Sometimes it takes months until I see a notification related to a leak I reported to an entity. This week, Mobile Anesthesiologists disclosed a data leak. Their notification is embedded below. The back story on this one is that in December, a researcher alerted DataBreaches.net to a leak involving what appeared to live ePHI from multiple locations of an anesthesiology-related practice. The data were exposed on an Azure storage blob. By cross-matching locations, DataBreaches.net determined that the data were likely associated with AMS-MD and/or Mobile Anesthesiology, LLC. Over the class of my communications with Josh Gantz from AMS-MD, i learned that the leak was Mobile Anesthesiologist’s. With the researcher’s consent, i was able to tell them what IP address in their logs would be the researcher’s, so they could understand any access from that IP address. The researcher also agreed to ruin any data they had downloaded. as is this site’s policy, however, DataBreaches.net has not deleted the data provided to this site until this incident appears on HHS or is otherwise fully disclosed so that this site can ensure that the number reported and other details are consistent with what was leaked. so far, nothing has appeared on HHS’s public transgress tool for this incident under either entity’s name, so we doh not make reported numbers yet, but HHS does not always promptly post submissions. Given that notification letters just went out this week, it may show up soon on HHS’s site. It is probably outside of the 60-day window from the time they were notified of the leak and should hold “discovered” it, but they will probably exact that they only “discovered” it on January 28. This carry will live updated when their reported number is available.