SlideShare ist ein Scribd-Unternehmen logo
1 von 3
SEC Filings Page 1 of 3 
8-K 
COMMUNITY HEALTH SYSTEMS INC filed this Form 8-K on 08/18/2014 
Entire Document 
<< Previous Page | Next Page >> 
UNITED STATES 
SECURITIES AND EXCHANGE COMMISSION 
Washington, D.C. 20549 
FORM 8-K 
CURRENT REPORT 
Pursuant to Section 13 or 15(d) of 
the Securities Exchange Act of 1934 
August 18, 2014 
Date of Report (date of earliest event reported) 
COMMUNITY HEALTH SYSTEMS, INC. 
(Exact name of Registrant as specified in charter) 
Delaware 001-15925 13-3893191 
(State or other jurisdiction 
of incorporation) 
(Commission File Number) (I.R.S. Employer 
Identification No.) 
4000 Meridian Boulevard 
Franklin, Tennessee 37067 
(Address of principal executive offices) 
Registrant’s telephone number, including area code: (615) 465-7000 
Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the 
registrant under any of the following provisions (see General Instruction A.2. below): 
 Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) 
 Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) 
 Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) 
 Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (l7 CFR 240.13e-4(c)) 
http://phx.corporate-ir.net/phoenix.zhtml?c=120730p=irol-SECTextTEXT=aHR0cDov... 8/19/2014
SEC Filings Page 2 of 3 
Item 8.01. Other Events. 
In July 2014, Community Health Systems, Inc. (the “Company”) confirmed that its computer network was the target of 
an external, criminal cyber attack that the Company believes occurred in April and June, 2014. The Company and its 
forensic expert, Mandiant (a FireEye Company), believe the attacker was an “Advanced Persistent Threat” group 
originating from China who used highly sophisticated malware and technology to attack the Company’s systems. The 
attacker was able to bypass the Company’s security measures and successfully copy and transfer certain data outside the 
Company. Since first learning of this attack, the Company has worked closely with federal law enforcement authorities 
in connection with their investigation and possible prosecution of those determined to be responsible for this attack. The 
Company also engaged Mandiant, who has conducted a thorough investigation of this incident and is advising the 
Company regarding remediation efforts. Immediately prior to the filing of this Report, the Company completed 
eradication of the malware from its systems and finalized the implementation of other remediation efforts that are 
designed to protect against future intrusions of this type. The Company has been informed by federal authorities and 
Mandiant that this intruder has typically sought valuable intellectual property, such as medical device and equipment 
development data. However, in this instance the data transferred was non-medical patient identification data related to 
the Company’s physician practice operations and affected approximately 4.5 million individuals who, in the last five 
years, were referred for or received services from physicians affiliated with the Company. The Company has confirmed 
that this data did not include patient credit card, medical or clinical information; the data is, however, considered 
protected under the Health Insurance Portability and Accountability Act (“HIPAA”) because it includes patient names, 
addresses, birthdates, telephone numbers and social security numbers. The Company is providing appropriate 
notification to affected patients and regulatory agencies as required by federal and state law. The Company will also be 
offering identity theft protection services to individuals affected by this attack. The Company carries cyber/privacy 
liability insurance to protect it against certain losses related to matters of this nature. While this matter may result in 
remediation expenses, regulatory inquiries, litigation and other liabilities, at this time, the Company does not believe this 
incident will have a material adverse effect on its business or financial results. 
Forward-looking Statements 
This Current Report on Form 8-K contains forward-looking statements within the meaning of Section 27A of the 
Securities Act of 1933, as amended, Section 21E of the Securities Exchange Act of 1934, as amended, and the Private 
Securities Litigation Reform Act of 1995, that involve risks and uncertainties. All statements in this Current Report on 
Form 8-K, other than statements of historical fact, including statements regarding the anticipated impact of the incident 
described herein on the Company’s business and financial results, are forward-looking statements. These statements are 
not guarantees of future results or performance, and actual outcomes and results may differ materially from those 
expressed in, or implied by, any of these forward-looking statements. Risks and uncertainties that could cause actual 
results to differ materially from those in the forward-looking statements include, but are not limited to, the outcome of 
any potential regulatory inquiries and/or litigation to which the Company may become subject as the result of this 
incident, the potential reputational damage to the Company resulting from this incident, the outcome of the Company’s 
pending and ongoing investigation, including the Company’s potential discovery of additional information relating to 
this incident, and the extent of remediation costs and other additional operating or other expenses that may be incurred 
by the Company as the result of this incident. The Company undertakes no obligation to revise or update any forward-looking 
statements, or to make any other forward-looking statements, whether as a result of new information, future 
events, or otherwise. 
The information furnished pursuant to this Item 8.01 shall not be deemed “filed” for purposes of Section 18 of the 
Securities Exchange Act of 1934 (the “Exchange Act”) or otherwise subject to the liabilities under that Section and shall 
not be deemed to be incorporated by reference into any filing of the Company under the Securities Act of 1933 or the 
Exchange Act. 
http://phx.corporate-ir.net/phoenix.zhtml?c=120730p=irol-SECTextTEXT=aHR0cDov... 8/19/2014
SEC Filings Page 3 of 3 
SIGNATURES 
Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be 
signed on its behalf by the undersigned hereunto duly authorized. 
Date: August 18, 2014 COMMUNITY HEALTH SYSTEMS, INC. 
(Registrant) 
By: /s/ Wayne T. Smith 
Wayne T. Smith 
Chairman of the Board and 
Chief Executive Officer 
(principal executive officer) 
By: /s/ W. Larry Cash 
W. Larry Cash 
President of Financial Services and Chief 
Financial Officer and Director 
(principal financial officer) 
 Previous Page | Next Page  
http://phx.corporate-ir.net/phoenix.zhtml?c=120730p=irol-SECTextTEXT=aHR0cDov... 8/19/2014

