What is the Texas OIG Exclusions Database?
The Texas OIG exclusions database is a list of excluded individuals and entities similar to the federal HHS OIG exclusion database. The primary difference between the two databases is that the Texas OIG exclusions database contains the names of individuals and entities that have violated state law as well as those that have violated federal law. Exclusion Databases Explained Exclusion databases are lists of individuals and entities that are prohibited from providing goods or services to federal or state funded programs because they are guilty of some type of misconduct against the federal or state government. Most federal departments and state agencies maintain exclusion databases – usually through an Office of Inspector General (OIG) or equivalent. The most well-known exclusion database in healthcare is the Department of Health and Human Services’ (HHS) OIG List of Excluded Individuals/Entities – also known as the OIG LEIE. This list contains the details of thousands of individuals and entities prohibited from providing goods or services to federal health care programs for...
Douglas County Department of Health and Human Services Discovers Insider Data Breach
The Douglas County Department of Health and Human Services in Wisconsin has discovered a former employee accessed patient records without authorization over 21 months. Richmond University Medical Center has notified patients affected by a May 2023 data breach, and Premier Healthcare Holdings has discovered a breach of its email system. Douglas County Department of Health and Human Services Discovers Insider Data Breach The Douglas County Department of Health and Human Services in Wisconsin has notified patients whose protected health information was accessed by a former employee without authorization. On May 13, 2024, an audit of the department records identified unauthorized access to patient information. After verifying the unauthorized access, the employee concerned was terminated and the records were reviewed to determine the types of data potentially viewed or obtained by the former employee. The unauthorized access occurred between August 11, 2022, and May 13, 2024, and the employee may have viewed the following data types: name, address, phone number, email address, date of...
Does HIPAA Apply to Minors?
The privacy standards of HIPAA apply to minors inasmuch as a minor’s health information is subject to the same Privacy Rule protections as an adult’s health information and must be secured in the same way against threats to its confidentiality, integrity, and availability. However, there are differences in the application of HIPAA rights when an individual is an unemancipated minor. A common cause of confusion about how the standards of HIPAA apply to minors relates to consent for health care. The reason for the confusion is that clause (3)(i) of the privacy standard relating to personal representatives (§164.502(g)) states: “If under applicable law a parent, guardian, or other person acting in loco parentis has authority to act on behalf of an individual who is an unemancipated minor in making decisions related to health care, a covered entity must treat such person as a personal representative under this subchapter with respect to Protected Health Information.” Some sources interpret this clause of §164.502(g) to mean that parents, guardians, and others who can represent an...
Second NetWalker Ransomware Affiliate Sentenced to 20 Years in Jail
A Romanian man has been sentenced to 20 years in prison for conducting ransomware attacks on healthcare providers and educational institutions during the pandemic. Daniel Christian Hulea, 30, was an affiliate of the NetWalker ransomware-as-a-service (RaaS) operation. In January 2021, the U.S. Department of Justice reported that more than $450,000 in cryptocurrency had been seized in a coordinated International law enforcement operation against the NetWalker ransomware group. That operation involved the seizure of NetWalker servers in Bulgaria, the analysis of which suggested NetWalker had a network of around 100 affiliates in Eastern Europe. The group is believed to have conducted more than 1,500 ransomware attacks since the Fall of 2019 and is thought to have been responsible for more than $146 million in extortion payments (1,500 BTC). That operation led to charges being filed against a Canadian Netwalker ransomware affiliate, Sebastian Vachon-Desjardins. Vachon-Desjardins was alleged to have obtained more than $27.6 million in ransom payments from attacks in the United States...
Russian-Israeli National Faces 41-Count Indictment for LockBit Development
A dual Russian and Israeli national alleged to have been a developer for the infamous LockBit ransomware group has been charged by the U.S. Department of Justice in a 41-count indictment. Rostislav Panev, 51, a resident of Haifa in Israel, was arrested by Israeli authorities in August 2024. An analysis of Penev’s computer revealed he had credentials for a dark web repository containing the source code of several different versions of the LockBit builder, used by affiliates of the Ransomware-a-s-a-Service (RaaS) operation to create custom versions of the LockBit encryptor. The repository also contained leaked Conti ransomware source code and tools used by LockBit affiliates, including StealBit, a tool for exfiltrating data from victims’ networks. The computer also contained credentials for the LockBit control panel. The U.S. Department of Justice alleges Panev was a developer of LockBit ransomware since the group emerged in 2019 and maintained the ransomware group’s infrastructure, including tools used by affiliates to disable anti-virus software, deploy malware across victims’...



