Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/8/2011
07:21 AM
50%
50%

WellPoint Fined $100,000 For Data Breach

Insurer admits being late to notify Indiana officials that records of 32,000 applicants were vulnerable for months.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
WellPoint, the nation's largest private health insurer, has agreed to pay a $100,000 fine to the state of Indiana for a data breach that left personal information of about 32,000 people exposed.

Indiana Attorney General Greg Zoeller reached a settlement with Indianapolis-based WellPoint and subsidiary Anthem Blue Cross and Blue Shield on June 23 and announced the resolution this week.

According to the settlement, WellPoint admitted that personal information of some applicants for insurance coverage in Indiana--including Social Security numbers, health records, and financial information--was accessible online between Oct. 23, 2009, and March 8, 2010, and that the company failed to contact the AG's office at the time it notified affected members of the breach. A 2009 Indiana law requires companies to notify the state of certain data breaches.

In addition to the fine, which Indiana can apply to a fund that supports victims of identity theft, WellPoint has agreed to pay for up to two years of credit monitoring and other protection to affected Indiana residents and to reimburse Indiana consumers as much as $50,000 each for losses due to identity theft that can be traced to this breach.

WellPoint spokeswoman Cynthia Sanders told InformationWeek Healthcare in an email that the company is unaware of any unprotected information relevant to this case being used "inappropriately."

Zoeller sued WellPoint last October, seeking $300,000 in civil fines. The AG contended that WellPoint was told of the breach on Feb. 22 and March 8 of last year, but did not start notifying affected individuals until June 18, 2010, and waited until July 30 to respond to an inquiry from Zoeller--after word got out via news media.

WellPoint eventually notified 645,000 consumers nationwide, according to Zoeller's office. The AG said in a statement that any Indiana resident can register for a credit freeze and report suspected identity theft through a website for consumers run by the AG's office.

"This case serves as something of a teaching moment for all companies that handle consumers' personal data," Zoeller said in an audio clip posted on the AG's website. "It's this early warning that helps minimize the risks to consumers so they won't fall victim to identity theft."

Sanders said that WellPoint and Anthem have "implemented IT security changes to ensure that this situation will not happen again." This includes new steps to validate the security of servers and applications during pre-launch testing and ongoing vulnerability scanning after rollout.

"In addition, last summer we announced our plans to accept the results of HITRUST Common Security Framework (CSF) assessments as a way to evaluate and verify our business partners’ capabilities for protecting health information. We were the first in the industry to do this," Sanders wrote in the email.

The Indiana AG's office said it has sent warning letters to a total of 47 companies since the 2009 law went into effect for being slow to notify authorities about breaches. "Many companies keep vast quantities of consumers' personal data and they are required to handle it confidentially and not carelessly. That's not just good business practice; that's the law," Zoeller said in a statement.

The Healthcare IT Leadership Forum is a day-long venue where senior IT leaders in healthcare come together to discuss how they're using technology to improve clinical care. It happens in New York City on July 12. Find out more.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
CVE-2019-18345
PUBLISHED: 2019-12-12
A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrat...
CVE-2019-19198
PUBLISHED: 2019-12-12
The Scoutnet Kalender plugin 1.1.0 for WordPress allows XSS.