Legislative Data Center

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 17, 2011
geo: 
Sacramento , CA
United States
California US
Records Breached: 

50 (No SSNs or financial information reported)

Over 50 employees of the California State Assembly were warned that their personal information may have been obtained by a hacker.  Some lawmakers were affected by the breach.  On Friday, officials learned that one of the servers had been breached.  It appears that the goal of the hacker or hackers was to overload the Capitol's Internet service.  People who participated in a flexible-benefits program were affected by the breach.  The type of data exposed was not reported.

Source: 
Databreaches.net

Bay Area Rapid Transit (BART)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 14, 2011
geo: 
San Francisco , CA
United States
California US
Records Breached: 

2,450 (No SSNs or financial information reported)

Anonymous has claimed responsibility for a hack of BART's user database.  A list with the first and last names, email addresses, passwords, phone numbers, full addresses and other personal information of MyBart.gov users was posted publicly.  MyBart.gov users should change their login information for other sites if they used the same login information for MyBart.gov.

Source: 
Databreaches.net

Department of Social and Health Services - Washington

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 10, 2011
geo: 
Seattle , WA
United States
Washington US
Records Breached: 

3,950 (No SSNs or financial information reported)

A coding error caused mailing mistakes to be made in July.  Medical enrollment forms with the addresses of custodial parents were sent to non-custodial parents.  However, no addresses were disclosed in cases involving foster care of domestic violence.

Source: 
Databreaches.net

City of Pittsburgh

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 1, 2011
geo: 
Pittsburgh , PA
United States
Pennsylvania US
Records Breached: 

29

Someone obtained employee names, addresses and possibly Social Security numbers.  Fraudulent accounts could be set up with this information.  Multiple city employees from different departments received bills from PayPal for purchases they did not make.  The fraudulent charges range from $40 to $3,000.  It is not clear how the thieves accessed Pittsburgh city employee information. Police officers and other Department of Public Safety employees are among those who were affected.

Source: 
Databreaches.net

Franklin County Children Services, Parenthesis Family Advocates

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 3, 2011
geo: 
Columbus , OH
United States
Ohio US
Records Breached: 

Unknown

A boxes of files were found by a recycling bin.  The files contained sensitive information from children with Franklin County Children Services.  Medical information, criminal records and other personal documents were left out in the open.  The papers have been linked to someone with access to Parenthesis' documents; however the cause of the breach is unknown.

Source: 
Databreaches.net

Department of Veterans Affairs

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 8, 2011
geo: 
Fayetteville , NC
United States
North Carolina US
Records Breached: 

Unknown

A dishonest VA worker used his tax return preparation business to submit fraudulent tax returns.  VA patient personal information such as names, Social Security numbers and birth dates were used to create fake dependents on people's tax returns.  The VA worker then collected fees from customers in exchange for fraudulently increasing the dollar amount of their tax returns. He was convicted in February and sentenced to 11 years in federal prison. The employee handled information from VA patients in North Carolina and Virginia.

Source: 
PHIPrivacy.net

University of Arizona

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 4, 2011
geo: 
Tucson , AZ
United States
Arizona US
Records Breached: 

Unknown

A hacker accessed the employee listserv on or around August 4.  This allowed an unauthorized party to send an offensive photo and additional lewd messages through the University's mailing list.  The listserv is normally only used by administrators to transmit official University business.  It is unclear if any information was exposed.

Source: 
Databreaches.net

Department of Veterans Affairs

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 3, 2011
geo: 
Washington , DC
United States
District Of Columbia US
Records Breached: 

Unknown

The inspector general at the VA found that IT contractors had accessed the VA's electronic health record system without appropriate security clearances.  An tipster had left a message about the situation on a departmental hotline in the summer of 2010.  Contractor personnel were found to be improperly sharing user accounts when accessing VA networks and the Veterans Health Information System and Technology Architecture systems. Employees of the contracting company were unaware of proper IT security protocol.

Source: 
PHIPrivacy.net

Passaic County Jail

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 6, 2010
geo: 
Paterson , NJ
United States
New Jersey US
Records Breached: 

Unknown

Inmates used the library logs at Passaic to obtain the personal information of other inmates. The inmates then called outside conspirators in order to defraud American Express and inmates of over $450,000.  Fake American Express credit cards were created from the information and used to deposit funds into Bank of America accounts or to make purchases. The scheme occurred between September of 2007 and April of 2008.

Source: 
Dataloss DB

Minnesota Department of Labor & Industry

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 19, 2010
geo: 
St. Paul , MN
United States
Minnesota US
Records Breached: 

759

It was discovered that an hourly employee of 19 years was forging checks by using the information of companies who were fined for OSHA violations.  The employee had handled checks for 12 years and may have been involved in a larger fraud operation.  The employee was arrested and fraudulently obtained less than a thousand dollars on average from each company.  A total of 759 companies who paid OSHA fines between January 1, 2009 and November 18, 2010 were affected.  One business owner discovered that a fraudulent check had been cashed for $745 after he paid an OSHA fine of $315.

Source: 
Dataloss DB

Pages

Showing 1-10 of 727 results
Subscribe to GOV