Brightline Interactive, Army Chief of Public Affairs

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 28, 2012
geo: 
Alexandria , VA
United States
Virginia US
Records Breached: 

518 (31 SSNs reported)

An army awards database was found to be available online.  The database was being handled by the defense contractor Brightline Interactive and was mistakenly uploaded to a public server at an unknown time.  Those who received awards for actions since September 11, 2001 were affected.

Source: 
Databreaches.net

University of Chicago

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 28, 2012
geo: 
Chicago , IL
United States
Illinois US
Records Breached: 

9,100

A postcard mailed to University of Chicago employees contained their Social Security numbers. The cards were mailed on September 24 to remind employees about open enrollment, but also had Social Security numbers printed on the outside.

Source: 
Databreaches.net

Town Council of Chapel Hill

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
October 2, 2012
geo: 
Chapel Hill , NC
United States
North Carolina US
Records Breached: 

12

A licensed clinical social worked accidentally attached confidential client information to an email that was forwarded to town council colleagues. A copy of her and her husband's 2011 income tax returns was also in the email. The email automatically became available to the public and the error was noticed nearly a week later.  Unfortunately, the email was also forwarded a second time to a public account.  Consequently, the information was publicly available for a week.  

Source: 
PHIPrivacy.net

Rite Aid Corporation

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 27, 2012
geo: 
Camp Hill , PA
United States
Pennsylvania US
Records Breached: 

Unknown

A customer using RiteAid's mobile app to check a prescription noticed that he was able to access the names, addresses, and prescription records of other customers.  The customer was able to identify some of the problems by using his computer science background.  He noticed there was no secure login tied to web service calls made from the smartphone application.  The customer was able to correspond with several RiteAid representatives and RiteAid began to address some of the security concerns.

Source: 
PHIPrivacy.net

Northstar Healthcare

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
September 18, 2012
geo: 
Chicago , IL
United States
Illinois US
Records Breached: 

170 (No SSNs or financial information reported)

An email that was sent to patients displayed the names of all patients who received the email.  The email was sent to patients being treated for HIV or AIDS and inadvertently revealed names and HIV status.

Source: 
PHIPrivacy.net

City of Ocoee

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 6, 2012
geo: 
Ocoee , FL
United States
Florida US
Records Breached: 

350

Over 350 city workers had their information posted on a public server in January.  An employee inadvertently uploaded the sensitive information to a public domain server as part of an annual audit.  Names, Social Security numbers, salaries, and addresses were exposed.

Source: 
Media

University of Arizona (UA)

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
August 8, 2012
geo: 
Tucson , AZ
United States
Arizona US
Extra Info: 

Those with questions may call UA's incident contact line at 520-621-4746

Records Breached: 

7,700

A UA student ran a Google search and found her private information posted publicly.  The data belonged to several thousand people who had submitted their names and tax ID numbers to UA in order to receive payments or reimbursements.  Vendors, consultants, guest speakers, and UA students had their names and tax ID numbers exposed in February and early March.  Some people had their Social Security numbers exposed in lieu of tax ID numbers. The sensitive data was embedded within a larger set of files being transferred to the UA new financial system.

Source: 
Databreaches.net

CQ Roll Call, The Economist Group, Bloomberg

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 9, 2012
geo: 
Washington , DC
United States
District Of Columbia US
Records Breached: 

Unknown

A group of former CQ employees were able to continue using log-ins and passwords to access sensitive information from The Economist Group after they left.  CQ Roll Call is owned by The Economist Group.  Many or all of the former CQ employees accessed the information while employed at Bloomberg.  Bloomberg has already paid an unspecified amount to The Economist Group as compensation for the unauthorized access incident or incidents.  It is not clear what type of information was exposed.

Source: 
Databreaches.net

Nordstrom Bank, Nordstrom fsb

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
August 7, 2012
geo: 
Centennial , CO
United States
Colorado US
Extra Info: 

Those who wish to receive a new account number may call 1-800-749-9733.

Records Breached: 

2,457

A total of 2,457 Nordstrom fsb customers in California were affected by a mailing error caused by an administrative error.  Cardholder statements, replacement credit cards, or other correspondence were mistakenly sent to addresses other than those of intended cardholders. The issue was discovered on June 7 and was the result of an attempt to reformat addresses to U.S. Postal Service standards.  Those who were affected were notified in June and July.

Source: 
California Attorney General

Franklin's Budget Car Sales, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
Statesboro , GA
United States
Georgia US
Records Breached: 

95,000

The FTC fined Franklin's Budget Car Sales for compromising consumers' personal information by allowing peer-to-peer software to be installed on its network.  Any computers that were connected to the peer-to-peer network could have accessed Franklin's network of consumer names, Social Security numbers, addresses, dates of birth, and driver's license numbers.  The FTC claimed that Franklin's failed to assess risks to the consumer information it collected and stored online and failed to adopt policies to prevent or limit unauthorized disclosure of information.

Source: 
Databreaches.net

Pages

Showing 21-30 of 890 results
Subscribe to DISC