Norton Healthcare $11 Million Patient Data Breach Class Action Settlement

On January 13, 2026, a federal court approved an $11 million settlement in a class action lawsuit against Norton Healthcare, Inc.

On January 13, 2026, a federal court approved an $11 million settlement in a class action lawsuit against Norton Healthcare, Inc. and Norton Hospitals, Inc. following a major data breach that exposed sensitive information for approximately 2.5 million current and former patients and employees. The settlement offers affected individuals cash payments ranging from $5 to $80, three years of free medical monitoring services, and reimbursement for documented out-of-pocket losses up to $2,500.

This settlement represents one of the healthcare industry’s ongoing reckoning with cybersecurity failures, as hospitals and health systems continue to face significant financial penalties for failing to adequately protect patient data. The Norton Healthcare breach itself occurred on May 9, 2023, when the ALPHV/BlackCat ransomware group accessed approximately 4.7 terabytes of patient and employee data. This wasn’t a case of a few compromised files—the sheer volume of stolen data meant that millions of individuals’ medical records, insurance information, social security numbers, and other sensitive personal details were exposed to criminals. The breach remained a serious concern for affected parties for nearly three years before reaching settlement, a timeline that reflects both the complexity of healthcare litigation and the slow pace of the legal system when addressing corporate negligence.

Table of Contents

What Data Did the Norton Healthcare Breach Expose and Who Was Affected?

The May 2023 breach exposed an extraordinarily large volume of sensitive health information belonging to approximately 2.5 million individuals across Norton Healthcare’s vast patient and employee population. The 4.7 terabytes of data stolen included medical records, diagnoses, treatment histories, Social Security numbers, insurance information, and other personally identifiable information that criminals could use for identity theft, insurance fraud, or medical fraud. For context, major breaches involving hundreds of thousands of people have become relatively common in healthcare, but Norton Healthcare’s breach affected more than double that number, making it one of the largest healthcare data breaches in recent years.

The breach impacted not just patients who received care at Norton facilities but also employees of the hospital system. This dual exposure meant that workers faced the same risks as patients: their personal information was now in the hands of cybercriminals who could use it for fraudulent purposes. Families who had received treatment at Norton Healthcare—potentially years before the breach—discovered that intimate details about their medical conditions were compromised. A patient treated for cancer, mental health conditions, or other sensitive diagnoses suddenly had to consider the possibility that their private health information was being sold on dark web marketplaces or used to open fraudulent accounts in their names.

What Data Did the Norton Healthcare Breach Expose and Who Was Affected?

The ALPHV/BlackCat Ransomware Group and the Tactics Behind Hospital Breaches

The ALPHV/BlackCat ransomware gang operates one of the most sophisticated and profitable criminal enterprises targeting healthcare organizations. This group doesn’t simply encrypt files and demand ransom—they first steal data before encrypting systems, creating a double-extortion scheme where hospitals face pressure to pay either to recover operations or to prevent sensitive data from being publicly sold. The ALPHV group has been responsible for attacks against hundreds of healthcare organizations, hospitals, and medical providers worldwide, making them one of the most consequential cyber threats to american healthcare.

What makes the Norton Healthcare breach particularly revealing is how the hospital system’s security failed to prevent such a large-scale theft. Despite healthcare organizations being prime targets for ransomware attacks, and despite the HIPAA Security Rule requiring reasonable safeguards for protected health information, Norton Healthcare’s defenses were insufficient to stop determined attackers. The breach demonstrates that ransomware gangs don’t require cutting-edge hacking techniques to compromise hospitals—they exploit common security weaknesses like unpatched systems, weak passwords, poor access controls, and lack of network segmentation. A critical limitation of this settlement is that it does not require Norton Healthcare to implement any specific security improvements as a condition of resolving the case, meaning the hospital system faced no mandate to upgrade its cybersecurity infrastructure in exchange for settling the lawsuit.

Norton Healthcare Settlement Compensation by TypeCash Payment$42.5Medical Monitoring (Value)$1500Out-of-Pocket Reimbursement$1250Total Estimated Value$2792.5Source: Norton Healthcare Data Incident Settlement Administration

How Much Compensation Can Affected Individuals Receive From the Settlement?

The settlement provides three forms of compensation to eligible class members: direct cash payments, medical monitoring services, and reimbursement for documented losses. Cash payments range from a minimum of $5 to a maximum of $80 depending on the level of participation and documentation provided. While $5 to $80 may seem modest, it acknowledges that some individuals suffered minimal harm while others spent significant time addressing identity theft concerns, credit monitoring, or other consequences of the breach. More valuable than the cash payment is the three-year period of complimentary medical monitoring services.

This benefit helps individuals watch for the development of conditions that could result from identity theft or medical fraud related to their exposed health information. For those who suffered documented financial losses—such as money spent on credit monitoring services, costs associated with addressing fraudulent accounts, or expenses incurred responding to identity theft—the settlement offers reimbursement up to $2,500. A patient who spent $500 on credit freezes and monitoring services after discovering their information was breached could submit documentation of those expenses and recover some or all of that cost. However, individuals must actively submit claims to receive these benefits; simply being affected by the breach does not automatically result in compensation.

How Much Compensation Can Affected Individuals Receive From the Settlement?

