Chronology of Data Breaches
Security Breaches 2005 - Present

Posted Date: April 20, 2005
Updated Date: December 31, 2013

Is this your first visit to our Chronology of Data Breaches?

  • Read our FAQ about what we define as a breached record, how we calculate the "total" records breached, our data sources, state breach notice laws, studies and other resources

  • Learn how to use our Chronology and take advantage of its sophisticated search and sort features

  • Get our RSS Feed to see when we add new breaches to the list

What would you like to do?


Click or unclick the boxes then select go.


Select features, then click GO.



Help Guide

Can't find the sort feature you're looking for? Click here to download a CSV file of the data breach list as it exisits today.
Breach Total
815,842,526 RECORDS BREACHED
(Please see explanation about this total.)
from 4,488 DATA BREACHES made public since 2005
Date Made Public Name Entity Type
September 5, 2009 Mitsubishi Corp.
New York, New York
BSR HACK

52,000

A Mitsubishi Corp. Internet shopping unit lost credit card details on 52,000 customers after its servers were hacked from overseas. The company has informed customers and relevant authorities of the leaks and has suspended the Web site until it can improve the system.

 
Information Source:
Dataloss DB
records from this breach used in our total: 52,000

October 15, 2010 University of North Florida
Jacksonville, Florida
EDU HACK

106,884 (52,853 SSNs reported)

A hacker from outside of the country may have accessed applicant information sometime between September 24 and September 29.  The information was mostly recruiting information and may have involved names, ACT and SAT scores, dates of birth and Social Security numbers.

 
Information Source:
Databreaches.net
records from this breach used in our total: 52,853

July 7, 2010 University of Hawai'i
Honolulu, Hawaii
EDU STAT

53,000

53,000 people may have had their personal information exposed after a breach to the University of Hawai'i computer system was discovered. The university released statement  that more than 40,000 Social Security numbers and 200 credit card numbers were part of the exposed information that was housed on a computer server used by the Mānoa campus parking office.

 
Information Source:
Dataloss DB
records from this breach used in our total: 53,000

May 16, 2008 Chester County School District
Downingtown, Pennsylvania
EDU HACK

55,000

A 15-year-old student gained access to files on a computer at Downingtown West High School. Private information, including names, addresses and Social Security numbers, of more than 50,000 people were accessed. The student apparently used a flash drive to save the personal data of about 40,000 taxpayers and 15,000 students.

 
Information Source:
Media
records from this breach used in our total: 55,000

July 7, 2008 Florida Agency for Health Care Administration
Tallahassee, Florida
GOV DISC

55,000

A computer flaw in the Organ and Tissue Donor Registry database may have exposed thousands of donors' personal information, including their Social Security numbers. Other data included donors' names, addresses, birth dates and drivers' license numbers.

 
Information Source:
Dataloss DB
records from this breach used in our total: 55,000

August 28, 2012 Cancer Care Group
Indianapolis, Indiana
MED PORT

55,000

An employee's computer bag was stolen on July 19.  The bag contained a computer server back-up that had patient and employee names, Social Security numbers, dates of birth, insurance information, medical record numbers, limited clinical information, and addresses.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 55,000

April 11, 2014 Veterans Of Foreign Wars Of The United States
Kansas City, Missouri
NGO HACK

55,000

The office of The Veterans Of Foreign Wars Of The United States notified members that an unauthorized party accessed VFW's webserver through the use of a trojan and malicious code. The hacker, thought to be in China, was able to download tables containing the names, addresses, Social Security numbers of approximately 55,000 VFW members.

The motivation of the hacker, according to IT experts, was to gain access to information regarding military plans or contracts and not for purposes of identity theft, although they have not ruled that out.

VFW is providing 12 months free of AllClearID. Members can call 1-855-398-6437 with any questions. A security code must be provided and was provided in the letter sent to those affected.

