburse Indiana consumers as much as $50,000 each for losses due to identity theft that can be traced to this breach.

WellPoint spokeswoman Cynthia Sanders told InformationWeek Healthcare in an email that the company is unaware of any unprotected information relevant to this case being used "inappropriately."

Zoeller sued WellPoint last October, seeking $300,000 in civil fines. The AG contended that WellPoint was told of the breach on Feb. 22 and March 8 of last year, but did not start notifying affected individuals until June 18, 2010, and waited until July 30 to respond to an inquiry from Zoeller--after word got out via news media.

WellPoint eventually notified 645,000 consumers nationwide, according to Zoeller's office. The AG said in a statement that any Indiana resident can register for a credit freeze and report suspected identity theft through a website for consumers run by the AG's office.

"This case serves as something of a teaching moment for all companies that handle consumers' personal data," Zoeller said in an audio clip posted on the AG's website. "It's this early warning that helps minimize the risks to consumers so they won't fall victim to identity theft."

Sanders said that WellPoint and Anthem have "implemented IT security changes to ensure that this situation will not happen again." This includes new steps to validate the security of servers and applications during pre-launch testing and ongoing vulnerability scanning after rollout.

"In addition, last summer we announced our plans to accept the results of HITRUST Common Security Framework (CSF) assessments as a way to evaluate and verify our business partners’ capabilities for protecting health information. We were the first in the industry to do this," Sanders wrote in the email.

The Indiana AG's office said it has sent warning letters to a total of 47 companies since the 2009 law went into effect for being slow to notify authorities about breaches. "Many companies keep vast quantities of consumers' personal data and they are required to handle it confidentially and not carelessly. That's not just good business practice; that's the law," Zoeller said in a statement.

The Healthcare IT Leadership Forum is a day-long venue where senior IT leaders in healthcare come together to discuss how they're using technology to improve clinical care. It happens in New York City on July 12. Find out more.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!