Children's Dental Center at Preston Trail, P.C. d/b/a Park Place Pediatric Dentistry (Arlington, TX) Data Breach: 1,690 Patients Affected

This case study examines how proper medical practice IT support could have prevented the Children's Dental Center at Preston Trail, P.C. d/b/a Park Place Pediatric Dentistry (Arlington, TX) breach affecting 1,690 patients.
Organization: Children's Dental Center at Preston Trail, P.C. d/b/a Park Place Pediatric Dentistry (Arlington, TX)
Location: TN
Individuals Affected: 1,690
Breach Type: Theft
Location of Breach: Laptop
Source: HHS Office for Civil Rights Breach Portal
What Happened
Children's Dental Center at Preston Trail, P.C. d/b/a Park Place Pediatric Dentistry (Arlington, TX) in TN reported a data breach to the HHS Office for Civil Rights affecting 1,690 individuals. The incident involved laptop systems containing protected health information (PHI).
The breach resulted from physical theft of devices or media containing patient records. Stolen laptops, mobile devices, USB drives, or backup tapes often contain unencrypted PHI. Without proper encryption and device management, physical theft leads directly to data exposure.
Why This Matters
Healthcare data breaches carry severe consequences beyond regulatory fines:
- Patient harm: Exposed medical records enable identity theft, insurance fraud, and targeted scams against vulnerable patients
- Financial impact: HIPAA penalties range from $100 to $50,000 per violation, with annual maximums of $1.5 million per violation category
- Reputation damage: Breach notifications to 1,690 patients generate local media coverage and erode trust
- Operational disruption: OCR investigations require significant staff time and may trigger additional audits
- Legal exposure: Class action lawsuits following major breaches can exceed regulatory penalties
How This Could Have Been Prevented
Based on the breach type and affected systems, these controls would have reduced risk:
- Encrypt all devices and media containing PHI (laptops, phones, USB drives): Encrypt all devices and media containing PHI (laptops, phones, USB drives)
- Implement mobile device management (MDM) with remote wipe capability: Implement mobile device management (MDM) with remote wipe capability
- Prohibit storage of PHI on portable devices without encryption: Prohibit storage of PHI on portable devices without encryption
- Use cable locks and secure storage for equipment in clinical areas: Use cable locks and secure storage for equipment in clinical areas
- Deploy asset tracking for all devices with PHI access: Deploy asset tracking for all devices with PHI access
Many healthcare organizations lack the internal resources to implement these controls. A qualified healthcare IT support provider can fill these gaps with HIPAA-trained staff who understand clinical workflows.
Key Takeaways
- Breaches are preventable: The controls that stop most healthcare breaches are well-documented. Implementation—not knowledge—is the gap.
- Speed matters: Early detection limits breach scope. Organizations with 24/7 monitoring typically contain incidents faster than those without.
- Documentation is critical: HIPAA requires demonstrating reasonable security measures. Proper logging and policy documentation can reduce penalties.
- Third parties add risk: Business associates cause a significant portion of healthcare breaches. Vendor security assessment matters.
Protect Your Practice
Healthcare organizations face increasing cyber threats. HIPAA-trained IT support can help protect patient data before incidents occur.
Topics

Sreenivasa Reddy G
Founder & CEO • 15+ years
Sreenivasa Reddy is the Founder and CEO of Medha Cloud, recognized as "Startup of the Year 2024" by The CEO Magazine. With over 15 years of experience in cloud infrastructure and IT services, he leads the company's vision to deliver enterprise-grade cloud solutions to businesses worldwide.