 
Information Source:
California Attorney General
records from this breach used in our total: 55,000

September 10, 2014 Bartell Hotels
San Diego, California
BSO HACK

55,000

Bartell Hotels, who operates several hotels in San Diego, has announced that they have suffered a data breach of customer credit card information.

The Best Western Plus Island Palms Hotel & Marina, The Dana on Mission Bay, Humphreys Half Moon Inn & Suites, Pacific Terrace Hotel and Days Hotel – Hotel Circle had names, credit card numbers and credit card expiration dates of customers who stayed at these hotels between February 16, 2014 and May 13, 2014 breached. 

The breach could have affected up to 55,000 individuals.

For those affected, they can contact a representative at  877-437-4010 Monday through Saturday 8 a.m. to 8 p.m. CT with questions or concerns.


More Information
: http://www.nbcsandiego.com/news/local/Data-Security-Breach-Reported-at-San-Diego-Hotels-274421341.html#ixzz3CvzjLpSG

 
Information Source:
Media
records from this breach used in our total: 55,000

March 31, 2008 Advance Auto Parts
Roanoke, Virginia
BSR HACK

56,000

The retailer reported that a network intrusion had exposed financial information and was the subject of a criminal investigation. Fourteen of the retailer's stores, including locations in Georgia, Ohio, Louisiana, Tennessee, Mississippi, Indiana, Virginia and New York, are believed to have been affected.

 
Information Source:
Dataloss DB
records from this breach used in our total: 56,000

October 28, 2010 Emergency Medical Services Bureau
Baton Rouge, Louisiana
GOV HACK

56,000

The Louisiana Department of Health and Hospitals notified emergency medical technicians that a hacker may have had access to their names, Social Security numbers and other personal information. The incident occurred on September 17 and a lack of funding for letters and postage caused a delay in notification.

 
Information Source:
Databreaches.net
records from this breach used in our total: 56,000

May 31, 2013 RentPath, Inc. (Primedia)
Norcross, Georgia
BSO INSD

56,000

An independent contractor with access to Primedia's network operations group was found to have stolen hardware.  The issue was discovered on June 20, 2012.  Applicants, employees, and former employees may have had several different types of personal information stolen. Approximately 56,000 Social Security numbers were discovered among the various types of information.  Approximately 30,000 former employees, employees, and applicants were identified and notified of the breach.  The other 26,000 have yet to be identified.

 
Information Source:
California Attorney General
records from this breach used in our total: 56,000

July 13, 2005 Arizona Biodyne
Phoenix, Arizona
MED PORT

57,000

Arizona Biodyne is an affiliate of Magellan Health Services and manages behavioral health for Blue Cross of Arizona.

A safe with computer backup tapes containing financial, personal and medical records was stolen from Arizona Biodyne.  Policyholders' addresses, phone numbers, dates of birth and Social Security numbers were among the personal information lost.  Partial treatment histories and doctor information for some patients was also lost.  

 
Information Source:
Dataloss DB
records from this breach used in our total: 57,000

June 19, 2008 Aon Consulting
Chicago, Illinois
BSF PORT

57,160

Verizon Inc. applicants were affected.

A laptop used to collect pre-employment screening information for Verizon Inc. employees was stolen from a restaurant in May of 2008.  The personal information included names and Social Security numbers.

 
Information Source:
Dataloss DB
records from this breach used in our total: 57,160

July 12, 2010 Connecticut Department of Education, State Teachers' Retirement Board
Hartford, Connecticut
GOV PORT

58,000

An encrypted flash drive containing 2007-2008 Connecticut Teachers' Retirement Board member annual statement data has been lost or stolen. It is unlikely that outside parties could read the pension and employment credit.

UPDATE (8/5/10): The total number of retirees exposed to ID theft is reported as 58,000.

 
Information Source:
Databreaches.net
records from this breach used in our total: 58,000

March 16, 2005 California State University, Chico
Chico, California
EDU HACK

59,000

A university housing and food service computer server containing names and Social Security numbers of faculty, staff, students, former students, and prospective students was hacked.