Weitere ähnliche Inhalte

Was ist angesagt?

Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014- Mark - Fullbright
 
Notifiable data breach scheme statistics
Notifiable data breach scheme statistics Notifiable data breach scheme statistics
Notifiable data breach scheme statistics KitLegal
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!Now Dentons
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About PrivacyNow Dentons
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!catherinecoulter
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
 
New developments in corporate registration vitaly kolesnikov and maxim kuzn...
New developments in corporate registration   vitaly kolesnikov and maxim kuzn...New developments in corporate registration   vitaly kolesnikov and maxim kuzn...
New developments in corporate registration vitaly kolesnikov and maxim kuzn...Corporate Registers Forum
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
FTC view on Stored Communications Act
FTC view on Stored Communications ActFTC view on Stored Communications Act
FTC view on Stored Communications ActDavid Sweigert
 

Was ist angesagt? (14)

Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014Safeguarding Consumers’ Financial Data 2014
Safeguarding Consumers’ Financial Data 2014
 
HITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAAHITECH-Changes-to-HIPAA
HITECH-Changes-to-HIPAA
 
Notifiable data breach scheme statistics
Notifiable data breach scheme statistics Notifiable data breach scheme statistics
Notifiable data breach scheme statistics
 
What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!What You Need To Know About Privacy - Now!
What You Need To Know About Privacy - Now!
 
What You Need to Know About Privacy
What You Need to Know About PrivacyWhat You Need to Know About Privacy
What You Need to Know About Privacy
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
 
HIPAA Overview
HIPAA OverviewHIPAA Overview
HIPAA Overview
 
New developments in corporate registration vitaly kolesnikov and maxim kuzn...
New developments in corporate registration   vitaly kolesnikov and maxim kuzn...New developments in corporate registration   vitaly kolesnikov and maxim kuzn...
New developments in corporate registration vitaly kolesnikov and maxim kuzn...
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
FTC view on Stored Communications Act
FTC view on Stored Communications ActFTC view on Stored Communications Act
FTC view on Stored Communications Act
 
Waste, Fraud & Abuse Training
Waste, Fraud & Abuse TrainingWaste, Fraud & Abuse Training
Waste, Fraud & Abuse Training
 

Ähnlich wie SEC filing for Community Health Systems breach

562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docxfredharris32
 
United Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings Releasefinance3
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DRTPComps LLC
 
helath net 10K 98
helath net 10K 98helath net 10K 98
helath net 10K 98finance18
 
United Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings Releasefinance3
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013- Mark - Fullbright
 
Spectral Molecular Imaging
Spectral Molecular ImagingSpectral Molecular Imaging
Spectral Molecular ImagingPARS Media
 
United Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial TablesUnited Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial Tablesfinance3
 
LIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeatureLIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeatureNadya Salcedo
 
Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report finance2
 
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008finance2
 
httpwww.edgar-online.com UNITED STATES SECURIT.docx
httpwww.edgar-online.com  UNITED STATES SECURIT.docxhttpwww.edgar-online.com  UNITED STATES SECURIT.docx
httpwww.edgar-online.com UNITED STATES SECURIT.docxadampcarr67227
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
How To Go Public Using Form S-1
How To Go Public Using Form S-1How To Go Public Using Form S-1
How To Go Public Using Form S-1vault99toe
 
Impax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentationImpax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentationimpax-labs
 
Interpace Diagnostics Group Presentation
Interpace Diagnostics Group PresentationInterpace Diagnostics Group Presentation
Interpace Diagnostics Group PresentationRedChip Companies, Inc.
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Fcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryFcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryAlberto Garcia Romera
 
helath net 1231 2000_Form_10K
helath net 1231 2000_Form_10Khelath net 1231 2000_Form_10K
helath net 1231 2000_Form_10Kfinance18
 
International legal consideration
International legal considerationInternational legal consideration
International legal considerationBishnu Koirala
 

Ähnlich wie SEC filing for Community Health Systems breach (20)

562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
562019 Form 10-Khttpswww.sec.govArchivesedgardata.docx
 
United Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group[PDF Document] Form 8-K Related to Earnings Release
United Health Group[PDF Document] Form 8-K Related to Earnings Release
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DR
 
helath net 10K 98
helath net 10K 98helath net 10K 98
helath net 10K 98
 
United Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings ReleaseUnited Health Group [PDF Document] Form 8-K Related to Earnings Release
United Health Group [PDF Document] Form 8-K Related to Earnings Release
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
 
Spectral Molecular Imaging
Spectral Molecular ImagingSpectral Molecular Imaging
Spectral Molecular Imaging
 
United Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial TablesUnited Health Group Form 8-K Related to Earnings Release Final Financial Tables
United Health Group Form 8-K Related to Earnings Release Final Financial Tables
 
LIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeatureLIT_AprilMay2014_FalseClaimsActFeature
LIT_AprilMay2014_FalseClaimsActFeature
 
Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report Fiscal 2008 10-K Annual Report
Fiscal 2008 10-K Annual Report
 
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
mckesson Annual Report as Filed on Form 10-K - 2.8M 2008
 
httpwww.edgar-online.com UNITED STATES SECURIT.docx
httpwww.edgar-online.com  UNITED STATES SECURIT.docxhttpwww.edgar-online.com  UNITED STATES SECURIT.docx
httpwww.edgar-online.com UNITED STATES SECURIT.docx
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
How To Go Public Using Form S-1
How To Go Public Using Form S-1How To Go Public Using Form S-1
How To Go Public Using Form S-1
 
Impax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentationImpax fourth quarter and full year 2017 earnings call presentation
Impax fourth quarter and full year 2017 earnings call presentation
 
Interpace Diagnostics Group Presentation
Interpace Diagnostics Group PresentationInterpace Diagnostics Group Presentation
Interpace Diagnostics Group Presentation
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Fcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryFcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industry
 
helath net 1231 2000_Form_10K
helath net 1231 2000_Form_10Khelath net 1231 2000_Form_10K
helath net 1231 2000_Form_10K
 
International legal consideration
International legal considerationInternational legal consideration
International legal consideration
 

Mehr von David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

Mehr von David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Kürzlich hochgeladen

一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfjimeibergerreview
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forRoger Valdez
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 

Kürzlich hochgeladen (20)

