University of Kansas (Kansas University)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
January 20, 2006
geo: 
Lawrence , KS
United States
Records Breached: 

9,200

A computer file with sensitive personal information was accessible to the public.  Students who applied and paid an application fee online between April 29, 2001 and December 16, 2005 had their names, Social Security numbers, birth dates, addresses, phone numbers and credit card numbers exposed.

Source: 
Dataloss DB

New Hanover County

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 9, 2010
geo: 
Wilmington , NC
United States
Records Breached: 

Unknown

A list of 9,845 property owner accounts was published online. Social Security numbers were attached to 163 of the accounts, though some people had multiple accounts. The list of delinquent accounts was mistakenly published before the Social Security numbers were removed. It is unclear how long the information was available online.

Source: 
Databreaches.net

J-Sargeant Reynolds Community College

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
December 8, 2005
geo: 
Richmond , VA
United States
Records Breached: 

26,000

The names, Social Security numbers and addresses of students taking non-credit classes from 2000 to 2003 were posted online for months.  The information was compiled for a mailing list, but an employee posted it on the College's server.  A student informed officials of the mistake after accessing the information online.  The College began the process of removing the information from the web.

Source: 
Dataloss DB

Richmond Public Schools

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 7, 2010
geo: 
Richmond , VA
United States
Records Breached: 

110

An employee accidentally sent an email with the names, Social Security numbers and other personal information of 110 employees to 3,300 employees. Administrators began limiting access to the document and the entire email system after the mistake was discovered half an hour later. The email contained personnel changes, but was supposed to be emailed without the personal information of those employees who were moving within the organization.

Source: 
Databreaches.net

Papa John's

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
November 7, 2005
geo: 
Louisville , KY
United States
Records Breached: 

Unknown

An error made thousands of customer comments and internal corporate emails available to anyone searching the Internet.  Customer comments submitted between September 29 and November 7 were viewable and had customer names, addresses, phone numbers and email addresses attached.  The company stated that "customer feedback over the last five weeks...could be viewed by a user who would have to enter a very specific, unpublished URL."  The system now requires a password.

Source: 
Dataloss DB

ING

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
October 12, 2010
geo: 
Wilmington , DE
United States
Extra Info: 

The location listed is ING's headquarters.

Records Breached: 

Unknown

An isolated administration error caused an encrypted file with the personnel information of one client's employees to be made available to the HR department of another client. A password-based registration system was already in place to prevent the wrong addressee from opening encrypted email, however, the email was addressed to the wrong client.

Source: 
Databreaches.net

Hampton Redevelopment and Housing Authority

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 24, 2009
geo: 
Hampton , VA
United States
Records Breached: 

900

The Social Security numbers and other personal information of nearly 900 people who were banned from public housing in Hampton were accidentally given to a resident who requested the information. A housing authority employee printed a spreadsheet and mailed it but forgot to exclude the personal information.

Source: 
Dataloss DB

Walgreens Health Initiative

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
March 18, 2009
geo: 
Deerfield , IL
United States
Extra Info: 

(866) 292-9063

Records Breached: 

28,000

Names, dates of birth and Social Security numbers of roughly 28,000 state retirees were e-mailed to the Kentucky Retirement Systems without being properly encrypted for security purposes by its pharmacy benefit provider. The e-mail contained dates of birth, Social Security numbers and health insurance claim numbers but not personal health information. The file contained information only on members who were both Medicare-eligible and used the retiree pharmacy benefit through Walgreens in 2007.

Source: 
Dataloss DB

Central Ohio Transit Authority

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 18, 2009
geo: 
Columbus , OH
United States
Records Breached: 

900

More than 900 current and former COTA employees recently learned their Social Security numbers had been sent to dozens of health-insurance companies. Central Ohio Transit Authority officials notified administrative employees who have or had worked for COTA since 2004 that personnel workers gave 51 companies their names and identification numbers. The information went to companies proposing to bid on providing long-term disability insurance to COTA. In 2006,

Source: 
Dataloss DB

Comcast

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 16, 2009
geo: 
Philadelphia , PA
United States
Records Breached: 

4,000 Not added to total. SSNs and financial account numbers were not accessed.

A list of over 8,000 Comcast user names and passwords were available to the public via Scribd for two months, before a Wilkes University professor discovered it over the weekend after doing a search for his identity online. Comcast is saying it looks like the result of a phishing scam and isn't an inside job, and that there are so many duplicate entries on the list that it's closer to 4,000 customers who were exposed.

Source: 
Media

Pages

Showing 691-700 of 795 results
Subscribe to DISC