 
Information Source:
Dataloss DB
records from this breach used in our total: 59,000

March 7, 2009 Idaho National Laboratory
Idaho Falls, Idaho
GOV PORT

59,000

Idaho's Congressional Delegation this week announced a potential identity theft threat involving information from 59,000 present and former workers at the Idaho National Laboratory at Idaho Falls. DOE notified delegation members that an encoded disc containing personal data from the employees was either lost or stolen in transit via United Parcel Service. The package, originally shipped from New York to Maryland, was found damaged.

 
Information Source:
Dataloss DB
records from this breach used in our total: 59,000

November 26, 2008 Luxottica Group, Things Remembered
Mason, Ohio
BSR HACK

59,419

A routine check by the information technology department discovered that a hacker had been inside a computer mainframe and downloaded the personal information of former workers. The victims lost names, addresses and Social Security numbers to the hacker.

 
Information Source:
Dataloss DB
records from this breach used in our total: 59,419

April 4, 2008 Harley-Davidson, Inc. (HOG)
Milwaukee, Wisconsin
BSO PORT

60,000

A laptop computer containing certain HOG members' personal information was determined to be missing from their facilities. The personal information stored on the computer included names, addresses, credit card numbers, their expiration dates, and driver's license numbers.

 
Information Source:
Media
records from this breach used in our total: 60,000

December 10, 2010 University of Wisconsin - Madison
Madison, Wisconsin
EDU HACK

60,000

Some records of people affiliated with UW Madison were hacked into. The University discovered the breach on October 26 and sent notification to many former students, faculty and staff on November 30. One of the files had the photo ID of former students with their Social Security numbers embedded in the ID numbers and cardholder names. Only students enrolled prior to 2008 would have had their Social Security numbers exposed. It is unclear how far back the records date.

 
Information Source:
Databreaches.net
records from this breach used in our total: 60,000

November 3, 2006 Starbucks Corp.
Seattle, Washington
BSR PORT

60,080

1-800-453-1048

Starbucks lost track of four laptop computers. Two held employee names, addresses, and Social Security numbers. Current and former U.S. employees and about 80 Canadian workers and contractors were affected.

 
Information Source:
Dataloss DB
records from this breach used in our total: 60,080

July 5, 2006 Bisys Group Inc.
Roseland, New Jersey
BSF PORT

61,000

Personal details about 61,000 hedge fund investors were lost when an employee's truck carrying backup tapes was stolen. The data included SSNs of 35,000 individuals. The tapes were being moved from one Bisys facility to another on June 8 when the theft occurred.

 
Information Source:
Dataloss DB
records from this breach used in our total: 61,000

August 9, 2005 Sonoma State University
Rohnert Park, California
EDU HACK

61,709

Hackers broke into a computer system and may have accessed the names and Social Security numbers of people who applied, attended, or worked at the University between 1995 and 2002.  University officials attempted to notify those who were affected.

 
Information Source:
Dataloss DB
records from this breach used in our total: 61,709

December 14, 2006 Electronic Registry Systems
Atlanta, Georgia
MED PORT

63,000

Additional locations: Danville, Pennsylvania, Nashville, TN

On Nov. 23, 2006, two computers (one desktop, one laptop) were stolen from Electronic Registry Systems, a business contractor in suburban Springdale, OH, that provides cancer patient registry data processing services. It contained the personal information (name, date of birth, Social Security number, address, medical record number, medical data and treatment information) of cancer patients from hospitals in Pennsylvania, Tennessee, Ohio and Georgia, dating back to 1977 at some hospitals. Hospitals include Emory Hospital, Emory Crawford Long Hospital, Grady Memorial Hospital, as well as Geisinger Health System (PA) and Williamson Medical Center (TN).

UPDATE(1/14/07): The number of affected patients was increased from 25,000 to over 63,000.

