Milk Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

An employee of another company discovered a security issue in Oink.  Oink is a "rate everything" application from mobile application developer Milk Inc.  The security issue allowed anyone to download personal information of another Oink user by entering another person's username.  Folders with associated email addresses, photos, and other user site information may have been exposed. Oink shutdown and the employees of Milk Inc. joined Google for a new project shortly after the issue was discovered.

Source: 
Databreaches.net

University of Tampa

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
Tampa , FL
United States
Florida US
Records Breached: 

30,000

A server management error caused files containing sensitive information to be made publicly accessible between July of 2011 and the breach's discovery on March 13, 2012.  A classroom exercise revealed that the information was compromised and the University of Tampa's IT office was immediately informed of the discovery.  The University of Tampa then notified Google and asked that the cached file be removed from the search engine.

Source: 
Databreaches.net

Humboldt State University

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 14, 2012
geo: 
Arcata , CA
United States
California US
Records Breached: 

5,700

The personal information of students was accidentally sent in an email attachment as a response to a request for data.  The mistake was noticed immediately and all copies of the file were removed from the system of the party requesting data.  Student names, addresses, and Social Security numbers were exposed. Humboldt State University warned students to be vigilant about phishing, but stated that it is unlikely the data was misused.

Source: 
Databreaches.net

Brigham Young University (BYU)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 13, 2012
geo: 
Provo , UT
United States
Utah US
Records Breached: 

1,300 (No SSNs or financial information reported)

A staff member of the University Advisement Center at BYU accidentally included a complete list of international student names, email addresses, phone numbers, and student ID numbers in an email notification about a career workshop.  BYU immediately apologized for the error and noted that all of the student information except for student ID numbers could easily be found in the BYU directory.

Source: 
Databreaches.net

Medco Health Solutions, Inc.

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2012
geo: 
Willingboro , NJ
United States
New Jersey US
Extra Info: 

The location of the breach is listed as Medco's main office in New Jersey.

Records Breached: 

1,287 (No SSNs or financial information reported)

The unauthorized disclosure of paper records on November 30, 2011 may have resulted in the exposure of protected health information.  

Source: 
HHS via PHIPrivacy.net

Department of Medical Assistance Services, Affiliated Computer Services (ACS), Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2012
geo: 
Richmond , VA
United States
Virginia US
Records Breached: 

1,444 (No SSNs or financial information reported)

The unauthorized disclosure of paper records may have resulted in the exposure of the protected health information of people associated with Department of Medical Assistance Services (DMAS). The incident related to DMAS's relationship with Affiliated Computer Services (ACS) and occurred sometime between November 2, 2011 and November 16, 2011. 

Source: 
HHS via PHIPrivacy.net

Delta Dental

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2012
geo: 
Sacramento , CA
United States
California US
Records Breached: 

11,646 (no SSNs or financial information reported)

The unauthorized disclosure of paper records sometime around December 22, 2011 may have resulted in the exposure of protected health information.  

Source: 
HHS via PHIPrivacy.net

IndyMac Bank, IndyMac Resources, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 19, 2012
geo: 
Dallas , TX
United States
Texas US
Records Breached: 

Unknown

A security company searching the web for sensitive data uncovered personally identifiable information from IndyMac Bank and Indy Mac Resources employees, and possibly others associated with the firms.  IndyMac Bank failed sometime around July of 2008.  The information is related to IndyMac employee pension benefits analysis and appears to have been placed on a public web server by an employee of a contractor for IndyMac.

Source: 
California Attorney General

Kaiser Foundation Health Plan

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 19, 2012
geo: 
Oakland , CA
United States
California US
Records Breached: 

30,000

Someone purchased a hard drive in September of 2011 and immediately notified law enforcement that it contained confidential information.  The external hard drive did not come from a Kaiser Permanente office.  It contained employee data that was as recent as 2009.  Current and former employees may have had their names, Social Security numbers, dates of birth, and addresses exposed. There is no evidence that the information from the hard drive was used for illegal purposes as of March of 2012.

Source: 
California Attorney General

New York State Electric & Gas (NYSEG), Rochester Gas and Electric (RG&E), Iberdrola USA

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
January 24, 2012
geo: 
Rochester , NY
United States
New York US
Extra Info: 

Affected customers may call 1-877-736-4495. More information can be found on the websites of the companies www.nyseg.com and www.rge.com.

Records Breached: 

878,000 NYSEG customers and 367,000 RG&E customers

An employee at a software development consulting firm that was contracted by Iberdrola USA, the parent company of both NYSEG and RG&E, allowed the information systems of clients to be accessed by an unauthorized party.  Customer Social Security numbers, birth dates, and in some cases, financial institution account numbers were exposed.  A total of 878,000 NYSEG customers and 367,000 RG&E electricity customers were affected.  An unknown number of additional customers from both companies who signed up for gas services, but not electricity services were also affected.

Source: 
Databreaches.net

Pages

Showing 41-50 of 833 results
Subscribe to DISC