HIPAA Breach News

TriZetto Provider Solutions Issues Data Breach Notifications to HIPAA Covered Entities (Update)

TriZetto Provider Solutions, a Cognizant-owned provider of revenue management services to physicians, hospitals, and health systems, has started notifying certain healthcare clients about a recently identified cybersecurity incident.

On October 2, 2025, suspicious activity was identified within a web portal used by some of its healthcare provider customers to access TriZetto systems. Immediate action was taken to secure the web portal and mitigate the incident, and the cybersecurity firm Mandiant was engaged to investigate the activity, review the security of the web portal application, and ensure that the incident is fully remediated. TriZetto is satisfied that the threat actor has been eradicated from its system. No further unauthorized web portal activity has been detected since October 2, 2025.

While the cybersecurity incident was only recently detected, the unauthorized access has been ongoing for a considerable period of time. The forensic investigation determined that an unauthorized third party first started accessing historical eligibility transaction reports within the TriZetto system in November 2024, almost a year before the unauthorized access was detected. The reports within its storage system contained the protected health information of patients of certain healthcare provider clients.

Between October 2, 2025, and the end of November 2025, Trizetto reviewed the data within the compromised system to determine the types of data involved and the individuals affected. Information compromised in the incident includes the names of patients and primary insureds, in combination with some or all of the following: address, date of birth, Social Security number, health insurance member number (in some cases, Medicare beneficiary number), health insurer name, information about the primary insured or beneficiary, and other demographic health and health insurance information. TriZetto said no financial information was involved.

Notifications have been issued to the affected healthcare clients, who have been provided with a list of the affected individuals and a copy of the affected data. The HIPAA Breach Notification Rule requires notifications to be issued to the affected individuals within 60 days of a HIPAA-covered entity being notified about a data breach at a business associate. Assuming the affected healthcare providers comply with that HIPAA requirement, individual notifications for the affected individuals should be mailed within 60 days.

TriZetto has offered to handle the breach notifications on behalf of the affected clients, should they determine that breach notifications are required under HIPAA. TriZetto has also offered to notify the HHS’ Office for Civil Rights, state regulators, and media outlets on behalf of its covered entity clients, and will also cover the cost of complimentary credit monitoring, fraud consultation, and identity theft restoration services.

It is currently unclear how many of its healthcare provider clients have been affected or the scale of the data breach. Given the fact that its system was compromised for 11 months, it could be a sizeable data breach. Healthcare providers known to have been affected include:

  • CE-Edinger Medical Group, California
  • Friends of Family Health Center, California
  • Gardner Health Services, California (6,197 individuals)
  • Harmony Health Medical Clinic and Family Resource Center, California
  • One Community Health, California
  • Mission Neighborhood Health Center in California (3,741 individuals)
  • Native American Health Center, California
  • Open Door Community Health Centers, California
  • Planned Parenthood Northern California – TriZetto was a subcontractor of its business associate OCHIN
  • Lynn Community Health, Massachusetts
  • Share Ourselves, California (2,864 individuals)
  • Santa Rosa Community Health Centers, California – TriZetto was a subcontractor of its business associate OCHIN

This post was first published on December 11, 2025, and it will continue to be updated as further information about the TriZetto data breach is released. 

The post TriZetto Provider Solutions Issues Data Breach Notifications to HIPAA Covered Entities (Update) appeared first on The HIPAA Journal.

Vida Y Salud-Health Systems & Dublin Medical Center Confirm Data Breaches

Data breaches have recently been announced by Vida Y Salud-Health Systems in Crystal City, Texas, and Dublin Medical Center in Georgia.

Vida Y Salud-Health Systems, Texas

Vida Y Salud-Health Systems, a Crystal City, TX-based Federally Qualified Health Center, has recently reported a data breach to the Texas Attorney General involving unauthorized access to the protected health information of 34,504 Texas residents. On October 8, 2025, suspicious activity was identified within its network. The forensic investigation confirmed that an unauthorized third party gained access to its network on October 7, 2025, and exfiltrated data.

