Chronology of Data Breaches
Security Breaches 2005 - Present

Posted Date: April 20, 2005
Updated Date: December 31, 2013

Is this your first visit to our Chronology of Data Breaches?

  • Read our FAQ about what we define as a breached record, how we calculate the "total" records breached, our data sources, state breach notice laws, studies and other resources

  • Learn how to use our Chronology and take advantage of its sophisticated search and sort features

  • Get our RSS Feed to see when we add new breaches to the list

What would you like to do?


Click or unclick the boxes then select go.


Select features, then click GO.



Help Guide

Can't find the sort feature you're looking for? Click here to download a CSV file of the data breach list as it exisits today.
Breach Total
864,188,052 RECORDS BREACHED
(Please see explanation about this total.)
from 4,252 DATA BREACHES made public since 2005

Save or Print PDF of Entire Breach List including introduction.Save or Print a PDF of Entire Breach List (including introductory FAQ)

Filter breach list before saving or printing PDF. Conduct a search of the Chronology using its sorting features, and Save or Print a PDF of your search results (Select filters)

If you do not have access to PDF, you can print the Chronology in landscape view.

Date Made Publicsort icon Name Entity Type
September 11, 2012 Carmichael Company
Vallejo, California
BSF PORT

Unknown

Those with questions may call 707-643-1745.

An electronic filing report was found during a raid.  The report contained tax return information such as Social Security numbers. 

 
Information Source:
California Attorney General
records from this breach used in our total: 0

September 11, 2012 Local 2/Hospitality Industry Child & Elder Care Plan
San Francisco, California
MED PORT

Unknown

A USB drive was determined to be lost on August 13, 2012. Information from the non-medical program within the SF Culinary, Bartetenders, and Service Employees Welfare Plan was on the flash drive.  People who participated in the Child and Elder Care Plan may ahve had their names, Social Security numbers, and addresses exposed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

September 11, 2012 Northwestern Mutual and One America - American United Life
Indianapolis, Indiana
BSF INSD

3,000

A former financial planner stole sensitive information from approximately 3,000 clients and used it to open new accounts, make purchases, receive cash advances, and reroute client mail until his arrest in August of 2011.  Client names, Social Security numbers, contact information, and financial account information were exposed. He was sentenced to two years in prison and three years of probation.  He will also have to pay $48,488.66 in restitution.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 3,000

September 7, 2012 Cumberland County Sheriff's Office
Portland, Maine
GOV DISC

180

Around 180 people who were arrested between August 27 and September 4 of 2012 had their Social Security numbers exposed by an administrative error. A new software update intended to automatically post regular arrest lists on the department's Facebook page and distribute them to media outlets also released Social Security numbers of those who were arrested. The error was discovered within 45 minutes, but between 70 and 50 individuals accessed the information during that time.

 
Information Source:
Databreaches.net
records from this breach used in our total: 180

September 7, 2012 University of Miami Health System
Miami, Florida
MED INSD

64,846

Two University of Miami Hospital employees were using patient registration sheets to inappropriately access patient information.  Anyone who was seen at University of Miami Hospital between October 2010 and July 2012 may have been affected.  Patient names, addresses, dates of birth, insurance policy numbers, and reasons for visits were exposed.  The last four digits of patients' Social Security numbers, were exposed in many cases and full Social Security numbers were exposed in some cases. The dishonest employees were terminated immediately and may have sold some of the information to unauthorized parties.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 64,846

September 6, 2012 Boston Water and Sewer Commission
Boston, Massachusetts
GOV PORT

Unknown

Those with questions may call (617)-989-7800.

A contractor working for Boston Water and Sewer Commission misplaced a hard drive.  The hard drive may have contained customer names, account numbers, meter numbers, phone numbers, addresses, and other information the utility organization recorded. Residents were also warned to be aware of possible calls from people pretending to be from the Commission.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

September 4, 2012 Twinspires.com (Churchill Downs Technology Initiatives Company)
Louisville, Kentucky
BSF HACK

Unknown

TwinSpires.com computer records were breached on August 3, 2012.  Customer names, cryptographically hashed Social Security numbers, dates of birth, and email addresses may have been exposed.  

