SlideShare a Scribd company logo
1 of 3
8-K
COMMUNITY HEALTH SYSTEMS INC filed this Form 8-K on 08/18/2014
Entire Document
<< Previous Page | Next Page >>
UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
FORM 8-K
CURRENT REPORT
Pursuant to Section 13 or 15(d) of
the Securities Exchange Act of 1934
August 18, 2014
Date of Report (date of earliest event reported)
COMMUNITY HEALTH SYSTEMS, INC.
(Exact name of Registrant as specified in charter)
Delaware 001-15925 13-3893191
(State or other jurisdiction
of incorporation)
(Commission File Number) (I.R.S. Employer
Identification No.)
4000 Meridian Boulevard
Franklin, Tennessee 37067
(Address of principal executive offices)
Registrant’s telephone number, including area code: (615) 465-7000
Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the
registrant under any of the following provisions (see General Instruction A.2. below):
… Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425)
… Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12)
… Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b))
… Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (l7 CFR 240.13e-4(c))
Page 1 of 3SEC Filings
8/19/2014http://phx.corporate-ir.net/phoenix.zhtml?c=120730&p=irol-SECText&TEXT=aHR0cDov...
Item 8.01. Other Events.
In July 2014, Community Health Systems, Inc. (the “Company”) confirmed that its computer network was the target of
an external, criminal cyber attack that the Company believes occurred in April and June, 2014. The Company and its
forensic expert, Mandiant (a FireEye Company), believe the attacker was an “Advanced Persistent Threat” group
originating from China who used highly sophisticated malware and technology to attack the Company’s systems. The
attacker was able to bypass the Company’s security measures and successfully copy and transfer certain data outside the
Company. Since first learning of this attack, the Company has worked closely with federal law enforcement authorities
in connection with their investigation and possible prosecution of those determined to be responsible for this attack. The
Company also engaged Mandiant, who has conducted a thorough investigation of this incident and is advising the
Company regarding remediation efforts. Immediately prior to the filing of this Report, the Company completed
eradication of the malware from its systems and finalized the implementation of other remediation efforts that are
designed to protect against future intrusions of this type. The Company has been informed by federal authorities and
Mandiant that this intruder has typically sought valuable intellectual property, such as medical device and equipment
development data. However, in this instance the data transferred was non-medical patient identification data related to
the Company’s physician practice operations and affected approximately 4.5 million individuals who, in the last five
years, were referred for or received services from physicians affiliated with the Company. The Company has confirmed
that this data did not include patient credit card, medical or clinical information; the data is, however, considered
protected under the Health Insurance Portability and Accountability Act (“HIPAA”) because it includes patient names,
addresses, birthdates, telephone numbers and social security numbers. The Company is providing appropriate
notification to affected patients and regulatory agencies as required by federal and state law. The Company will also be
offering identity theft protection services to individuals affected by this attack. The Company carries cyber/privacy
liability insurance to protect it against certain losses related to matters of this nature. While this matter may result in
remediation expenses, regulatory inquiries, litigation and other liabilities, at this time, the Company does not believe this
incident will have a material adverse effect on its business or financial results.
Forward-looking Statements
This Current Report on Form 8-K contains forward-looking statements within the meaning of Section 27A of the
Securities Act of 1933, as amended, Section 21E of the Securities Exchange Act of 1934, as amended, and the Private
Securities Litigation Reform Act of 1995, that involve risks and uncertainties. All statements in this Current Report on
Form 8-K, other than statements of historical fact, including statements regarding the anticipated impact of the incident
described herein on the Company’s business and financial results, are forward-looking statements. These statements are
not guarantees of future results or performance, and actual outcomes and results may differ materially from those
expressed in, or implied by, any of these forward-looking statements. Risks and uncertainties that could cause actual
results to differ materially from those in the forward-looking statements include, but are not limited to, the outcome of
any potential regulatory inquiries and/or litigation to which the Company may become subject as the result of this
incident, the potential reputational damage to the Company resulting from this incident, the outcome of the Company’s
pending and ongoing investigation, including the Company’s potential discovery of additional information relating to
this incident, and the extent of remediation costs and other additional operating or other expenses that may be incurred
by the Company as the result of this incident. The Company undertakes no obligation to revise or update any forward-
looking statements, or to make any other forward-looking statements, whether as a result of new information, future
events, or otherwise.
The information furnished pursuant to this Item 8.01 shall not be deemed “filed” for purposes of Section 18 of the
Securities Exchange Act of 1934 (the “Exchange Act”) or otherwise subject to the liabilities under that Section and shall
not be deemed to be incorporated by reference into any filing of the Company under the Securities Act of 1933 or the
Exchange Act.
Page 2 of 3SEC Filings
8/19/2014http://phx.corporate-ir.net/phoenix.zhtml?c=120730&p=irol-SECText&TEXT=aHR0cDov...
SIGNATURES
Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be
signed on its behalf by the undersigned hereunto duly authorized.
Date: August 18, 2014 COMMUNITY HEALTH SYSTEMS, INC.
(Registrant)
By: /s/ Wayne T. Smith
Wayne T. Smith
Chairman of the Board and
Chief Executive Officer
(principal executive officer)
By: /s/ W. Larry Cash
W. Larry Cash
President of Financial Services and Chief
Financial Officer and Director
(principal financial officer)
<< Previous Page | Next Page >>
Page 3 of 3SEC Filings
8/19/2014http://phx.corporate-ir.net/phoenix.zhtml?c=120730&p=irol-SECText&TEXT=aHR0cDov...

