recommended reading


Thief cribs a patient’s ID off fine print on hospital worker’s Facebook photo

Accidentally leaked credentials; Insider attack; Stolen credentials; Unauthorized use of employer’s data

In June, the emergency room employee posted a picture of her office work station with a computer screen visible in the background that contained the patient’s name and other details.

The photo was taken down within half an hour and the patient was notified, according to the University of Arizona Medical Center-South Campus.

Then things got creepy.

Four months later, the Department of Economic Security called the patient to say someone had used her personal information to try to qualify for food stamps.

The patient also has received calls on her home and cell phones with no audible voice. The caller’s identity is listed as “Unavailable.”

“It’s been a nightmare,” the woman told the Green Valley News. “I get these phone calls. I’m afraid to be home; it’s just really, really bad . . . My life is at stake, my information.”

The newspaper did not name the patient due to the nature of the case.

“It’s not that I want a zillion dollars. I want everybody to know about this,” she said. “I don’t want anyone else to go through this kind of hell. This lady sent Facebook my information, Social Security number and address when she took a picture of something else and my information was on the computer screen right next to it.”

According to the medical center, the woman's Social Security number was never posted.

It was a hospital manager who noticed an employee had inadvertently revealed patient health information in the photo she had taken of the work station.

ThreatWatch is a regularly updated catalog of data breaches successfully striking every sector of the globe, as reported by journalists, researchers and the victims themselves.


Healthcare and Public Health


October 22, 2013

reported by

Green Valley News

number affected


location of breach

Arizona, United States



location of perpetrators

Arizona, United States

date breach occurred

June 09, 2013

date breach detected

June 09, 2013

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.