 
Information Source:
California Attorney General
records from this breach used in our total: 0

September 4, 2012 CWI Railroad System Specialists
Barto, Pennsylvania
BSR HACK

Unknown

A hacker accessed the company's banking system and issued separate payments totalling $190,000 to banks in Virginia.  It is likely that the hacker placed malware in the system in order to make the withdrawal.  The malware has yet to be discovered and it is unclear how long ago the hacker first breached the system.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

September 4, 2012 Apple
Cupertino, California
BSR HACK

1,000,000 (No SSNs or financial information involved)

Hackers associating themselves with Anonymous claim to have obtained 12 million Apple Unique Device Identifiers (UDIDs) by hacking an FBI agent's laptop.  The hackers offered proof of the breach by posting over one million UDIDs. However, both Apple and the FBI are denying that an FBI agent would have access to that information and keep it on a laptop. The hack occurred in March. Apple replaced the types of identifiers the hackers appear to have obtained and will discontinue their use.

 
Information Source:
Media
records from this breach used in our total: 0

September 1, 2012 Temple Community Hospital
Los Angeles, California
MED STAT

600 (No SSNs or financial information reported)

Concerned patients may call 888-633-6122.

The July 3 office theft of a computer from the Radiology Department resulted in the exposure of patient information. The computer was used to store CT examination images taken between January 1, 2012 and July 2, 2012.  It contained pictures of CT scans performed, reasons for the scans, patient names, ordering doctors' names, and patient hospital account numbers.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

September 1, 2012 New Hampshire Department of Corrections
Concord, New Hampshire
GOV HACK

Unknown

A staff member found that a cable line hooked to the computers used by inmates had been connected to a line connecting to the entire Concord prison computer system.  This may have allowed one or more prisoners to view, steal, or change sensitive records. The network is used to track invoiced and billing for Correctional Industries contracts. Information from the offender management database system "Corrections Offender Records and Information System" may have been compromised as well.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 30, 2012 Harris County Hospital District
Houston, Texas
MED INSD

Unknown

The Harris County Hospital District was alerted to an issue when they received a grand jury subpoena on February 11, 2011.  A dishonest employee was immediately fired for viewing and possibly sharing patient names, Social Security and member numbers, medical record numbers, addresses, phone numbers, dates of birth, sexes, emergency contact information, payer information, and other medical care information. The Harris County Hospital District decided to send patients notifications on July 20, 2012 after receiving additional information about the breach. The former employee was indicted and will be tried on criminal charges related to the stolen and misused information on September 24, 2012.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 30, 2012 BMO Harris Bank
Milwaukee, Wisconsin
BSF PORT

Unknown

The laptop of an employee who works for a BMO Harris Bank vendor was stolen.  It contained customer names, addresses, and dates of birth. BMO learned of the breach on June 20.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 29, 2012 Chili's
Coral Springs, Florida
BSR INSD

Unknown

A dishonest employee was arrested for using a skimming device to steal customer credit card numbers at Chili's.  Investigators were able to link another fraudulent credit card crime to a credit card stored in the dishonest employee's skimmer.  This led to the discovery of a credit card making machine, a credit card skimmer, laptops, blank credit cards, and pages of names, Social Security numbers, and dates of birth at a separate residence.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 28, 2012 Cancer Care Group
Indianapolis, Indiana
MED PORT

55,000

An employee's computer bag was stolen on July 19.  The bag contained a computer server back-up that had patient and employee names, Social Security numbers, dates of birth, insurance information, medical record numbers, limited clinical information, and addresses.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 55,000

August 28, 2012 Wilkinson County Schools
Irwinton, Georgia
EDU HACK

Unknown

A student was able to access and distribute information from a classroom management system called PowerTeacher.  The student used user names and passwords to access grades, demographics, Social Security numbers, and other personal information.  Some parents reported receiving strange calls that disclosed personal information.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 28, 2012 Charter One, Dollar Bank, Fifth Third, First Merit, Key, PNC, Total Merchant Services
Cleveland, Ohio
BSF INSD

