General Communication Inc. (GCI)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
May 24, 2012
geo: 
Anchorage , AK
United States
Alaska US
Records Breached: 

400

A former customer service representative gathered account information directly from two customers during telephone calls and later attempted to use the information for personal purchases.  GCI decided to notify all other customers who may have been contacted by the dishonest former employee and warn them to check their accounts for any unusual activity.  

Source: 
Databreaches.net

Palm Beach County Health Department

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
August 3, 2012
geo: 
Palm Beach , FL
United States
Florida US
Extra Info: 

Those with questions may call 561-671-4014.

Records Breached: 

86

An employee was fired in May for creating and attempting to mail a list of names and Social Security numbers for purposes of identity fraud.  It is unclear if the dishonest employee disclosed the information of other people before being caught. Some patients had already experienced fraudulent activity. People who may have been a patient in one of the Health Department Health Centers could have been affected.  

Source: 
PHIPrivacy.net

Memorial Healthcare System (MHS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 3, 2012
Records Breached: 

102,153

MHS discovered a second breach during the process of investigating a dishonest employee's misuse of patient data in January of 2012.  Employees of affiliated physicians' offices may have improperly accessed patient information through a web portal used by physicians who provide care and treatment at MHS.  Patient names, Social security numbers, and dates of birth may have been accessed during the period between January 1, 2011 and July 5, 2012.  

Source: 
HHS via PHIPrivacy.net

Bear Valley Community Hospital

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 8, 2012
geo: 
Big Bear Lake , CA
United States
California US
Records Breached: 

102

An employee was fired after an investigation revealed that patient records were accessed without legitimate cause.  The breach was discovered during a routine audit.

Source: 
PHIPrivacy.net

AmericInn

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 9, 2012
geo: 
Medford , WI
United States
Wisconsin US
Records Breached: 

Unknown

A dishonest employee faces six charges of fraudulently using a credit card and 59 counts of identity theft.  The former employee apparently used customer credit card numbers to pay tuition and insurance bills. 

Source: 
Databreaches.net

Grant Income Tax Bookkeeping and Check Cash

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 29, 2012
geo: 
Macon , GA
United States
Georgia US
Records Breached: 

10

The dishonest owner of the tax preparation business used names and Social security numbers to file fraudulent tax returns for at least 10 people between 2007 and 2009.  He is accused of using nearly $8,000 in fraudulent tax refunds for his own purposes.  He was indicted on 23 counts of making false claims for tax refunds, four counts of theft of government money, and four counts of aggravated identity theft on March 15, 2012.

Source: 
Dataloss DB

General Motors Co.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 3, 2012
geo: 
Detroit , MI
United States
Michigan US
Records Breached: 

883

It was determined that an employee who retired in May copied two electronic spreadsheets with names and Social Security numbers of active and retired GM workers.  The file was found on the former employee's computer.  It is unclear if the information was misused or if the former employee acted with malicious intent.

Source: 
Dataloss DB

U.S. District Court, Los Angeles California

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 20, 2012
geo: 
Los Angeles , CA
United States
California US
Records Breached: 

Unknown

A Los Angeles federal court clerk was identified as the source of leaked confidential information.  The clerk was married to a convicted felon who then sold the information from sealed criminal case documents to an identity theft ring.  The federal court clerk, her husband, and at least 60 others from the theft ring were caught by an FBI investigation.

Source: 
Databreaches.net

Kelly Services

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 9, 2012
geo: 
Troy , MI
United States
Michigan US
Records Breached: 

Unknown

People who signed up for employment through the Kelly Services staffing agency may have had their personal information retained by a former Kelly Services employee.  Kelly Services retrieved all of the sensitive information from the former employee upon learning of the breach.  Names and Social Security numbers may have been exposed.  

Source: 
Dataloss DB

Suddenlink Communications, AAT Communications

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 23, 2012
geo: 
Overland Park , KS
United States
Kansas US
Records Breached: 

Unknown

On February 24, 2012, law enforcement notified Suddenlink management of an incident involving a former employee.  The employee had obtained the personal information of individuals who worked at Suddenlink and AAT Communications between May 22, 2006 and July 21, 2006.  Names, Social Security numbers, addresses, dates of birth, wage information, and banking information may have been exposed.  The former employee was using the information for fraudulent purposes and an investigation uncovered isolated instances of information misuse between 2006 and 2012.  The former employee was arrested.

Source: 
Dataloss DB

Pages

Showing 1-10 of 560 results
Subscribe to INSD