 
Information Source:
Dataloss DB
records from this breach used in our total: 63,000

March 12, 2009 Dezonia Group
Chicago, Illinois
BSO PORT

63,000

The city of Chicago bills people for ambulance rides -- $600 and up. It uses a third party, Dezonia Group, for billing. An employee's laptop, containing patient names, addresses and Social Security numbers, was stolen from the company. Reports differ as to whether or not the data was encrypted.

 
Information Source:
Dataloss DB
records from this breach used in our total: 63,000

February 23, 2007 ADC Telecommunications Inc., Flex Compensation
St. Louis Park, Minnesota
BSR PORT

63,400

A laptop was stolen from ADC's benefits administrator. Current and former employee names, Social Security numbers, bank account numbers, dates of birth, addresses and other private information were on the laptop.  It is not clear if employees from other companies that use Flex Compensation for benefits administration are among the 63,400 affected individuals.

 
Information Source:
Dataloss DB
records from this breach used in our total: 63,400

October 13, 2011 Neurological Institute of Savannah and Center for Spine (NIOS)
Savannah, Georgia
MED PORT

63,425

Patients with questions may call 1 (888) 613-3688.

The July 2 car theft of a computer hard drive may have exposed patient information.  Patients who visited NIOS between January 1, 2006 and July 2, 2011 could have had their names, Social Security numbers, addresses, dates of birth, telephone numbers, and billing account data obtained. 

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 63,425

April 14, 2011 Social Security Administration (SSA)
Baltimore, Maryland
GOV DISC

63,587

The Social Security numbers of living people were made available on the Social Security Administration's Death Master File.  This happened twice.  Between July of 2006 and January 0f 2009 26,930 people had their Social Security numbers and other identifying information exposed. A warning from the SSA's Office of the Inspector General about privacy risks associated with the report was not enough to prevent the second incident. Between May 2007 and April of 2010 36,657 people had their full names, Social Security numbers, dates of birth, and last known ZIP code exposed.

 
Information Source:
Databreaches.net
records from this breach used in our total: 63,587

March 24, 2006 California State Employment Development Division
Sacramento, California
GOV DISC

64,000

A computer glitch sent state Employment Development Division 1099 tax forms containing Social Security numbers and income information to the wrong addresses, potentially exposing those taxpayers to identity theft.

 
Information Source:
Dataloss DB
records from this breach used in our total: 64,000

September 15, 2006 University of Texas San Antonio
San Antonio, Texas
EDU HACK

64,000

A hacker may have gained access to student and staff names, addresses and Social Security numbers.  Students who received financial aid or worked at the University were affected.  The breach was discovered during a routine risk assessment of the University's computer servers.

 
Information Source:
Dataloss DB
records from this breach used in our total: 64,000

September 7, 2012 University of Miami Health System
Miami, Florida
MED INSD

64,846

Two University of Miami Hospital employees were using patient registration sheets to inappropriately access patient information.  Anyone who was seen at University of Miami Hospital between October 2010 and July 2012 may have been affected.  Patient names, addresses, dates of birth, insurance policy numbers, and reasons for visits were exposed.  The last four digits of patients' Social Security numbers, were exposed in many cases and full Social Security numbers were exposed in some cases. The dishonest employees were terminated immediately and may have sold some of the information to unauthorized parties.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 64,846

June 1, 2006 YMCA of Greater Providence
Providence, Rhode Island
NGO PORT

65,000

A laptop computer containing personal information of members was stolen. The information included credit card and debit card numbers, checking account information, Social Security numbers, the names and addresses of children in daycare programs and medical information about the children, such as allergies and the medicine they take, though the type of stolen information about each person varies.  Those affected were notified.

 
Information Source:
Dataloss DB
records from this breach used in our total: 65,000

February 9, 2007 East Carolina University
Greenville, North Carolina
EDU DISC

65,000 students, alumni, and staff members

http://www.ecu.edu/incident/, 877-328-6660

A programming error resulted in personal information of 65,000 individuals being exposed on the University's Web site. The data has since been removed. Included were names, addresses, SSNs, and in some cases credit card numbers.