Unknown

Ten people consisting of assistant managers, sales representatives, and other employees of banks were arrested for participating in an identity theft ring.  Information was stolen and misused between November 2011 and February 2012.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 28, 2012 Arizona Oncology
Oro Valley, Arizona
MED INSD

15

A dishonest employee obtained and misused the personal information of patients during her employment.  She pleaded guilty to one count of aggravated identity and will be sentenced in October.  She faces between two and 8.75 years in prison for using the credit card information of cancer patients to make fraudulent purchases.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 15

August 28, 2012 Del Mar College (East Campus)
Corpus Christi, Texas
EDU PHYS

400

Documents dating from 1996 to 2007 were found in a recycling bin by a student.  Del Mar employee and student names, Social Security numbers, and mailing addresses were exposed. The student reported the discovery immediately and campus officials began an investigation.

 
Information Source:
Databreaches.net
records from this breach used in our total: 400

August 27, 2012 University of Rhode Island
Kingston, Rhode Island
EDU DISC

1,000

The University of Rhode Island released a notice on their website here: http://www.uri.edu/datanotice/

Students and faculty who were associated with the University of Rhode island after April of 2007 may have had their personal information exposed.  The information was placed on a server that was not set-up or intended to be used for storing sensitive information.  The information was on the College of Business Administration's computer server and included names, Social Security numbers, dates of birth, hire year, rank, and limited compensation information.  The information was discovered to be publicly accessible on July 31. It is unclear how long the information was available, but unauthorized access had occurred sometime while the information was exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 1,000

August 24, 2012 Main Street Pharmacy
Corona, California
MED INSD

15

A doctor was convicted of prescription drug fraud, identity theft, illegal possession of controlled substances, and burglary.  She was arrested in January 2009 following a yearlong narcotics investigation and subsequently pleaded guilty to 272 felony counts. The doctor had a drug addiction. She forged the signatures of several doctors and stole the identity of at least 15 patients in order to maintain her drug habit. She was sentenced to a year in jail, five years of probation, completion of a drug rehabilitation program, and completion of 1,000 hours of community service. The dishonest doctor's license was also permanently revoked.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 15

August 23, 2012 State Farm Insurance
Bloomington, Illinois
BSF INSD

Unknown

An employee was caught misusing customer information on July 28.  The dishonest employee had been improperly using customer names, Social Security numbers, addresses, dates of birth, and credit card numbers for at least two months. An unspecified number of customers had fraudulent online purchases made in their names.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 23, 2012 John Stewart Company (JSCo)
San Francisco, California
BSO DISC

Unknown

A set of internal emails were sent to various JSCo employees on August 7 and August 13.  The emails contained the names, Social Security numbers, and in some cases, dates of birth of other employees.  Employees were instructed to delete the email upon discovery.  

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 22, 2012 South Bend Community School Corporation
South Bend, Indiana
EDU DISC

Unknown

A computer glitch that occurred when the district changed its student management systems caused some employee Social Security numbers to be exposed.  The numbers could only be seen by other employees who were being trained on the new computer program.  Employees were notified of the breach.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 21, 2012 Bellacor.com, Inc.
Mendota Heights, Minnesota
BSR HACK

Unknown

A breach by an unauthorized party was discovered and contained on July 26.  The unauthorized party injected malicious code into the Bellacor website on June 7.  Temporary files including customer names, addresses, phone numbers, and encrypted credit card information may have been exposed.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 21, 2012 Colorado State University - Pueblo
Pueblo, Colorado
EDU DISC

19,000 (No SSNs or financial information reported)

A few students accidentally gained access to sensitive student files.  It is not clear if the files were physical or electronic.  The students notified school authorities immediately and the problem was fixed.  It is not clear what types of student information were exposed.  