More Related Content

What's hot

What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!Now Dentons
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About PrivacyNow Dentons
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
New developments in corporate registration vitaly kolesnikov and maxim kuzn...
New developments in corporate registration   vitaly kolesnikov and maxim kuzn...New developments in corporate registration   vitaly kolesnikov and maxim kuzn...
New developments in corporate registration vitaly kolesnikov and maxim kuzn...Corporate Registers Forum
 
Notifiable data breach scheme statistics
Notifiable data breach scheme statistics Notifiable data breach scheme statistics
Notifiable data breach scheme statistics KitLegal
 
Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014- Mark - Fullbright
 
FTC view on Stored Communications Act
FTC view on Stored Communications ActFTC view on Stored Communications Act
FTC view on Stored Communications ActDavid Sweigert
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 

What's hot (11)

What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About Privacy
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
New developments in corporate registration vitaly kolesnikov and maxim kuzn...
New developments in corporate registration   vitaly kolesnikov and maxim kuzn...New developments in corporate registration   vitaly kolesnikov and maxim kuzn...
New developments in corporate registration vitaly kolesnikov and maxim kuzn...
 
Notifiable data breach scheme statistics
Notifiable data breach scheme statistics Notifiable data breach scheme statistics
Notifiable data breach scheme statistics
 
HITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAAHITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAA
 
Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014
 
FTC view on Stored Communications Act
FTC view on Stored Communications ActFTC view on Stored Communications Act
FTC view on Stored Communications Act
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 

Viewers also liked

Viewers also liked (15)

Tips cuestionario
Tips cuestionario Tips cuestionario
Tips cuestionario
 
Presentación1
Presentación1Presentación1
Presentación1
 
Trabajo de la escuela 5º grado
Trabajo de la escuela 5º gradoTrabajo de la escuela 5º grado
Trabajo de la escuela 5º grado
 
PG in Indrapuram ,pggrabber.com
PG in Indrapuram ,pggrabber.comPG in Indrapuram ,pggrabber.com
PG in Indrapuram ,pggrabber.com
 
CV NDJOCK yannick adonis english
CV NDJOCK yannick adonis englishCV NDJOCK yannick adonis english
CV NDJOCK yannick adonis english
 
плакат основной
плакат основнойплакат основной
плакат основной
 
SAHIL KHAN resume
SAHIL KHAN resumeSAHIL KHAN resume
SAHIL KHAN resume
 
Certificate principle
Certificate principleCertificate principle
Certificate principle
 
ABAP Certification
ABAP CertificationABAP Certification
ABAP Certification
 
Presentación de conceptos web(1)
Presentación de conceptos web(1)Presentación de conceptos web(1)
Presentación de conceptos web(1)
 
Ingurune laburpen onintze
Ingurune laburpen onintzeIngurune laburpen onintze
Ingurune laburpen onintze
 
Superfly
SuperflySuperfly
Superfly
 
Forcesfor good
Forcesfor goodForcesfor good
Forcesfor good
 
Collective- Nordic UX Challange Team
Collective- Nordic UX Challange TeamCollective- Nordic UX Challange Team
Collective- Nordic UX Challange Team
 
My presentación
My presentaciónMy presentación
My presentación
 

Similar to 4.5 Million record data breach

SEC filing for Community Health Systems breach
SEC filing for Community Health Systems breachSEC filing for Community Health Systems breach
SEC filing for Community Health Systems breachDavid Sweigert
 
United Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings Releasefinance3
 
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docxfredharris32
 
United Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings Releasefinance3
 
Spectral Molecular Imaging
Spectral Molecular ImagingSpectral Molecular Imaging
Spectral Molecular ImagingPARS Media
 
United Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial TablesUnited Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial Tablesfinance3
 
helath net 10K 98
helath net 10K 98helath net 10K 98
helath net 10K 98finance18
 
httpwww.edgar-online.com UNITED STATES SECURIT.docx
httpwww.edgar-online.com  UNITED STATES SECURIT.docxhttpwww.edgar-online.com  UNITED STATES SECURIT.docx
httpwww.edgar-online.com UNITED STATES SECURIT.docxadampcarr67227
 
Impax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentationImpax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentationimpax-labs
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DRTPComps LLC
 
Interpace Diagnostics Group Presentation
Interpace Diagnostics Group PresentationInterpace Diagnostics Group Presentation
Interpace Diagnostics Group PresentationRedChip Companies, Inc.
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013- Mark - Fullbright
 
LIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeatureLIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeatureNadya Salcedo
 
J.p. morgan 2018 healhcare conference
J.p. morgan 2018 healhcare conferenceJ.p. morgan 2018 healhcare conference
J.p. morgan 2018 healhcare conferenceimpax-labs
 
How To Go Public Using Form S-1
How To Go Public Using Form S-1How To Go Public Using Form S-1
How To Go Public Using Form S-1vault99toe
 
Stone Energy SEC Form 8-K Filed Aug 23, 2016
Stone Energy SEC Form 8-K Filed Aug 23, 2016Stone Energy SEC Form 8-K Filed Aug 23, 2016
Stone Energy SEC Form 8-K Filed Aug 23, 2016Marcellus Drilling News
 
helath net 1231 2000_Form_10K
helath net 1231 2000_Form_10Khelath net 1231 2000_Form_10K
helath net 1231 2000_Form_10Kfinance18
 
Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report finance2
 
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008finance2
 

Similar to 4.5 Million record data breach (20)

SEC filing for Community Health Systems breach
SEC filing for Community Health Systems breachSEC filing for Community Health Systems breach
SEC filing for Community Health Systems breach
 
United Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings Release
 
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
 
United Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings Release
 
Spectral Molecular Imaging
Spectral Molecular ImagingSpectral Molecular Imaging
Spectral Molecular Imaging
 
United Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial TablesUnited Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial Tables
 
helath net 10K 98
helath net 10K 98helath net 10K 98
helath net 10K 98
 
httpwww.edgar-online.com UNITED STATES SECURIT.docx
httpwww.edgar-online.com  UNITED STATES SECURIT.docxhttpwww.edgar-online.com  UNITED STATES SECURIT.docx
httpwww.edgar-online.com UNITED STATES SECURIT.docx
 
Impax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentationImpax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentation
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DR
 
Interpace Diagnostics Group Presentation
Interpace Diagnostics Group PresentationInterpace Diagnostics Group Presentation
Interpace Diagnostics Group Presentation
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
 
LIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeatureLIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeature
 
J.p. morgan 2018 healhcare conference
J.p. morgan 2018 healhcare conferenceJ.p. morgan 2018 healhcare conference
J.p. morgan 2018 healhcare conference
 
How To Go Public Using Form S-1
How To Go Public Using Form S-1How To Go Public Using Form S-1
How To Go Public Using Form S-1
 
Stone Energy SEC Form 8-K Filed Aug 23, 2016
Stone Energy SEC Form 8-K Filed Aug 23, 2016Stone Energy SEC Form 8-K Filed Aug 23, 2016
Stone Energy SEC Form 8-K Filed Aug 23, 2016
 
Marpai Investor Presentation November
Marpai Investor Presentation NovemberMarpai Investor Presentation November
Marpai Investor Presentation November
 
helath net 1231 2000_Form_10K
helath net 1231 2000_Form_10Khelath net 1231 2000_Form_10K
helath net 1231 2000_Form_10K
 
Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report
 
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 

Recently uploaded (20)

Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 

4.5 Million record data breach

  • 1. 8-K COMMUNITY HEALTH SYSTEMS INC filed this Form 8-K on 08/18/2014 Entire Document << Previous Page | Next Page >> UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 August 18, 2014 Date of Report (date of earliest event reported) COMMUNITY HEALTH SYSTEMS, INC. (Exact name of Registrant as specified in charter) Delaware 001-15925 13-3893191 (State or other jurisdiction of incorporation) (Commission File Number) (I.R.S. Employer Identification No.) 4000 Meridian Boulevard Franklin, Tennessee 37067 (Address of principal executive offices) Registrant’s telephone number, including area code: (615) 465-7000 Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions (see General Instruction A.2. below): … Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) … Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) … Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) … Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (l7 CFR 240.13e-4(c)) Page 1 of 3SEC Filings 8/19/2014http://phx.corporate-ir.net/phoenix.zhtml?c=120730&p=irol-SECText&TEXT=aHR0cDov...
  • 2. Item 8.01. Other Events. In July 2014, Community Health Systems, Inc. (the “Company”) confirmed that its computer network was the target of an external, criminal cyber attack that the Company believes occurred in April and June, 2014. The Company and its forensic expert, Mandiant (a FireEye Company), believe the attacker was an “Advanced Persistent Threat” group originating from China who used highly sophisticated malware and technology to attack the Company’s systems. The attacker was able to bypass the Company’s security measures and successfully copy and transfer certain data outside the Company. Since first learning of this attack, the Company has worked closely with federal law enforcement authorities in connection with their investigation and possible prosecution of those determined to be responsible for this attack. The Company also engaged Mandiant, who has conducted a thorough investigation of this incident and is advising the Company regarding remediation efforts. Immediately prior to the filing of this Report, the Company completed eradication of the malware from its systems and finalized the implementation of other remediation efforts that are designed to protect against future intrusions of this type. The Company has been informed by federal authorities and Mandiant that this intruder has typically sought valuable intellectual property, such as medical device and equipment development data. However, in this instance the data transferred was non-medical patient identification data related to the Company’s physician practice operations and affected approximately 4.5 million individuals who, in the last five years, were referred for or received services from physicians affiliated with the Company. The Company has confirmed that this data did not include patient credit card, medical or clinical information; the data is, however, considered protected under the Health Insurance Portability and Accountability Act (“HIPAA”) because it includes patient names, addresses, birthdates, telephone numbers and social security numbers. The Company is providing appropriate notification to affected patients and regulatory agencies as required by federal and state law. The Company will also be offering identity theft protection services to individuals affected by this attack. The Company carries cyber/privacy liability insurance to protect it against certain losses related to matters of this nature. While this matter may result in remediation expenses, regulatory inquiries, litigation and other liabilities, at this time, the Company does not believe this incident will have a material adverse effect on its business or financial results. Forward-looking Statements This Current Report on Form 8-K contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, Section 21E of the Securities Exchange Act of 1934, as amended, and the Private Securities Litigation Reform Act of 1995, that involve risks and uncertainties. All statements in this Current Report on Form 8-K, other than statements of historical fact, including statements regarding the anticipated impact of the incident described herein on the Company’s business and financial results, are forward-looking statements. These statements are not guarantees of future results or performance, and actual outcomes and results may differ materially from those expressed in, or implied by, any of these forward-looking statements. Risks and uncertainties that could cause actual results to differ materially from those in the forward-looking statements include, but are not limited to, the outcome of any potential regulatory inquiries and/or litigation to which the Company may become subject as the result of this incident, the potential reputational damage to the Company resulting from this incident, the outcome of the Company’s pending and ongoing investigation, including the Company’s potential discovery of additional information relating to this incident, and the extent of remediation costs and other additional operating or other expenses that may be incurred by the Company as the result of this incident. The Company undertakes no obligation to revise or update any forward- looking statements, or to make any other forward-looking statements, whether as a result of new information, future events, or otherwise. The information furnished pursuant to this Item 8.01 shall not be deemed “filed” for purposes of Section 18 of the Securities Exchange Act of 1934 (the “Exchange Act”) or otherwise subject to the liabilities under that Section and shall not be deemed to be incorporated by reference into any filing of the Company under the Securities Act of 1933 or the Exchange Act. Page 2 of 3SEC Filings 8/19/2014http://phx.corporate-ir.net/phoenix.zhtml?c=120730&p=irol-SECText&TEXT=aHR0cDov...
  • 3. SIGNATURES Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned hereunto duly authorized. Date: August 18, 2014 COMMUNITY HEALTH SYSTEMS, INC. (Registrant) By: /s/ Wayne T. Smith Wayne T. Smith Chairman of the Board and Chief Executive Officer (principal executive officer) By: /s/ W. Larry Cash W. Larry Cash President of Financial Services and Chief Financial Officer and Director (principal financial officer) << Previous Page | Next Page >> Page 3 of 3SEC Filings 8/19/2014http://phx.corporate-ir.net/phoenix.zhtml?c=120730&p=irol-SECText&TEXT=aHR0cDov...