VisionPoint Eye Center Breach Affects 434 in Texas

Published
December 19, 2024
Updated
December 19, 2024
VisionPoint Eye Center Breach Affects 434 in Texas
VisionPoint Eye Center
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

VisionPoint Eye Center, PLLC in Bloomington, Illinois, recently disclosed a data breach that exposed the personal health and medical information of those affected, including 434 individuals in Texas as reported to the Texas Attorney General's office on December 19, 2024.

While the exact details of how the breach occurred have not been disclosed, the incident resulted in the exposure of sensitive consumer data.

The types of information exposed in the breach include:

  • Name of individual
  • Address
  • Medical information
  • Health insurance information

This breach is particularly concerning given the sensitivity of the exposed data, which includes both medical and health insurance details. Such information can be exploited for identity theft, insurance fraud, or other malicious activities. VisionPoint Eye Center has notified affected individuals via U.S. Mail, as required by law.

For more details, you can view the official disclosure on the Texas Attorney General's Data Security Breach Report page.

VisionPoint Eye Center's response

VisionPoint Eye Center has taken steps to notify affected individuals of the breach. Notifications were sent via U.S. Mail, informing those impacted about the nature of the breach and the information that may have been compromised. The company has not publicly disclosed additional details about the measures it is taking to secure its systems or prevent future breaches.

If you were notified by VisionPoint Eye Center, it’s important to carefully review the information provided in the notice and take appropriate steps to protect yourself.

If you are affected by the data breach

If you were affected by this data breach, it’s crucial to take immediate action to safeguard your personal and financial information. Here are some steps you should consider:

  1. Monitor your financial accounts and credit reports. Keep an eye on your bank accounts, credit card statements, and credit reports for any unauthorized activity. You can request a free credit report once a year from each of the three major credit reporting agencies (Equifax, Experian, and TransUnion) at AnnualCreditReport.com.
  2. Place a fraud alert or credit freeze. Consider placing a fraud alert on your credit file to make it harder for identity thieves to open accounts in your name. Alternatively, you can place a credit freeze, which restricts access to your credit report.
  3. Review your medical and insurance records. Since medical and health insurance information was exposed, check your medical records and insurance statements for any signs of fraudulent activity, such as unauthorized treatments or claims.
  4. Be cautious of phishing scams. Cybercriminals may attempt to exploit the situation by sending phishing emails or making fraudulent phone calls. Avoid clicking on suspicious links or providing personal information to unknown callers.
  5. Contact VisionPoint Eye Center for support. If you have questions or need assistance, reach out to VisionPoint Eye Center directly using the contact information provided in the notification letter.

Taking these steps can help mitigate the risks associated with the breach and protect your personal information from further misuse.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Affected Entity
VisionPoint Eye Center
Consumers Notification date
Date of Breach
Breach Discovered Date
Total People Affected
Information Types Exposed

Join the

VisionPoint Eye Center

data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image