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 20, 2012 U.S. District Court, Los Angeles California
Los Angeles, California
GOV INSD

Unknown

A Los Angeles federal court clerk was identified as the source of leaked confidential information.  The clerk was married to a convicted felon who then sold the information from sealed criminal case documents to an identity theft ring.  The federal court clerk, her husband, and at least 60 others from the theft ring were caught by an FBI investigation.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 17, 2012 University of Texas M.D. Anderson Cancer Center (M.D. Anderson)
Houston, Texas
MED PORT

2,200 (No SSNs or financial information reported)

An unencrypted flash drive was discovered missing.  It had last been seen on an employee shuttle bus on July 13.  It contained patient names, dates of birth, medical record number, diagnoses and treatment information, and research information.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 17, 2012 Wright-Patterson Medical Center
Dayton, Ohio
MED PHYS

3,800

A notebook containing names and Social Security numbers was misplaced after a blood drive.  It was left in a limited-use conference room late in the afternoon and recovered the next morning behind a chair.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 3,800

August 17, 2012 Discover Financial Services
Riverwoods, Illinois
BSF UNKN

Unknown

An unspecified number of Discover customers had their account numbers changed and were issued a new card.  It is unclear what type of security breach prompted the notification and when it may have occurred. Several customers in California received the notification letter; residents of other states may have been notified as well.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 16, 2012 Kindred Healthcare Inc. (Kindred Transitional Care and Rehabilitation)
Sellersburg, Indiana
MED PHYS

1,504

An office burglary sometime around June 4 resulted in the theft of a safe.  The safe held tapes used for backing up Kindred data related to past, present, and prospective patients.  Diagnosis information, Social Security numbers, clinical information, bank account and other financial information, addresses, dates of birth, insurance numbers, dates that services were received from Kindred, discharge locations, daily activities, collections letters, and medications received may have been exposed.  People admitted between 2009 and 2012 may have been exposed.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 1,504

August 16, 2012 Office of Dr. Jeffrey Paul Edelstein
Chandler, Arizona
MED STAT

4,800

Those with questions may call 1-877-615-3743.

Someone who had key access to a building containing a computer server stole the server on May 28.  Patient data including names, Social Security numbers, dates of birth, addresses, telephone numbers, account numbers, and diagnoses were on the server.  The server contained multiple layers of password protection.  

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 4,800

August 14, 2012 First Republic Bank
San Francisco, California
BSF PHYS

Unknown

Sensitive information that may have been in the form of paper records was improperly disposed of on August 2.  Client names, account types, account numbers, tax payer identification numbers, and Social Security numbers may have been exposed.  

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 14, 2012 Creative Croissants
San Jose, California
BSR UNKN

Unknown

A breach at Creative Croissants results in the exposure of customer credit card information.  It is unclear how the breach occurred and the date of the breach was March 2, 2012.

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 13, 2012 Apria
Phoenix, Arizona
MED PORT

65,700

An employee's laptop was stolen from a locked vehicle in June.  It contained billing information about Apria patients in California, Arizona, New Mexico, and Nevada.  Patient names, Social Security numbers, dates of birth, and other personal or health information may have been exposed.

UPDATE (09/29/2012): The laptop was stolen on June 14 and was password-protected.  Current and past patients were affected.

UPDATE (04/03/2013): Billing information for 65,700 patients was stored on the laptop.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 65,700

August 13, 2012 Employee Benefits, Atlanta Police, MARTA Police, Atlanta Fire Department
Atlanta, Georgia
GOV DISC

39

Two representatives of Employee Benefits attempted to gather sensitive information from employees of Atlanta Police, MARTA Police, and Atlanta fire department employees.  They visited several locations and offered upgraded insurance and benefits packages through AFLAC insurance.  Employee Benefits is a legitimate provider of insurance, but not of AFLAC insurance.  The representatives handed out business cards and their supervisor was called when a police lieutenant noticed that the representatives appeared to be frauds.  They were arrested and at least 39 information packets that contain sensitive information were recovered.  The two representatives face multiple counts of identity theft and racketeering.