The Claims Process and Deadlines You Cannot Miss

Individuals affected by the Norton Healthcare breach must submit claims by May 18, 2026, to participate in the settlement and receive compensation. Before that deadline, an objection and opt-out deadline of April 20, 2026, allows class members to formally contest the settlement or exclude themselves from it. The final fairness hearing scheduled for May 15, 2026, represents the court’s opportunity to ensure the settlement is fair and reasonable before funds are distributed. These dates are not flexible, and missing them means forfeiting the opportunity to claim compensation.

The settlement administration is handled through the official website nortondataincidentsettlement.com, where affected individuals can verify their eligibility, understand what documentation they need to provide, and submit their claims. For cash payments, claimants typically need to provide basic information proving they were part of the affected population. For out-of-pocket loss reimbursement, individuals must submit documentation such as credit monitoring bills, identity theft monitoring service receipts, or proof of money spent addressing fraudulent accounts. The complexity of the claims process means that some eligible individuals may miss deadlines or fail to provide adequate documentation, leaving compensation unclaimed. Settlement fund administrators often report that 30-40% of funds go unclaimed when claim rates are low, though funds from unclaimed payments may be distributed to cy pres recipients (charitable organizations serving affected populations) or reverted to the defendant.

Important Limitations of This Settlement That You Should Understand

One of the most significant limitations of the Norton Healthcare settlement is the absence of required security improvements. Unlike some healthcare data breach settlements that mandate implementation of specific cybersecurity practices, enhanced patient notification procedures, or third-party security audits, this settlement allows Norton Healthcare to continue operating with the same security posture that permitted the breach to occur in the first place. This means other patients seeking care at Norton Healthcare facilities going forward may face similar risks of data exposure because the hospital system has no contractual obligation to fix the underlying vulnerabilities.

Additionally, the settlement does not address punitive damages or hold any individual executives accountable for their role in the breach or the failure to prevent it. Healthcare executives, chief information security officers, and board members made decisions about cybersecurity budgets and staffing—decisions that directly contributed to the conditions allowing the breach. Yet the settlement treats the breach as a corporate liability issue rather than a governance failure, meaning the individuals responsible face no consequences. For affected individuals, this limitation means the settlement represents a purely financial resolution without any assurance that similar breaches will be prevented in the future.

Important Limitations of This Settlement That You Should Understand

Comparing the Norton Healthcare Settlement to Other Major Healthcare Data Breaches

The $11 million settlement for 2.5 million affected individuals works out to an average of approximately $4.40 per person, though individual payouts vary significantly based on claim documentation. By comparison, the Equifax data breach settlement in 2019 allocated $700 million for 147 million affected individuals, or roughly $4.76 per person on average. The UnitedHealth Change Healthcare ransomware attack in 2024, which affected tens of millions of patients, resulted in a $100 million settlement commitment.

Healthcare and data breach settlements typically compensate at lower per-person rates than other types of litigation because the affected populations are so large and many individuals suffer no immediate quantifiable harm. The Norton Healthcare settlement also differs from settlements in cases where hospitals faced criminal charges or significant regulatory penalties. In contrast, this settlement represents a civil class action resolution without parallel criminal prosecution or substantial federal regulatory fines. This approach is unfortunately common in healthcare breach cases, where financial settlements to affected individuals often exceed regulatory penalties imposed by agencies like the Department of Health and Human Services, creating a perverse incentive structure where hospitals might calculate that paying settlements is cheaper than investing in robust security.

What Happens Next and Lessons for Healthcare Data Security

The healthcare industry continues to face an accelerating threat from ransomware operators like ALPHV/BlackCat, who view hospitals as attractive targets because their operational continuity is literally a life-or-death matter—hospitals often pay ransoms quickly to restore services. The Norton Healthcare breach and settlement should serve as a warning to patients and families that their health information is at serious risk even in established, well-known healthcare systems.

The lesson extends beyond Norton: if a major regional health system with thousands of employees, substantial budgets, and established governance structures can experience such a massive data breach, virtually any healthcare organization may be vulnerable. Looking forward, affected individuals should monitor their medical records for signs of fraud or identity theft over the coming years, take advantage of the three-year medical monitoring benefit if offered, and submit claims before the May 18, 2026 deadline. For the healthcare industry more broadly, the settlement represents yet another expensive lesson that cybersecurity is not optional and that the cost of breaches—in settlements, regulatory fines, and reputational damage—far exceeds the cost of adequate security investments.

Conclusion

The Norton Healthcare $11 million settlement compensates approximately 2.5 million patients and employees affected by a May 2023 ransomware breach that exposed 4.7 terabytes of sensitive health information. Eligible individuals can receive cash payments of $5 to $80, three years of free medical monitoring, and reimbursement for documented losses up to $2,500, but they must submit claims by May 18, 2026, to participate. The objection and opt-out deadline of April 20, 2026, and the final fairness hearing on May 15, 2026, represent critical dates that affected individuals must track.

If you believe you were affected by the Norton Healthcare data breach, visit nortondataincidentsettlement.com to verify your eligibility and understand the documentation you need to submit. Even if your direct damages seem minimal, the free medical monitoring benefit can provide valuable peace of mind during the years following the breach. Do not wait until mid-May to submit your claim—reviewing deadlines now and gathering necessary documentation in advance ensures you don’t miss the opportunity to receive your settlement compensation.


You Might Also Like