DocuSign, Inc.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 9, 2012
geo: 
San Francisco , CA
United States
California US
Records Breached: 

Unknown

DocuSign user information was discovered to be accessible through a Google search. The information goes as far back as January 2012, and some information could be even older.  It is possible to see private emails, signatures, times, dates, locations, addresses, document names, and email addresses.  DocuSign claims that the information is available because a small number of DocuSign users have saved their own personal copies of their signed documents to publicly accessible and searchable locations outside of DocuSign's secure global network.  

Source: 
Databreaches.net

Memorial Sloan-Kettering Cancer Center

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
June 13, 2012
geo: 
New York , NY
United States
New York US
Extra Info: 

Memorial Sloan-Kettering's statement about the breach is posted on their website and can be found here.

Records Breached: 

880 (Unknown number of SSNs)

A routine check for sensitive information by Memorial Sloan-Kettering revealed that a PowerPoint presentation that was posted on two medical professional websites in 2006 contained embedded private information.  The information included patient names, phone numbers, addresses, and in some cases, Social Security numbers.  Anyone who accessed and manipulated the PowerPoint presentation could have viewed the information that was used to create certain graphs.  A total of five PowerPoint files contained sensitive information.

Source: 
PHIPrivacy.net

Columbia University

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 30, 2012
geo: 
New York , NY
United States
New York US
Records Breached: 

3,500

A programmer erroneously saved an internal test file onto a public server in January 2010.  Current and former employees had their names, Social Security numbers, addresses, and bank account numbers available on the internet from January 2010 until April of 2012.  A total of 3,000 current and former employees were affected, but an additional 500 sole proprietors were also affected.  It appears that the file was not accessed at anytime between January 2010 and March 10, 2012.  

Source: 
Dataloss DB

Steamboat Ski and Resort Corp.

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 6, 2012
geo: 
Steamboat Springs , CO
United States
Colorado US
Records Breached: 

Unknown

A former employee received W-2 information of current and former employees.  Names, Social Security numbers, addresses, payroll information, and other W-2 information were accidentally emailed to the former employee.  The former employee immediately notified the human resources department and confirmed that the information had not been mishandled.

Source: 
Databreaches.net

Wisconsin Department of Revenue

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 24, 2012
geo: 
Madison , WI
United States
Wisconsin US
Records Breached: 

110,795

An annual sales report contained the Social Security and tax identification numbers of people and businesses who sold property in Wisconsin in 2011.  The report was available online between April 5, 2012 and July 23, 2012 and meant for real estate professionals.  The report was accessed a total of 138 times before being taken down.  Sensitive seller information was in an an embedded file included in an Microsoft Access file which showed sales data.

Source: 
Media

New York State Comptroller's Office, New York State Assembly

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 13, 2012
geo: 
Albany , NY
United States
New York US
Records Breached: 

300

The New York state Comptroller's Office accidentally released the personal information of over 300 current and former state lawmakers and their staff.  The information was intended to fulfill a reporter's request for per diem payments collected by lawmakers.  The information was posted in a spreadsheet online. The Social Security numbers were accessible on hidden pages within the spreadsheet; though they were initially believed to be hidden from public view. The private information was available for less than a day.

Source: 
Media

Department of Health and Human Services Maine

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 19, 2012
geo: 
Augusta , ME
United States
Maine US
Records Breached: 

79

A computer system glitch caused the personal information of public assistance applicants to be sent to random addresses in the department's system.  The error occurred in December, but was not noticed until June.  Multiple rounds of forms had been mailed out by that time.  A total of 31 forms contained the Social Security numbers, bank account numbers, and other information of 79 household members.

Source: 
PHIPrivacy.net

American Stock Transfer & Trust Company, LLC

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 13, 2012
geo: 
Brooklyn , NY
United States
New York US
Records Breached: 

Unknown

Mail packages containing the beneficiary statements of certain shareholders for the year of 2011 were mailed to incorrect addresses on April 2, 2012.  The statements contained names, tax identification numbers of the intended shareholders, and addresses.  Shareholders of a single, unnamed issuer that used American Stock Transfer as a sub-transfer agent most likely had their information mailed to a different shareholder than the shareholder listed on the beneficiary statement.

Source: 
Dataloss DB

University of Alabama - Birmingham (UAB)

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
April 25, 2012
geo: 
Birmingham , AL
United States
Alabama US
Extra Info: 

Former students with questions may call 1-855-822-8510 or email info-help@uab.edu.

Records Breached: 

8,000

People who were undergraduate students at UAB between 1995 and 2006 may have had their information accessed online.  The information included Social Security numbers and academic records.  It was accidentally made available on a publicly accessible server for an unspecified amount of time.  The breach was discovered on March 27. 

Source: 
Dataloss DB

Groupon

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 2, 2012
geo: 
Chicago , IL
United States
Illinois US
Records Breached: 

170 (No SSNs or financial information reported)

An ongoing flaw in Groupon's email link encryption exposes the emails of some Groupon users when specific terms are added into Google searches of Groupon's site.  Groupon believes that the problem is caused by users publicly pasting their Groupon deals online.  Groupon is working on a solution to exclude the results.

Source: 
Databreaches.net

Pages

Showing 41-50 of 889 results
Subscribe to DISC