Migliaccio & Rathod LLP is currently investigating the Denver, Colorado-based South Denver Cardiology Associates for failing to safeguard sensitive patient information in a data breach that occurred in January of 2022. The security incident was caused by unauthorized access to the company’s networks, which exposed the information of current and former patients. Examples of the types of data exposed in the leak include names, dates of birth, Social Security numbers and/or drivers’ license numbers, patient account numbers, health insurance information, and clinical information, such as physician names, dates and types of service, and diagnoses.
Although South Denver Cardiology Associates began notifying affected individuals that their information was included in the data breach in early March of 2022, hackers may have already been able to use the information that was acquired for numerous fraudulent purposes. In previous data breaches involving a company’s digital systems, victims of data theft have had their information posted online with little information about who may have viewed or accessed it. Victims of these types of data attacks may be forced to spend money out of pocket for credit monitoring or fraudulent charges to bank and hospital accounts. Some individuals affected by the breach may have noticed suspicious credit card charges, requests for services or loans in their name, medical procedures ordered without patient consent, and/ or other examples of identity theft.
Are you or have you been a South Denver Cardiology Associates patient who has received a data breach notification letter in the past year?
If so, we would like to hear from you. Please complete the contact form on this page, send us an email at [email protected], or give us a call at (202) 470-3520.
The lawyers at Migliaccio & Rathod LLP have years of experience in class action litigation against large corporations, including in cases involving data breaches. More information about our current cases and investigations is available on our blog.