The investigation and data review have recently concluded, and it was confirmed that names, addresses, dates of birth, Social Security numbers, driver’s license numbers, account numbers, and claim numbers had been stolen. Vida Y Salud-Health Systems has notified the HHS’ Office for Civil Rights; however, the data breach is not currently shown on the OCR data breach portal, so it is unclear how many individuals in total have been affected. Vida Y Salud-Health Systems said steps have been taken to strengthen security to prevent similar breaches in the future, and the affected individuals have been offered complimentary credit monitoring and identity theft protection services.

Dublin Medical Center, Georgia

Dublin Medical Center in Georgia has recently started notifying individuals affected by an October 2025 cybersecurity incident. Suspicious activity was identified within its computer network on October 17, 2025. The substitute data breach notice on Dublin Medical Center’s website does not state when the unauthorized access started.

The review of the files on the affected parts of its network confirmed that patient data was compromised in the incident. The data types varied from individual to individual and may have included names in combination with some or all of the following: contact information, date of birth, patient status, provider name, diagnosis and treatment information, prescriptions, medical history, radiology imaging and reports, medical consent forms, lab reports, patient identification number, dates of service, and health insurance information.

The investigation is continuing; however, notification letters started to be mailed to the affected individuals on December 17, 2025. The affected individuals have been advised to remain vigilant against misuse of their data by reviewing their account statements, free credit reports, and explanation of benefits statements. The incident is not yet shown on the HHS’ Office for Civil Rights breach portal, so it is currently unclear how many individuals have been affected.

The post Vida Y Salud-Health Systems & Dublin Medical Center Confirm Data Breaches appeared first on The HIPAA Journal.

CareOregon and Health Share of Oregon Warn of Potential Insurance Fraud After Data Breach

CareOregon and Health Share of Oregon have notified certain patients about a data breach and potential insurance fraud. Andover Eye Associates has identified a breach of its email environment.

CareOregon and Health Share of Oregon

CareOregon and Health Share of Oregon have notified certain patients about unauthorized access to some of their protected health information. It is unclear from the phrasing of the notice whether this was an insider breach or if data was accessed by an external actor. The data breach notice states that, “On October 27, 2025, we learned that one or more people looked at your information without permission.” Social Security numbers and financial information were not accessed. The data viewed and potentially obtained was limited to first and last names, dates of birth, health plan information, Medicaid/Medicare numbers, and primary care provider office.

The notice states that there may have been data misuse, warning that the information may have been used to create fake insurance claims. CareOregon and Health Share of Oregon said they were unable to determine if any specific patient’s information had been misused. The affected individuals have been reminded that CareOregon and Health Share of Oregon do not bill for covered health care services, and informed the affected individuals that they will not receive a bill even if their data has been misused to file a fake insurance claim. Individuals who receive a letter detailing the services that they should have received should check the letter carefully and report back if there are any listed services that have not been provided.

Law enforcement has been notified, an investigation has been conducted, and the identified issue has been fixed. Further, CareOregon and Health Share of Oregon have changed how individuals’ information can be viewed, and the staff have been retrained. There is currently no breach report on the HHS’ Office for Civil Rights breach portal at present, so it is unclear how many individuals have been affected.

Andover Eye Associates

Andover Eye Associates in Andover, Massachusetts, has experienced an email security incident that exposed the data of 1,638 patients. Suspicious activity was identified in two employee email accounts on June 10, 2025. An investigation was launched, which confirmed that an unauthorized third party gained access to the accounts on May 28, 2025. No other employee email accounts were affected.

The email accounts were reviewed, and on November 4, 2025, Andover Eye Associates confirmed that the accounts contained patient names and Social Security numbers. Additional training has been provided to the workforce, and additional safeguards are being implemented to improve email security. Notification letters have been mailed to the affected individuals who have been offered complimentary credit monitoring services for 12 months.

The post CareOregon and Health Share of Oregon Warn of Potential Insurance Fraud After Data Breach appeared first on The HIPAA Journal.

