Seton Healthcare Family, HealthLOGIX

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 10, 2012
geo: 
Austin , TX
United States
Texas US
Records Breached: 

555 (No SSNs or financial information reported)

A computer mailing error caused Seton member Medicaid health plan cards to be sent to incorrect addresses.  The cards were mailed by Seton's vendor HealthLOGIX on March 9. Seton became aware of the breach when members began calling about receiving the incorrect cards a week after the mistake.  Seton Health Plan members enrolled in the STAR/Medicaid plan were affected and may have had their names and dates of birth exposed.

Source: 
PHIPrivacy.net

City of Providence

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 21, 2012
geo: 
Providence , RI
United States
Rhode Island US
Records Breached: 

3,000

The city of Providence accidentally provided the Social Security numbers of almost 3,000 former employees when releasing information for a public records request.  GoLocalProv filed an Access to Public Records Act request in order to obtain information about pension recipients in Providence.  The city's legal team responded by emailing a .pdf file with retiree names, dates of retirement, dates for cost-of-living-adjustments, and monthly pension received each month.

Source: 
Media

Sacramento Area Fire Fighters Local 522

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 31, 2012
geo: 
Sacramento , CA
United States
California US
Records Breached: 

Unknown

On or around March 6, a spreadsheet containing the names and contact information of active and retired Local 522 members was sent by a Local 522 employee to the Sacramento Central Labor Council (CLC).  The spreadsheet contained member Social Security numbers, but was only supposed to provide member mailing addresses.  The email did not stop at CLC and was forwarded to Capitol Mailing, Inc.  The mistake was discovered on March 23 after Local 522 members received mailing labels that displayed their Social Security numbers.  

Source: 
California Attorney General

CVS Caremark

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 24, 2012
geo: 
Woonsocket , RI
United States
Rhode Island US
Records Breached: 

3,482 (No SSNs or financial information reported)

People who were members of Tufts Health Plan (Tufts Associated Health Maintenance Organization, Tufts Insurance Company) received letters meant for other members.  A programming error caused the addresses of members to be incorrect.  Names, medical conditions, and medications were exposed.

Source: 
PHIPrivacy.net

Wayne County

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 21, 2012
geo: 
Detroit , MI
United States
Michigan US
Records Breached: 

1,000

An employee of Wayne County's personnel department accidentally sent an email with a sensitive attachment.  People who were members of AFSCME Locals 25, 409, 1659, and 3309 received an email about health insurance with employee names, ID numbers, Social Security numbers, dates of birth, addresses, and other information available in an attached file.  The mistake was noticed immediately and a follow-up email was sent with instructions to destroy the previous email.

Source: 
Databreaches.net

Milk Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

An employee of another company discovered a security issue in Oink.  Oink is a "rate everything" application from mobile application developer Milk Inc.  The security issue allowed anyone to download personal information of another Oink user by entering another person's username.  Folders with associated email addresses, photos, and other user site information may have been exposed. Oink shutdown and the employees of Milk Inc. joined Google for a new project shortly after the issue was discovered.

Source: 
Databreaches.net

University of Tampa

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2012
geo: 
Tampa , FL
United States
Florida US
Records Breached: 

30,000

A server management error caused files containing sensitive information to be made publicly accessible between July of 2011 and the breach's discovery on March 13, 2012.  A classroom exercise revealed that the information was compromised and the University of Tampa's IT office was immediately informed of the discovery.  The University of Tampa then notified Google and asked that the cached file be removed from the search engine.

Source: 
Databreaches.net

Humboldt State University

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 14, 2012
geo: 
Arcata , CA
United States
California US
Records Breached: 

5,700

The personal information of students was accidentally sent in an email attachment as a response to a request for data.  The mistake was noticed immediately and all copies of the file were removed from the system of the party requesting data.  Student names, addresses, and Social Security numbers were exposed. Humboldt State University warned students to be vigilant about phishing, but stated that it is unlikely the data was misused.

Source: 
Databreaches.net

Brigham Young University (BYU)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 13, 2012
geo: 
Provo , UT
United States
Utah US
Records Breached: 

1,300 (No SSNs or financial information reported)

A staff member of the University Advisement Center at BYU accidentally included a complete list of international student names, email addresses, phone numbers, and student ID numbers in an email notification about a career workshop.  BYU immediately apologized for the error and noted that all of the student information except for student ID numbers could easily be found in the BYU directory.

Source: 
Databreaches.net

Medco Health Solutions, Inc.

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 22, 2012
geo: 
Willingboro , NJ
United States
New Jersey US
Extra Info: 

The location of the breach is listed as Medco's main office in New Jersey.

Records Breached: 

1,287 (No SSNs or financial information reported)

The unauthorized disclosure of paper records on November 30, 2011 may have resulted in the exposure of protected health information.  

Source: 
HHS via PHIPrivacy.net

Pages

Showing 41-50 of 842 results
Subscribe to DISC