 
Information Source:
Dataloss DB
records from this breach used in our total: 65,000

June 27, 2007 Milwaukee PC
Milwaukee, Wisconsin
BSR DISC

65,000

(414) 258-2275

Credit card information for 65,000 was possibly compromised. A service center noticed a file in their server and was concerned that file could contain customers' credit card numbers and personal information.

 
Information Source:
Dataloss DB
records from this breach used in our total: 65,000

May 28, 2009 Aetna
Hartford, Connecticut
MED HACK

65,000

Aetna has contacted 65,000 current and former employees whose Social Security numbers may have been compromised in a Web site data breach. The breach was a spam campaign showing that the intruders successfully harvested e-mail addresses from the Web site, although it's not clear if SSNs were also obtained. The spam purported to be a response to a job inquiry and requested more personal information. Aetna sent letters last week notifying the 65,000 people whose SSNs were on the site of the breach.

UPDATE (6/11/09): Hartford health insurer Aetna Inc. is being sued. The class-action suit was filed in a Pennsylvania District Court and demands credit monitoring, punitive damages, costs and other relief for current, former and potential employees.

 
Information Source:
Dataloss DB
records from this breach used in our total: 65,000

August 13, 2012 Apria
Phoenix, Arizona
MED PORT

65,700

An employee's laptop was stolen from a locked vehicle in June.  It contained billing information about Apria patients in California, Arizona, New Mexico, and Nevada.  Patient names, Social Security numbers, dates of birth, and other personal or health information may have been exposed.

UPDATE (09/29/2012): The laptop was stolen on June 14 and was password-protected.  Current and past patients were affected.

UPDATE (04/03/2013): Billing information for 65,700 patients was stored on the laptop.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 65,700

March 27, 2012 Howard University Hospital
Washington, District Of Columbia
MED PORT

66,601

The January 27 theft of a laptop from a former contractor's vehicle resulted in the loss of patient information.  The patient files included Social Security numbers, names, addresses, identification numbers, medical record numbers, dates of birth, admission dates, diagnosis-related information, and discharge dates. The majority of those affected were patients who were treated at the Hospital between December 2010 and October 2011.  Some patients who received treatment as far back as 2007 were also affected. The patient files had been downloaded onto the contractor's personal laptop in violation of the Hospital's policy. The contractor stopped working for the hospital in December of 2011.

UPDATE (09/21/2012): The number of patients who were notified was revised from 34,503 to 66,601.

 
Information Source:
Databreaches.net
records from this breach used in our total: 66,601

September 12, 2007 TennCare, Americhoice Inc.
Knoxville,
MED PORT

67,000

  To sign up for the free ID theft protection you must call AmeriChoice at (800) 690-1606.

There are 67,000 TennCare enrollees at risk of identity theft after a courier service lost their personal information. The lost information includes names, Social Security Numbers, birthdays and addresses.

 
Information Source:
Dataloss DB
records from this breach used in our total: 67,000

October 26, 2009 CalOptima
Orange County, California
MED PORT

68,000

Personally identifiable information on members of CalOptima, a Medicaid managed care plan, may have been compromised after several CDs containing the information went missing. The unencrypted data on the CDs includes member names, home addresses, dates of birth, medical procedure codes, diagnosis codes and member ID numbers, and an unspecified number of Social Security numbers. The discs had been put in a box and sent via certified mail to CalOptima by one of its claims-scanning vendors, according to a statement by the health plan. CalOptima received the external packaging material minus the box of discs.

 
Information Source:
Dataloss DB
records from this breach used in our total: 68,000

December 25, 2011 Stratfor.com, Strategic Forecasting Inc.
Austin, Texas
BSO HACK

68,063

Anonymous/#AntiSec has claimed responsibility for the hack of a global intelligence company named Stratfor.  Hackers were able to obtain tens of thousands of credit card numbers and other personal information from Stratfor.com.  In addition to credit card numbers with security codes, addresses, and names, the hackers obtained 200GB of emails.  The hackers also claim to have used the credit card information to make over $1 million in donations to charities. Hackers later revealed that the information was even easier to use since it had not been encrypted. Stratfor took the website down within an hour after it was hacked and defaced, but sensitive information had already been leaked.

