The theft of a computer from the office of an Ohio-based health-care contractor on Nov. 23 has exposed sensitive data belonging to tens of thousands of patients in five health-care firms across five states.The compromised data includes the names, addresses, medical record numbers, diagnoses, treatment information and Social Security numbers of the patients. Among those affected are patients at Atlanta-based Emory Healthcare; Danville, Pa.-based Geisinger Health System; and Franklin, Tenn.-based Williamson Medical Center. The names of two other health-care providers affected by the burglary at Cincinnati-based Electronic Registry Systems (ERS) have not yet been released.In an e-mailed statement, ERS said the burglary appeared to have been part of a larger break-in that included several other offices in the same building.“Law enforcement officials have no evidence that the theft was motivated by the intent to steal data,” said ERS, which has 15 employees. The company added that it has implemented “multiple layers of security” to protect the data on the stolen computer but offered no details on what those measures include. ERS helps more than 300 regional hospitals, cancer centers and university hospitals manage their health-care information. A Geisinger spokesman Thursday confirmed the compromise and said that the stolen computer held data on approximately 25,000 of its patients. ERS manages a patient registry database for Geisinger and had implemented “multiple protections” on the computer such as double password and log-in protection to secure the information, Geisinger said in a statement.“We believe that it is unlikely that the information can be retrieved from the stolen equipment,” Geisinger Chief Medical Officer Bruce Hamory said in the statement. The health system has contracted with an AIG member company to provide identity-theft protection coverage for a year. Features of the coverage include expense reimbursement and services to help identity theft victims file affidavits with the U.S. Federal Trade Commission and notify affected creditors.In a statement, an Emory spokeswoman said her company mailed letters on Dec. 20 to 36,000 patients alerting them of the incident. ERS provides cancer registry data processing services to Emory. Hospital data in the stolen computer was from Emory Hospital, Crawford Long Hospital and the Grady Memorial Hospital, the statement said.“The registry information on the computer in question was double password-protected making it extremely difficult to access,” the spokeswoman said in the statement. “This appears to be a random ‘smash and grab’ break-in and according to the local police investigator not a theft for purposes of stealing information off the computer.”ERS is withholding the names of the other two health-care providers affected by the theft until they begin notifying patients about the compromise, a spokeswoman said.News of the theft comes amid heightening concerns about privacy breaches involving health-care data. Last September, the Government Accountability Office released a report showing that more than 40 percent of U.S. Medicare contractors and state Medicaid agencies experienced a security breach involving protected health information during the past two years. Similarly, 44 percent of Medicaid agencies, 42 percent of Medicare fee-for-service contractors and 38 percent of the contractors for the Tricare program reported similar breaches.By Jaikumar Vijayan, Computerworld (US online) Keep checking in at our Security Feed for updated news coverage. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe