
On May 22, 2025, Emanuel Medical Center, a 209-bed acute care hospital in Turlock, Calif., detected suspicious activity on its computer systems. The hospital immediately secured its systems and launched an investigation with the help of cybersecurity experts.
According to the official notice of data security incident, the investigation determined that an unauthorized third party gained access to a portion of Emanuel Medical Center’s computer systems between May 21 and May 24, 2025.
The breach exposed both personally identifiable information (PII) and protected health information (PHI) of patients. The types of information present in the compromised files included full name, date of birth, contact information, government identification number (such as a Social Security or driver’s license number), health insurance information, patient identification number, date(s) of service, provider names, diagnosis, treatment information, prescription details, medical history and lab reports. The specific data exposed varied by individual.
While the notice does not specify how many individuals were affected, the range and sensitivity of information involved make this a significant incident. The breach potentially puts affected individuals at risk of identity theft, financial fraud and exposure of sensitive medical details.
To support those affected, Emanuel Medical Center is mailing individual notification letters to impacted individuals for whom it has a current address. The hospital has established a dedicated, toll-free call center at 855-815-3937, available Monday through Friday from 9 a.m. to 9 p.m. Eastern time, to answer questions and provide guidance.
Individuals who receive a notification letter are encouraged to:
Additional steps and resources for identity theft protection can be found at IdentityTheft.gov.
Given the nature of the breach, it is important for affected individuals to monitor their personal and financial information closely and take advantage of the resources provided by Emanuel Medical Center.








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)