Bayada Home Health Care, a New Jersey-based home healthcare provider operating across 22 U.S. states, disclosed a data breach linked to a cybersecurity incident at one of its third-party vendors, Doctor Alliance.
What happened
Doctor Alliance facilitates physician signatures on Home Health Certifications and Plans of Care. They notified Bayada Home Health Care on December 4, 2025, that an unauthorized third party had accessed its network during two periods, October 31 to November 6, 2025, and November 14 to November 17, 2025.
During those windows, patient forms containing protected health information may have been accessed or acquired. Bayada stated it is not aware that its specific forms were copied, but could not rule out unauthorized access. Bayada responded by discontinuing its relationship with Doctor Alliance, reviewing vendor oversight policies, and implementing steps to reduce future third-party risk.
What was said
According to the notice of security incident, “The unauthorized actor accessed Doctor Alliance’s systems and may have accessed and/or copied Home Health Certification and Plan of Care forms for a limited number of BAYADA clients. We conducted a comprehensive investigation, which included confirming BAYADA systems were not affected, information provided by Doctor Alliance was accurate, and client contact information was validated so we could notify potentially affected clients. Our investigation has recently concluded.”
Why it matters
Healthcare often appears in-house, but a lot of the work that keeps care moving actually happens in outside systems. Doctor Alliance becomes a workforce chokepoint because it concentrates access and activity in one place. If multiple hospitals rely on the same outside workforce to handle scheduling, documentation support, coding, billing steps, or other operational work, then that vendor effectively becomes a shared corridor everyone walks through. When the vendor slows down, gets locked out, or has a security incident, the impact spreads outward fast.
That dependency expands the attack surface, especially as Paubox’s report on the top 3 healthcare attacks notes email remains the primary vector for breaches in healthcare, with thousands of incidents tied to credential theft, business email compromise, and vendor email exposures in 2025 alone.
When a vendor like Doctor Alliance is compromised, attackers can pivot from email and workflow platforms into broader enterprise systems, exposing high-value documents and data used in patient care planning.
See also: HIPAA Compliant Email: The Definitive Guide (2026 Update)
FAQs
Are third-party vendors a common cause of breaches?
Yes. Incidents involving vendors, like the breach affecting Bayada Home Health Care through Doctor Alliance, show how business associates remain a major risk area under HIPAA.
Does ‘no evidence of misuse’ mean patients are safe?
No. HIPAA treats unauthorized access itself as a breach unless a risk assessment proves a low probability of compromise.
Why do insider breaches still happen?
Insider incidents often stem from excessive access permissions, weak monitoring, or failure to enforce the minimum necessary standard, as seen in public health and hospital settings.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