一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 

SEC filing for Community Health Systems breach

  • 1. SEC Filings Page 1 of 3 8-K COMMUNITY HEALTH SYSTEMS INC filed this Form 8-K on 08/18/2014 Entire Document << Previous Page | Next Page >> UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 August 18, 2014 Date of Report (date of earliest event reported) COMMUNITY HEALTH SYSTEMS, INC. (Exact name of Registrant as specified in charter) Delaware 001-15925 13-3893191 (State or other jurisdiction of incorporation) (Commission File Number) (I.R.S. Employer Identification No.) 4000 Meridian Boulevard Franklin, Tennessee 37067 (Address of principal executive offices) Registrant’s telephone number, including area code: (615) 465-7000 Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions (see General Instruction A.2. below): Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (l7 CFR 240.13e-4(c)) http://phx.corporate-ir.net/phoenix.zhtml?c=120730p=irol-SECTextTEXT=aHR0cDov... 8/19/2014
  • 2. SEC Filings Page 2 of 3 Item 8.01. Other Events. In July 2014, Community Health Systems, Inc. (the “Company”) confirmed that its computer network was the target of an external, criminal cyber attack that the Company believes occurred in April and June, 2014. The Company and its forensic expert, Mandiant (a FireEye Company), believe the attacker was an “Advanced Persistent Threat” group originating from China who used highly sophisticated malware and technology to attack the Company’s systems. The attacker was able to bypass the Company’s security measures and successfully copy and transfer certain data outside the Company. Since first learning of this attack, the Company has worked closely with federal law enforcement authorities in connection with their investigation and possible prosecution of those determined to be responsible for this attack. The Company also engaged Mandiant, who has conducted a thorough investigation of this incident and is advising the Company regarding remediation efforts. Immediately prior to the filing of this Report, the Company completed eradication of the malware from its systems and finalized the implementation of other remediation efforts that are designed to protect against future intrusions of this type. The Company has been informed by federal authorities and Mandiant that this intruder has typically sought valuable intellectual property, such as medical device and equipment development data. However, in this instance the data transferred was non-medical patient identification data related to the Company’s physician practice operations and affected approximately 4.5 million individuals who, in the last five years, were referred for or received services from physicians affiliated with the Company. The Company has confirmed that this data did not include patient credit card, medical or clinical information; the data is, however, considered protected under the Health Insurance Portability and Accountability Act (“HIPAA”) because it includes patient names, addresses, birthdates, telephone numbers and social security numbers. The Company is providing appropriate notification to affected patients and regulatory agencies as required by federal and state law. The Company will also be offering identity theft protection services to individuals affected by this attack. The Company carries cyber/privacy liability insurance to protect it against certain losses related to matters of this nature. While this matter may result in remediation expenses, regulatory inquiries, litigation and other liabilities, at this time, the Company does not believe this incident will have a material adverse effect on its business or financial results. Forward-looking Statements This Current Report on Form 8-K contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, Section 21E of the Securities Exchange Act of 1934, as amended, and the Private Securities Litigation Reform Act of 1995, that involve risks and uncertainties. All statements in this Current Report on Form 8-K, other than statements of historical fact, including statements regarding the anticipated impact of the incident described herein on the Company’s business and financial results, are forward-looking statements. These statements are not guarantees of future results or performance, and actual outcomes and results may differ materially from those expressed in, or implied by, any of these forward-looking statements. Risks and uncertainties that could cause actual results to differ materially from those in the forward-looking statements include, but are not limited to, the outcome of any potential regulatory inquiries and/or litigation to which the Company may become subject as the result of this incident, the potential reputational damage to the Company resulting from this incident, the outcome of the Company’s pending and ongoing investigation, including the Company’s potential discovery of additional information relating to this incident, and the extent of remediation costs and other additional operating or other expenses that may be incurred by the Company as the result of this incident. The Company undertakes no obligation to revise or update any forward-looking statements, or to make any other forward-looking statements, whether as a result of new information, future events, or otherwise. The information furnished pursuant to this Item 8.01 shall not be deemed “filed” for purposes of Section 18 of the Securities Exchange Act of 1934 (the “Exchange Act”) or otherwise subject to the liabilities under that Section and shall not be deemed to be incorporated by reference into any filing of the Company under the Securities Act of 1933 or the Exchange Act. http://phx.corporate-ir.net/phoenix.zhtml?c=120730p=irol-SECTextTEXT=aHR0cDov... 8/19/2014
  • 3. SEC Filings Page 3 of 3 SIGNATURES Pursuant to the requirements of the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned hereunto duly authorized. Date: August 18, 2014 COMMUNITY HEALTH SYSTEMS, INC. (Registrant) By: /s/ Wayne T. Smith Wayne T. Smith Chairman of the Board and Chief Executive Officer (principal executive officer) By: /s/ W. Larry Cash W. Larry Cash President of Financial Services and Chief Financial Officer and Director (principal financial officer) Previous Page | Next Page http://phx.corporate-ir.net/phoenix.zhtml?c=120730p=irol-SECTextTEXT=aHR0cDov... 8/19/2014