 
Information Source:
Databreaches.net
records from this breach used in our total: 39

August 13, 2012 Office of Peggy Garland-Coleman
Spartanburg, South Carolina
BSF PHYS

Unknown

The owner of a tax preparation business that closed three years ago accidentally discarded several boxes of sensitive records.  The records had been picked over before tossed, but sensitive information still ended up in a public dumpster.  A concerned citizen found them in a recycling bin in an old supermarket lot.  Names, Social Security numbers, dates of birth, and invoices were exposed.

 
Information Source:
NAID
records from this breach used in our total: 0

August 9, 2012 CQ Roll Call, The Economist Group, Bloomberg
Washington, District Of Columbia
BSF DISC

Unknown

A group of former CQ employees were able to continue using log-ins and passwords to access sensitive information from The Economist Group after they left.  CQ Roll Call is owned by The Economist Group.  Many or all of the former CQ employees accessed the information while employed at Bloomberg.  Bloomberg has already paid an unspecified amount to The Economist Group as compensation for the unauthorized access incident or incidents.  It is not clear what type of information was exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 9, 2012 AmericInn
Medford, Wisconsin
MED INSD

Unknown

A dishonest employee faces six charges of fraudulently using a credit card and 59 counts of identity theft.  The former employee apparently used customer credit card numbers to pay tuition and insurance bills. 

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 9, 2012 BNSF Railway Company
Fort Worth, Texas
BSO UNKN

100

Around 100 BNSF Railway employees in North Dakota and adjacent states have reported fraudulent Paypal accounts and credit cards being opened in their names. it is unclear how long this issue has been occurring, what sensitive employee information may have been accessed, and how the information was accessed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 100

August 9, 2012 Blizzard Entertainment
Irvine, California
BSO HACK

Unknown

There is an official Battle.net FAQ page here: http://us.battle.net/support/en/article/important-security-update-faq

Blizzard's security team found an unauthorized party or parties had accessed the Blizzard internal network.  Blizzard immediately addressed the security issue and found no evidence that credit card, billing address, or name information had been accessed. Players using North American servers may have had scrambled versions of Battle.net passwords, answers to personal security questions, and information relating to Mobile and Dial-In Authenticators accessed.  Users are encouraged to change their passwords immediately and to change the passwords of other accounts if they are similar to the compromised Battle.net passwords.  A list of email addresses for global Battle.net users outside of China was also accessed.

UPDATE (11/12/2012): Two people have filed a suit alleging that Blizzard's $6.50 protection charge is inadequate and that Blizzard did not take the necessary measures required to secure the private information of customers that was stored online. The lawsuit also alleges that Blizzard continues to fail to disclose to consumers that additional security products must be acquired after buying games in order to ensure that information stored in online accounts is secured.

UPDATE (07/11/2013): The U.S. District Court for the Central District of California dismissed most of the claims that were brought against Blizzard Entertainment.

UPDATE (08/23/2013): At least six out of eight claims from the lawsuit against Blizzard have been dismissed.  Blizzard still faces litigation for failing to fully disclose the importance of an authenticator to users.

 
Information Source:
Dataloss DB
records from this breach used in our total: 0

August 8, 2012 Bear Valley Community Hospital
Big Bear Lake, California
MED INSD

102

An employee was fired after an investigation revealed that patient records were accessed without legitimate cause.  The breach was discovered during a routine audit.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 102

August 8, 2012 University of Arizona (UA)
Tucson, Arizona
EDU DISC

7,700

Those with questions may call UA's incident contact line at 520-621-4746

A UA student ran a Google search and found her private information posted publicly.  The data belonged to several thousand people who had submitted their names and tax ID numbers to UA in order to receive payments or reimbursements.  Vendors, consultants, guest speakers, and UA students had their names and tax ID numbers exposed in February and early March.  Some people had their Social Security numbers exposed in lieu of tax ID numbers. The sensitive data was embedded within a larger set of files being transferred to the UA new financial system.  The files were thought to only contain public information.