12,000-Record Data Breach Announced by New York Plastic Surgery Practice

Data breaches have recently been reported by Pearlman Aesthetic Surgery and Associated Radiologists of the Finger Lakes in New York and Fast Pace Urgent Care in Tennessee.

Pearlman Aesthetic Surgery

Steven J. Pearlman, MD, PC, a well-known plastic surgeon and the owner of Pearlman Aesthetic Surgery, a popular plastic surgery practice in Manhattan, New York, has recently reported a breach of the protected health information of 11,764 individuals to the HHS’ Office for Civil Rights (OCR).

The specifics of the data breach have yet to be publicly disclosed, other than it being a hacking/IT incident. The incident was reported to OCR on November 9, 2025, and there is currently no substitute data breach notice on the Pearlman Aesthetic Surgery website.

This post will be updated when further information becomes available.

Associated Radiologists of the Finger Lakes

Associated Radiologists of the Finger Lakes, a network of interventional and diagnostic radiology centers in Elmira, NY, and the surrounding areas, has identified unauthorized access to its computer network. Anomalous activity was identified on October 30, 2025, and the investigation confirmed unauthorized access to a subset of its network, starting on October 28, 2025. Over two days, patient data may have been viewed or copied.

The file review is currently ongoing, and notification letters will be sent to the affected individuals when the review is completed. While the specific types of data involved have yet to be confirmed, based on the information collected to date, the types of data involved include names, addresses, medical record numbers, Social Security numbers, dates of birth, clinical/treatment information, medical procedure information, medical provider names, prescription information, and health insurance information. Associated Radiologists of the Finger Lakes has reviewed and enhanced its technical, administrative, and physical safeguards, policies, and procedures to reduce the risk of similar incidents in the future.

The incident has been reported to the HHS’ Office for Civil Rights with a placeholder figure of at least 501 individuals.

Fast Pace Urgent Care (FPMCM)

Fast Pace Urgent Care in Tennessee has announced a HIPAA breach at its business associate, FPMCM, LLC.  On August 12, 2025, an FPMCM employee received a legitimate request for the protected health information of a single patient. When responding to that request, the employee inadvertently sent a document containing the protected health information of 2,072 patients.

The privacy violation was identified the following day, and an investigation was launched. The investigation has recently concluded and confirmed that the information impermissibly disclosed included names, dates of service, internal account numbers, billing codes, insurance information, and potentially health insurance claim numbers.

The recipient of the email confirmed that the email and the attached document have been deleted, no copies have been retained, and the information was not further disclosed. Additional safeguards have been implemented to prevent similar incidents in the future. While the affected individuals are not believed to be at risk, they have been advised to review their Explanation of Benefits statements as a best practice.

The post 12,000-Record Data Breach Announced by New York Plastic Surgery Practice appeared first on The HIPAA Journal.

October 2025 Healthcare Data Breach Report

A delayed October 2025 healthcare data breach report due to the government shutdown for the whole of the month, which caused a significant delay at the HHS’ Office for Civil Rights, which failed to upload any data breach reports in October.  The shutdown ended on November 12, 2025, and the HHS had a considerable backlog of data breaches to add to the data breach portal. When a data breach report is received, OCR verifies the data, a process that may take up to around two weeks, before it is added to the OCR breach portal. Data breaches continued to be added for October well into December.

healthcare data breaches in the past 12 months - October 2025

Based on data obtained from OCR on December 31, 2025, OCR received 28 reports of data breaches affecting 500 or more individuals in October – the lowest monthly total of the year, the lowest total since the 28 reported data breaches in May 2020, and a 31.7% month-over-month reduction in large healthcare data breaches.

October healthcare data breaches 2020-2025

While there has been a downward trend in data breaches, the October total is suspiciously low, which could indicate the backlog of data breach reports has yet to be cleared. The totals will be better reflected in our 2025 healthcare data breach report, due for publication in late January, and our healthcare data breach statistics page.

