Print-Friendly Version  |  Text: Increase text size  Decrease text size  reset

Notice to Our Patients Regarding Network Access Incident

Valley Anesthesiology and Pain Consultants (“VAPC”) is committed to maintaining the privacy and security of personal information provided to VAPC. This notice is to inform our patients of an incident involving patient information.

On June 13, 2016, VAPC learned that a third party may have gained unauthorized access to the VAPC computer systems on March 30, 2016. Upon learning of the situation, VAPC immediately began an investigation, including hiring a leading forensics firm, and notifying law enforcement. The forensics firm found no evidence that the information on the computer systems was accessed, but was unable to definitively rule that out. The computer systems identified may contain patients’ names, limited clinical information, name of health insurer, insurance identification numbers, and in some instances, social security numbers. Patient financial information was not included in the computer systems.

We have no evidence that any patient information has been accessed or used inappropriately. However, because we value our relationship with our patients, we began mailing letters to affected patients on August 11, 2016, and established a dedicated call center to answer patients’ questions. If you believe that you are affected, but do not receive a letter by September 9, 2016, please call 1-888-839-9460, from 6:00 AM to 6:00 PM Pacific Time, Monday through Friday. We recommend that affected patients review the statements that they receive from their health insurer. If they see services that they did not receive, please contact the health insurer immediately.

We regret any inconvenience or concern this may cause our patients. In addition to security safeguards already in place, we are taking steps to enhance the security of our computer systems in order to prevent this type of incident from occurring again in the future. These steps include reviewing our security processes, strengthening our network firewalls, and continuing to incorporate best practices in IT security.