 
Information Source:
Databreaches.net
records from this breach used in our total: 7,700

August 7, 2012 Nordstrom Bank, Nordstrom fsb
Centennial, Colorado
BSF DISC

2,457

Those who wish to receive a new account number may call 1-800-749-9733.

A total of 2,457 Nordstrom fsb customers in California were affected by a mailing error caused by an administrative error.  Cardholder statements, replacement credit cards, or other correspondence were mistakenly sent to addresses other than those of intended cardholders. The issue was discovered on June 7 and was the result of an attempt to reformat addresses to U.S. Postal Service standards.  Those who were affected were notified in June and July.

 
Information Source:
California Attorney General
records from this breach used in our total: 2,457

August 7, 2012 California Correctional Health Care Services (CCHCS) Regional Administration
Fresno, California
MED PHYS

Unknown

A June 11 theft of materials inside of a kiosk mailbox located outside of the CCHCS Regional Administration building may have resulted in the exposure of sensitive information.  Documents that included prospective employment candidate responses to employment inquiries with personally identifiable information may have been in the mailbox.  California State Employment Application forms and applicable documents include names, Social Security numbers, driver's license numbers, residential addresses, dates of birth, telephone numbers, email addresses, employment histories, education histories, and other employment information of prospective candidates. 

 
Information Source:
California Attorney General
records from this breach used in our total: 0

August 6, 2012 Steamboat Ski and Resort Corp.
Steamboat Springs, Colorado
BSO DISC

Unknown

A former employee received W-2 information of current and former employees.  Names, Social Security numbers, addresses, payroll information, and other W-2 information were accidentally emailed to the former employee.  The former employee immediately notified the human resources department and confirmed that the information had not been mishandled.

 
Information Source:
Databreaches.net
records from this breach used in our total: 0

August 6, 2012 City of Ocoee
Ocoee, Florida
GOV DISC

350

Over 350 city workers had their information posted on a public server in January.  An employee inadvertently uploaded the sensitive information to a public domain server as part of an annual audit.  Names, Social Security numbers, salaries, and addresses were exposed.

 
Information Source:
Media
records from this breach used in our total: 350

August 3, 2012 Palm Beach County Health Department
Palm Beach, Florida
MED INSD

86

Those with questions may call 561-671-4014.

An employee was fired in May for creating and attempting to mail a list of names and Social Security numbers for purposes of identity fraud.  It is unclear if the dishonest employee disclosed the information of other people before being caught. Some patients had already experienced fraudulent activity. People who may have been a patient in one of the Health Department Health Centers could have been affected.  

UPDATE (01/09/2013): The employee worked as a records clerk and was arrested on January 5, 2013.  She had worked for Palm Beach County Health Department since 2006 and was charged with several counts of fraud.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 86

August 3, 2012 Stanford University Medical Center, Stanford Hospital and Clinics, Stanford School of Medicine
Stanford, California
MED STAT

2,500 (Unknown number of SSNs)

Those with questions may call 855-731-6016.

A burglary sometime around July 15 resulted in the theft of a computer from a Stanford faculty member's locked office.The computer contained patient information. No medical records or health histories were stored on the computer, but it may have held the Social security numbers of some patients.  The computer was outfitted with security software that would detect when and where the computer connected to the internet.

UPDATE (08/13/2012): The stolen computer was also password-protected. It may have contained medical record numbers, dates of service, and the names of providers and clinics relating to care provided at Stanford Hospital and Clinics or research conducted by the Stanford School of Medicine.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 0

August 3, 2012 Wolf & Yun
Elizabethtown, Kentucky
MED PORT

824 (No SSNs or financial information reported)

The April 24 office theft of a laptop resulted in the exposure of patient information.  The laptop contained names, dates of birth, and auditory testing data.  A public notice was posted on July 20.

 
Information Source:
HHS via PHIPrivacy.net
records from this breach used in our total: 0

Breach Total
864,188,052 RECORDS BREACHED
(Please see explanation about this total.)
from 4,252 DATA BREACHES made public since 2005
Showing 851-900 of 4252 results


X

Sign In!

Loading