Individuals affected by healthcare data breaches in the past 12 months - october 2025

While breach numbers are down, the number of affected individuals increased by 540% month-over month to 11,062,868 individuals – the second-highest monthly total of the year. That total is certain to increase well past April’s total, as the largest data breach of the month is still under investigation and the number of affected individuals has yet to be confirmed.

Individuals affected by October 2025 healthcare data breaches

The Largest Healthcare Data Breaches Reported in October 2025

In October, 7 healthcare data breaches were reported that affected more than 10,000 individuals, all of which were network server hacking incidents. The largest data breach of the month occurred at the business associate Conduent Business Services, a provider of back-office services to healthcare providers, health plans, and government agencies. Conduent’s client list includes major U.S. health insurers such as Humana and Premera Blue Cross.

Conduent experienced a hacking incident in May 2025, and while not stated as a ransomware attack, the SafePay ransomware group claimed responsibility. On its data leak site, SafePay claimed to have stolen 8.5 terabytes of data. Conduent notified the HHS’ Office for Civil Rights that 42,616 individuals had been affected; however, a few months later, the Oregon Attorney General was informed that more than 10.5 million individuals were affected nationwide.

Since the data for this report were compiled, there has been a further breach report from Conduent. The Texas Attorney General has been informed that the Conduent data breach affected almost 14.8 million individuals in Texas alone.

Name of Covered Entity State Covered Entity Type Individuals Affected Cause of Breach
Conduent Business Services LLC NJ Business Associate 10,515,849* Ransomware attack (Safepay)
Tri Century Eye Care PC PA Healthcare Provider 200,000 Hacking incident – Data theft confirmed
Central Jersey Medical Center NJ Healthcare Provider 88,000 Ransomware attack (Sinobi ransomware group)
Sierra Vista Hospital & Clinics NM Healthcare Provider 75,054 Hacking incident
Bosch Choice Welfare Benefit Plan MI Health Plan 55,000 Hacking incident
Heartland Health Center NE Healthcare Provider 43,728 Hacking incident
Revere Health, PC UT Healthcare Provider 10,800 Hacking incident of a third-party payment system

The HIPAA Breach Notification Rule requires data breaches to be reported to OCR within 60 days of the discovery of a data breach. If the total number of affected individuals is not known, an estimate should be provided. HIPAA-regulated entities often submit a breach report using a placeholder figure of 500 or 501 affected individuals when the data review is ongoing. In October, two data breaches were reported with suspected 501 placeholder totals.

Name of Covered Entity State Covered Entity Type Individuals Affected Cause of Breach
Saint Mary’s Home of Erie PA Healthcare Provider 501 Hacking incident
North Atlantic States Carpenters Health Benefits Fund MA Health Plan 501 Hacking incident

Causes of December 2024 Healthcare Data Breaches

As is usually the case, hacking and other IT incidents dominated the breach reports in October, accounting for 21 (75%) of the month’s data breaches and 99.8% of the affected individuals. Across the 21 data breaches, 11,037,882 individuals had their protected health information exposed or stolen. The average breach size was 525,613 individuals, and the median breach size was 6,633 individuals.

Causes of October 2025 healthcare data breaches

The next most common category of data breaches was unauthorized access/disclosure incidents. There were 7 of these incidents in October, affecting 24,986 individuals. The average breach size was 3,569 individuals, and the median breach size was 3,177 individuals.

While loss and theft incidents were among the most common types of data breaches when OCR first started publishing healthcare data breach data in 2009, along with improper disposal incidents, they are relatively rare. No loss, theft, or improper disposal incidents were reported in October. The most common location of breached protected health information in October was network servers, with email the second most common location of breached PHI.

Location of breached PHI - october 2025

Where did the Data Breaches Occur?

Healthcare providers reported 20 data breaches in October (472,481 affected individuals), 4 data breaches were reported by health plans (60,358 affected individuals), and four data breaches were reported by business associates of HIPAA-covered entities (10,530,029 affected individuals)

When a data breach occurs at a HIPAA business associate, the business associate must report the data breach to each affected covered entity, and the covered entity must decide who should send out individual notifications and notify OCR and the media. Some covered entities choose to report business associate breaches to OCR and issue their own notifications, while others delegate that responsibility to the business associate. If a business associate works with multiple covered entities, some of their covered entity clients may report the breach, while others delegate the responsibility to the business associate.