UPDATE (1/04/2012): A total of 68,063 unique credit card numbers, 859,311 unique email addresses, 860,160 hashed passwords, 50,569 phone numbers and 50,618 U.S. resident addresses were posted.  Of the 68,063 credit card numbers, about 36,000 were not expired.  

UPDATE (2/15/2012): Hackers posing as officials from Stratfor have started emailing infected links to government subscribers whose email addresses were stolen during the breach.

UPDATE (2/27/2012): Wikileaks published more than five million emails that were obtained by hackers during the breach. Some of these emails could contain sensitive information that would unmask sources, reveal security information that the intelligence-gathering company had collected, and reveal information about many Fortune 500 companies that subscribe to Stratfor.

UPDATE (5/03/2012): Four Irish and British men were charged for their involvement with Anonymous's faction Antisec and the Stratfor breach. These men were also charged with involvement in hacks of Fox, Sony Pictures, and the Arizona Department of Public Safety.

UPDATE (7/02/2012): Stratfor agreed to settle a class action lawsuit filed on behalf of customers.  Stratfor will offer members of the class action lawsuit one month of free access to its service, worth $29.08, and an electronic book published by Stratfo called "The Blue Book," priced at $12.99.  These two offers may cost Stratfor $1.75 million.  Additionally, Stratfor agreed to pay for a credit monitoring service for any members of the class action lawsuit who request the service.  Stratfor will also pay a $400,000 lump sum for plaintiff attorneys and various fees.

UPDATE (08/11/2012): Emails with data about the implementation of the domestic surveillance program TrapWire were also exposed. TrapWire gathers surveillance data from major cities in the US, encrypts it, and sends it to a secretive central database center.

UPDATE (05/28/2013): A member of Anonymous pleaded guilty to playing a part in hacking Stratfor Global Intelligence Service, Arizona Department of Public Safety, the Boston Police Patrolmen's Association, the FBI's Virtual Academy, and the sheriff's office of Jefferson County, Alabama.  His charges are related to stealing emails and credit card data as well as hacking Stratfor and several other websites.  He faces up to 10 years in prison and is scheduled to be sentenced on September 6.

UPDATE (11/15/2013): The member of Anonymous was sentenced to 10 years in prison and three years of probation.

 
Information Source:
Databreaches.net
records from this breach used in our total: 68,063

September 9, 2007 McKesson Specialty, AstraZeneca
Scottsdale, Arizona
MED STAT

68,779

 (866) 554-6366

McKesson Health-care services company, is alerting thousands of its patients that their personal information is at risk after two of its computers were stolen from an office.

 
Information Source:
Dataloss DB
records from this breach used in our total: 68,779

December 12, 2008 DJO, Empi Recovery Services
St. Paul, Minnesota
MED PORT

68,857

A laptop was stolen from an employee's car in Minneapolis.  The laptop contained the names, addresses, account balances, insurance company, and Social Security numbers of patients.

 
Information Source:
PHIPrivacy.net
records from this breach used in our total: 68,857

December 22, 2005 Ford Motor Co.
Dearborn, Michigan
BSO STAT

70,000

A computer containing names and Social Security numbers of current and former employees was stolen.  Ford alerted those who were affected and offered to pay for their credit monitoring services.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

May 11, 2006 Ohio University Hudson Health Center
Athens, Ohio
MED HACK

70,000

http://www.ohio.edu/datasecurity

Names, birth dates, Social Security numbers and medical information were accessed in records of students dating back to 2001, plus faculty, workers and regional campus students.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

January 11, 2007 University of Idaho
Moscow, Idaho
EDU STAT

70,000

(866) 351-1860

Over Thanksgiving weekend, 3 desktop computers were stolen from the Advancement Services office containing personal information of alumni, donors, employees, and students. 331,000 individuals may have been exposed, with as many as 70,000 records containing SSNs, names and addresses.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

