Anne Arundel Dermatology Data Breach Affects 1.9 Million Patients
Anne Arundel Dermatology and Mountain Laurel Dermatology have started issuing individual notifications about recent security incidents that potentially involved the theft of patient data. The data breach at Anne Arundel Dermatology is one of the largest of the year, affecting more than 1.9 million individuals. Anne Arundel Dermatology Anne Arundel Dermatology, a provider of medical, pediatric, surgical, and aesthetic dermatology services in Florida, Georgia, Maryland, North Carolina, Pennsylvania, Tennessee, and Virginia, has recently started notifying patients about a hacking incident earlier this year. A network intrusion was detected on May 13, 2024, and immediate action was taken to secure its systems and prevent further unauthorized access. The forensic investigation confirmed that the unauthorized access lasted for a month, with the initial network breach occurring on February 14, 2025. On May 20, 2025, it was confirmed that files on the compromised parts of the network contained personal and protected health information. A file review was initiated and concluded on June 27,...
Ransomware Gangs Attack Clinical and Pathology Laboratories
Ransomware groups have conducted several attacks on medical laboratories in recent months. These attacks can cause significant disruption to testing services, resulting in diagnosis and treatment delays. The June 2024 ransomware attack on Synnovis, a UK-based pathology lab serving National Health Service Trusts, caused massive disruption to testing and blood services in southeast London for several months, resulting in prolonged blood shortages. The attack cost an estimated £32.7 million ($38.18 million) last year. In May 2025, Marlboro-Chesterfield Pathology in North Carolina and Molecular Testing Labs (CareNexa) in Washington reported hacking incidents and data breaches, the latter via one of its business associates. They have now been joined by a pathology lab in Kansas, a diagnostic lab in New York, and a life science testing lab in California. WPM Pathology Laboratory, Chartered, in Kansas has recently started notifying 5,694 patients about a November 2024 ransomware attack. Unauthorized network access was detected on November 4, 2024, and third-party cybersecurity...
ProSmile Holdings Settles Class Action Data Breach Lawsuit
A class action lawsuit against ProSmile Holdings LLC over a 2022 data breach has been resolved, with all parties agreeing to a $440,000 settlement. The litigation was initiated in response to a cyberattack that involved unauthorized access to the protected health information of 39,674 individuals. An unauthorized third party gained access to its email environment, and the incident was detected on July 7, 2022; however, it took 7 months to announce the breach and 17 months for the affected individuals to be notified. The compromised information included names, dates of birth, Social Security numbers, driver’s license or other state identification card numbers, financial account numbers, payment card numbers, medical treatment information, diagnosis or clinical information, provider information, prescription information, and health insurance information. A lawsuit – Middleton v. ProSmile Holdings, LLC – was filed on January 30, 2024, in the United States District Court for the District of New Jersey by plaintiff Kristina Middleton, whose protected health information was exposed...
Email Data Breaches Reported by Three HIPAA-Regulated Entities
Email-related HIPAA breaches have been announced by Iron County Medical Center in Missouri, Regional Center of the East Bay in California, and Winkler County Hospital District in Texas. Iron County Medical Center, Missouri Iron County Medical Center in Pilot Knob, Missouri, has recently issued notification letters about a December 2024 email security incident. On December 6, 2024, two employees reported receiving a suspicious email from another Iron County employee. The IT team immediately terminated all active sessions within its email tenant to block any potential unauthorized access and launched an investigation into the potential email breach. A third-party digital forensics firm was engaged to investigate and confirmed that an unauthorized individual had accessed a single employee email account. The unauthorized activity appeared to involve only sending two emails internally. No evidence was found to indicate any further unauthorized activity, including any copying of emails in the compromised account. The compromised account was reviewed and found to contain the protected...
The Complicated Nature of BA Compliance
When a HIPAA covered entity contracts a service from a third party – or engages a third party to provide a service on the covered entity’s behalf – and the service involves the disclosure of Protected Health Information (PHI), it is necessary for the two parties to enter into a Business Associate Agreement (BAA). However, deciding what should in in a Business Associate Agreement and ensuring the Terms of the Agreement are complied with can be complicated. In the healthcare industry, the term BA compliance refers to a third party service provider (the “business associate”) complying with the terms of a Business Associate Agreement entered into with a covered entity. While, in theory, BA compliance should be straightforward, this is not always the case – and sometimes, noncompliance is not the fault of the business associate. This article aims to help you – a covered entity – understand how to engage with business associates in a HIPAA compliant way, and what needs to be in your HIPAA Business Associate Agreement. You can use this guide in conjunction with...