The consequence of that is that business associate data breaches are often underrepresented in many healthcare data breach reports. The HIPAA Journal calculates where the breach occurred rather than the entity that reported the breach to ensure business associate data breaches are reported accurately. As you can see from the pie chart below, while 4 data breaches were reported by business associates, 9 of the month’s data breaches occurred at business associates.

data breaches at HIPAA-regulated entities - october 2025

October 2025 healthcare data breaches - individuals affected by hipaa-regulated entity

Geographic Distribution of Healthcare Data Breaches

HIPAA-regulated entities in 18 U.S. states reported data breaches in October. Florida and Texas were the worst-affected states in October, with three large healthcare data breaches reported by entities headquartered in each of those states.

States Breaches
Florida & Texas 3
Alaska, Arizona, California, Illinois, New Jersey & Pennsylvania 2
Kentucky, Massachusetts, Michigan, Missouri, Montana, Nebraska, New Mexico, Ohio, Oklahoma & Utah 1

While Florida and Texas had the highest number of data breaches, each affected a relatively low number of individuals. Unsurprisingly, given the scale of the data breach at Conduent Business Services, New Jersey was the worst-affected state, although that total includes individuals across the United States.

State Individuals Affected
New Jersey 10,603,849
Pennsylvania 200,501
New Mexico 75,054
Michigan 55,000
Nebraska 43,728
Texas 14,233
Utah 10,800
California 9,700
Kentucky 9,536
Illinois 9,405
Florida 8,503
Oklahoma 6,633
Montana 5,617
Arizona 4,177
Alaska 2,641
Missouri 1,680
Ohio 1,310
Massachusetts 501

HIPAA Enforcement Activity in October 2025

The government shutdown for the entire month of October meant all but the most critical workflows ground to a halt at the Department of Health and Human Services. As such, there were no announcements about HIPAA settlements and civil monetary penalties, and no penalties were announced by state attorneys general in October.

The post October 2025 Healthcare Data Breach Report appeared first on The HIPAA Journal.

Patient Data Compromised in Cyberattacks on Sleep Specialists

Two sleep specialists, Persante Health Care in New Jersey and SomnoSleep Consultants in Virginia, have recently disclosed security incidents that exposed patient information.

Persante Health Care Patients Informed About January 2025 Cyberattack

Persante Health Care, a Mount Laurel Township, NJ-based national provider of sleep and balance center management services to hospitals and physician practices, has announced a security incident that was detected on or around January 28, 2025.

Unusual activity was identified within its computer network and, assisted by third-party cybersecurity experts, it was determined that an unauthorized third party accessed its network between January 23 and January 28, 2025. During that time, files containing patient information may have been accessed or acquired. It took more than 8 months to review the affected files to determine whether patient data had been exposed. On October 3, 2025, the data review confirmed that personal and protected health information was involved.

The exposed data varied from individual to individual and may have included names in combination with one or more of the following: date of birth, Social Security number, driver’s license number, state identification number, passport number, government identification number, taxpayer identification number, date(s) of service, physician or facility name, patient account number, medical record number, financial account information, payment card number, medical device identifier(s), and/or biometric identifier(s).

The Federal Bureau of Investigation was informed about the cyberattack, and Persante Health Care is assisting with the investigation. Additional measures have been implemented to reduce the risk of similar incidents in the future, and the affected individuals were notified by mail on November 26, 2025. The number of affected individuals has yet to be publicly disclosed.

SomnoSleep Consultants’ Patients Affected by Business Associate Data Breach

Patients of Annadale, VA-based SomnoSleep Consultants have been notified about a security incident at a third-party billing vendor, Avosina Healthcare Solutions. The vendor detected unauthorized access to its network on July 29, 2025, in what appears to have been a ransomware attack. Avosina said it was able to restore its services from backups; therefore, no ransom was paid. The FBI was notified, and third-party cybersecurity experts were engaged to determine the nature and scope of the incident and implement additional security measures to protect against further attacks.

The investigation confirmed that some documents were exfiltrated from its network. The analysis of those files confirmed that they contained patients’ names, addresses, medical information, and health insurance information. SomnoSleep said there was no unauthorized access to any files part of its electronic medical record system.

Avosina notified SomnoSleep about the attack on September 29, 2025, and on November 17, 2025, SomnoSleep provided additional information on the affected patients and delegated the responsibility for sending notification letters to its business associate. SomnoSleep said that no evidence has been found to indicate that any of the impacted patient data has been misused.

Avosina confirmed to SomnoSleep that steps have been taken to correct the vulnerability that was exploited by the threat actor, and other security measures have been implemented to protect against any further unauthorized network access. Internal data management protocols have also been reviewed.

The post Patient Data Compromised in Cyberattacks on Sleep Specialists appeared first on The HIPAA Journal.

Liberty Resources Announces July 2024 Data Breach

Liberty Resources, a Syracuse, NY-based human services agency, has announced a security incident that was first identified 16 months ago, on July 22, 2024. Liberty Resources said an immediate and thorough investigation was conducted, and that the investigation into the incident is still ongoing. It is unclear why the investigation has taken so long.

According to its website data breach notice, the specific information compromised in the incident has yet to be confirmed. Employees and patients have been warned that the impacted data likely includes names, addresses, dates of birth, Social Security numbers, medical information, and health insurance information. Since the investigation has not yet concluded, it is unclear how many individuals have been affected.

While no evidence has been found to indicate any misuse of the affected information, employees and clients have been advised to remain vigilant against identity theft and fraud. While not stated by Liberty Resources, this appears to have been a cyberattack by the Rhysida threat group, which added Liberty Resources to its data leak site and threatened to sell the 665 GB of data allegedly stolen in the attack. Rhysida claims on its data leak site that the data that has not been sold has been published. The group claims the leaked data includes 885,433 files, and if the claim is true, that may go some way to explaining why the investigation and data review have taken so long.

Gold Coast Health Plan Members Affected by Conduent Data Breach

Gold Coast Health Plan in Camarillo, CA, confirmed on December 2, 2025, that members’ protected health information was potentially compromised in a cyberattack on its business associate, Conduent Business Solutions. Conduent, a long-term provider of administrative services to Gold Coast Health Plan, determined on January 13, 2025, that the email account of one of its employees was accessed by an unauthorized individual between October 21, 2024, and January 13, 2025. The forensic investigation has taken several months to complete, and recently, Gold Coast Health Plan learned that the protected health information of 540 members was compromised in the incident, including their names, health plan identification numbers, dates of service, costs of service, and claim numbers. Social Security numbers and financial information were not involved.

“We deeply regret that the private information of some [of] our members was possibly exposed during this cyberattack,” said Robert Franco, GCHP’s chief compliance officer. “We are working closely with Conduent to ensure the necessary safeguards are in place to prevent a future breach.”

The post Liberty Resources Announces July 2024 Data Breach appeared first on The HIPAA Journal.

Health Plan Members’ PHI Exposed in Cyberattack on Fieldtex Products

Data breaches have been announced by Fieldtex Products in New York State and the Utah ear, nose & throat specialists, Cache Valley Ear ENT.

Fieldtex Products, New York

Fieldtex Products, a medical supply fulfillment organization based in Rochester, New York, has announced a data security incident involving unauthorized access to its computer systems. The intrusion was identified on August 19, 2025, and action was immediately taken to secure its network and prevent further unauthorized access. A third-party digital forensics team was engaged to investigate the incident, which confirmed that a limited amount of protected health information had been exposed and may have been accessed or stolen in the attack.

The exposed data related to the over-the-counter healthcare-related products provided by Fieldtex to members of its health plan clients. In order to provide those products, health plans provided Fieldtex with protected health information such as patient names, addresses, dates of birth, insurance member identification numbers, plan names, effective terms, and gender.

