Nuvem Legal Notice: Protected Whistleblower Disclosure
Nuvem Legal Notice: Protected Whistleblower Disclosure
This noncommercial evidentiary archive is published under the whistleblower-immunity and anti-retaliation protections of:
No Nuvem trademarks, logos, or trade dress are used.
No commercial activity is conducted.
Under these statutes, the disclosure of cybersecurity risks, data-privacy concerns, and related compliance evidence is expressly immune from liability, non-commercial, and protected, even if an employer disagrees. Federal law also safeguards post-employment disclosures, including the publication of evidence necessary to explain or substantiate a protected report.
This archive presents sworn, timestamped documents showing that within five days:
Every document—emails, text messages, HHS filings, and console screenshots—appears exactly as submitted under federal whistleblower-immunity statutes. The documents speak for themselves.
This archive contains only primary-source materials, including:
There is no commentary, speculation, or opinion.
There are no trade secrets or non-public proprietary materials.
Every document reproduced here already exists in the legal and regulatory record.
This is a neutral evidentiary preservation site, not an adversarial presentation.
All materials appear exactly as originally transmitted, filed, or timestamped, with only minimal redactions applied for security (e.g., credential strings, remote-assist codes, personal contact information).
Timestamp and metadata consistency is preserved across:
Each exhibit is maintained under 28 U.S.C. §1746, ensuring authenticity and evidentiary integrity.
No document has been edited, rewritten, or reformatted for narrative effect.
The chronological alignment—spanning less than 72 hours from the first internal warning to the termination—forms the continuous evidentiary chain presented on this page.
This archive contains facts, not interpretations, arguments, or conclusions.
The documents speak for themselves.
This is my sworn account—supported entirely by the documents labeled Exhibits A–G—of what occurred in October 2023. I identified a security risk, filed a federal report, management acknowledged that report in writing, and I was terminated days later.
I was hired as a Cloud/Data Administrator to safeguard patient data and maintain production database systems.
The offshore vendor (Madeira) required a sysadmin “master-key” account—a level of access that exposes all patient data and is not necessary for monitoring. This type of access is widely recognized as a major cybersecurity and HIPAA risk.
Oct 17 — Warned leadership in writing that the tool required a sysadmin “master key.” (Ex. A)
Oct 19 (morning) — Told to proceed with provisioning the sysadmin key. Filed a HIPAA breach notice with HHS OCR to protect patients and the company. Management was notified. (Ex. B, Ex. C)
Oct 19 (afternoon) — VP requested the HHS confirmation “for our files,” proving same-day knowledge of the federal filing. (Ex. D)
Oct 19 evening → Oct 20 morning — Asked HR to archive my compliance objection. HR replied: “I will save this to your files.” (Ex. D)
Oct 20 — Nuvem’s IT administrator confirmed he shared the same concern about the sysadmin key. (Ex. E)
Oct 24 (morning of termination) — I was actively engaged with leadership on a security campaign—on time, professional, and working. (Ex. F) I was terminated shortly afterward.
The exhibits show a tight, 72-hour timeline that courts routinely identify as classic retaliation:
Courts repeatedly hold that the sequence protected disclosure → employer knowledge → adverse action is enough to establish a retaliation claim at the pleading and summary-judgment stages.
Based on the documentary record, the sequence of events raises compliance issues that regulators may find appropriate to review independently.
This page does not assert misconduct as a matter of law; it presents primary-source documents so regulators, auditors, and courts may evaluate the facts directly.
I did not grant a master-key login to any third party.
I proposed safe alternatives that avoided elevated access.
This page is purely evidentiary and educational, enabling proper authorities—if they choose—to review the all-original documents.
Robinson v. Shell Oil Co., 519 U.S. 337 (1997) — Retaliation protections extend to post-employment acts, including misuse of legal process, threats, and reputational harm.
Under 18 U.S.C. §1833(b):
“An individual shall not be held criminally or civilly liable
for disclosing information in a complaint or to a government agency.”
SOX §1514A and Dodd-Frank §78u-6(h) protect:
45 C.F.R. §160.316 prohibits employers from punishing any individual for filing a report with HHS regarding improper access or data-handling risk.
Security-sensitive items (e.g., credential strings, remote-assist codes) are redacted. All originals are preserved for lawful regulators and the Court.
This page is noncommercial and exists solely to maintain an accurate, document-backed record.
Oct 17 → Internal Warning
Oct 19 AM → HHS OCR Filing
Oct 19 PM → VP & HR Acknowledgment
Oct 20 → IT Corroboration
Oct 24 AM → Active Work / Termination
Early written warning to Nuvem management that Solar Winds required “master-key” access—equivalent to Server Admin or Active Directory Admin—to query system tables containing PII. Establishes that Rojas raised the sysadmin-risk issue before any dispute or regulatory filing.

Official record of the HIPAA breach report naming Nuvem Health LLC as Business Associate and identifying the “master key to our healthcare customers” risk. Demonstrates contemporaneous protected disclosure under federal law.
Email chain showing Rojas’s refusal to provision a sysadmin account and Squillante’s written rebuke: “It is not your place to submit breach information.” Proves both protected activity and management knowledge / disfavor.
Includes VP Luigi Squillante’s written request for the HHS.gov confirmation and HR’s
reply, “I will save this to your files.”
Confirms executive-level knowledge and recordation of the protected disclosure.

October 20 2023 texts confirm the sysadmin credential’s custody inside IT.
Rojas: “I’m the one that killed the Solar Winds provisioning yesterday.”
Ignatovich: “Lol that was my concern as well … We were on the same page for that.”
Corroborates that Rojas’s objection was compliance-aligned, not insubordinate.
Morning-of-termination correspondence with Nuvem’s VP of IT Security Michael Larke
and VP R&D Luigi Squillante, evidencing active, professional engagement moments
before discharge. Rebuts any “attendance” pretext.
Console image identifying Joel Ignatovich as the custodian of the sysadmin credential,
submitted under 28 U.S.C. § 1746. Provides technical confirmation of the custody chain
described in Exhibit E and directly rebuts later misstatements in the WIPO UDRP filing.
Unofficial Whistleblower Archive • Noncommercial • No Affiliation with Nuvem
Published pursuant to federal and state whistleblower-protection statutes:
18 U.S.C. §1833(b) (DTSA Whistleblower Immunity) ·
18 U.S.C. §1514A (Sarbanes–Oxley Anti-Retaliation) ·
15 U.S.C. §78u-6(h) (Dodd-Frank Anti-Retaliation) ·
45 C.F.R. §160.316 (HIPAA Anti-Retaliation) ·
N.Y. Lab. Law §740 (Retaliatory Discharge Prohibited).
All materials are publicly filed evidence in Rojas v. Nuvem Health LLC, No. 1:25-cv-04684 (SDNY),
reproduced under 28 U.S.C. §1746 solely for regulatory, judicial, and public-interest review.
No proprietary logos, stylized marks, or trade dress of Nuvem are displayed.
No advertising, commercial solicitations, or monetization of any kind.
This archive is legally protected speech.
Any attempt to suppress, conceal, or retaliate against this disclosure is prohibited by federal law.
Formal Whistleblower Disclosure filed under 18 U.S.C. § 1833(b). No classified, sealed, or proprietary materials are included.