July 28, 2007 Yuba County Health and Human Services
Yuba County, California
MED PORT

70,000

A laptop stolen from a building contained personally identifiable information of individuals whose cases were opened before May 2001. The laptop was being used as a backup system for the county's computer system. The data include Social Security numbers, birth dates, driver's license numbers and other private information.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

March 28, 2008 Antioch University
Yellow Springs, Ohio
EDU HACK

70,000

A computer system that contained personal information on about 70,000 people was breached by an unauthorized intruder three times. The system contained the names, Social Security numbers, academic records and payroll documents for current and former students, applicants and employees.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

May 14, 2008 Oklahoma State University
Stillwater, Oklahoma
EDU HACK

70,000

A breach in an Oklahoma State University computer server exposed names, addresses and Social Security numbers of students, staff and faculty who bought parking and transit services permits in the past six years.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

January 29, 2007 Vermont Agency of Human Services
Waterbury, Vermont
GOV HACK

70,000

Customers of New England Federal Credit Union, Central Vermont Public Service Employees Credit Union, First Brandon National Bank, Federal Family Credit Union, Granite Hills Credit Union, Merchants Bank, Northfield Savings Bank, Opportunities Credit Union and the Vermont State Employees Credit Union were affected.

A state computer that contained the names, Social Security numbers and bank account information was hacked into. Some of the information came from noncustodial parents who owed back child support while most of the people affected were customers of New England Federal Credit Union with no history of owing child support. The information is from 2004 and 2005 credit union members.

 
Information Source:
Dataloss DB
records from this breach used in our total: 70,000

April 8, 2011 Family Planning Council
Philadelphia, Pennsylvania
MED INSD

70,000

The list of affected people includes patients who visited any of these various locations: The Children's Hospital of Philadelphia between May 1, 2010 and September 30, 2010, any of the Public Health Management Corporation facilities which include PHMC Care Clinic, PHMC Health Connection, Rising Sun Health Center, Mary Howard Health Center, Community Court, Project Salud and several emergency housing location in Philadelphia between July 16, 2009 and October 29, 2010, Spectrum Health Services, Inc. which operates Haddington Health Center and the Broad Street Health Center between October 31, 2009 and November 30, 2010, Planned Parenthood Southeastern Pennsylvania between July 1, 2009 and October 30, 2010, and Planned Parenthood Association of Bucks County between July 1, 2009 and October 31. Those who may have been affected should call 1-888-414-8020 and enter reference number 3720040811 between 8:00 am-5:00 pm Eastern Time.

A flashdrive was discovered missing from an office on December 28, 2010. It and other items that did not contain patient personal information are presumed to have been stolen by a former employee who left at the end of December. The former employee has an extensive criminal background and was arrested on February 9. Authorities involved in the criminal investigation requested that notification of the breach be delayed due to the investigation. The flash drive contained the personal and medical records of about 70,000 patients. Patient names, Social Security numbers, addresses, phone numbers, dates of birth and other information, including insurance information and medical information was exposed. As a result of the breach, The Family Planning Council will no longer allow unencrypted information to be stored on removable hardware.

 
Information Source:
Databreaches.net
records from this breach used in our total: 70,000

August 9, 2013 Northrop Grunman
Suwanee, Georgia
BSO HACK

70,000

People who were linguists or applied to be linguists within Northrop Grunman Technical Services, inc. Balkans Linguist Support Program may have had their personal information exposed. A database that contained names, Social Security numbers, dates of birth, blood types, contact information, and additionaly types of government-issued identification numbers was accessed by unauthorized parties.  The breach occured sometime between November 2012 and May 2013 and was discovered on July 26.

UPDATE (08/15/2013): Over 70,000 people, including thousands of linguists, were affected.

 
Information Source:
Media
records from this breach used in our total: 70,000

Showing 4151-4200 of 4488 results


X

Sign In!

Loading