Laptops are stolen from a physician's office in a break-in, compromising data for hundreds of patients. An employee loses a personal hard drive that contains patient data. A radiologist joins a new outpatient facility and contacts patients from his previous employer, using information he downloaded before he left.