The analysis of the exposed data was completed on September 30, 2025, and the affected health plans were notified immediately. Fieldtex has sent notification letters to the affected individuals on behalf of the health plans that authorized Fieldtex to provide direct notice and has offered those individuals complimentary credit monitoring services.

At the time of issuing notification letters, Fieldtex was unaware of any misuse of the exposed data. Steps have been taken to improve security, and data security policies and procedures are being reviewed. The data breach is not currently shown on the HHS’ Office for Civil Rights website, so it is currently unclear how many individuals have been affected.

Cache Valley Ear, Nose & Throat, Utah

Legal counsel for Cache Valley Ear, Nose & Throat (Cache Valley ENT) has notified state attorneys general about a February 2025 data security incident that exposed patient information. Suspicious activity was identified within its network on February 4, 2025. An investigation was launched to determine the nature and scope of the activity, with assistance provided by third-party cybersecurity experts.

The North Logan, Utah-based healthcare provider confirmed that data may have been viewed or copied on February 4, 2025. The review of the exposed data was completed on November 4, 2025, when it was confirmed that names, addresses, provider names, drug names, and insurance provider names were involved. While highly sensitive patient data such as Social Security numbers and financial information do not appear to have been involved, out of an abundance of caution, the affected individuals have been offered 12 or 24 months of complimentary credit monitoring and identity theft protection services. The data breach is not currently shown on the HHS’ Office for Civil Rights website, so it is currently unclear how many individuals have been affected.

The post Health Plan Members’ PHI Exposed in Cyberattack on Fieldtex Products appeared first on The HIPAA Journal.

Data Breaches Announced by Ennoble Care & Circa Health; Dermatology Associates of Concord

Data breaches have recently been announced by Ennoble Care & Circa Health in New Jersey and Dermatology Associates of Concord in Massachusetts.

Ennoble Care/Circa Health, New Jersey

Ennoble Care & Circa Health, LLC, a Hackensack, NJ-based provider of primary care, palliative care, and hospice services to individuals in Georgia, Kansas, Maryland, New York, New Jersey, Oklahoma, Pennsylvania, Virginia, and Washington, D.C., has announced an email account breach that was identified on April 17, 2025.

Ennoble Care said the investigation into the incident is ongoing; however, it has been determined that patient information has been exposed and may have been obtained by an unauthorized individual. The types of information involved include names, addresses, dates of birth, hospice status, status dates, and orders status (CTI, SN, MSW, CH, HHA, etc.). No evidence was found to indicate that its cloud-based electronic health record was compromised.

While no evidence has been found to indicate misuse of the exposed data, the affected individuals have been advised to remain vigilant against identity theft and fraud by monitoring the explanation of benefits statements that they receive from their health insurance providers. The data breach is not currently shown on the HHS’ Office for Civil Rights website, so it is currently unclear how many individuals have been affected.

Dermatology Associates of Concord, Massachusetts

Dermatology Associates of Concord (DAC), a provider of dermatology services to individuals in the greater Boston area, has notified the Massachusetts Attorney General about a recent security incident affecting a currently undisclosed number of individuals. Suspicious activity was identified within its computer systems on September 19, 2025. Assisted by third-party cybersecurity experts, DAC determined that an unauthorized third party accessed a specific computer system between September 18, 2025, and September 19, 2025, and copied files from that system.

The files are being reviewed to determine the types of data involved and the individuals affected, and that process has not yet concluded. While data was stolen, DAC is unaware of any misuse of that information. DAC said it has notified law enforcement about the incident and has augmented its security protocols to prevent similar incidents in the future.

Notification letters will be mailed to the affected individuals when the data review is completed, and complimentary single-bureau credit monitoring, credit report, credit score, and fraud assistance services will be made available to the affected individuals for a period of 24 months.

The post Data Breaches Announced by Ennoble Care & Circa Health; Dermatology Associates of Concord appeared first on The HIPAA Journal.