Acronis

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 9, 2012
geo: 
Woburn , MA
United States
Records Breached: 

Unknown

A technical error caused a spreadsheet containing an unspecified number of email addresses and upgrade serial numbers to be indexed by search engines.  The email addresses from the spreadsheet were not accompanied with any personal information.  The spreadsheet was downloaded by 14 different IP addresses and the owners of those IP addresses were contacted.

Source: 
Dataloss DB

Employee Benefits, Atlanta Police, MARTA Police, Atlanta Fire Department

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 13, 2012
geo: 
Atlanta , GA
United States
Records Breached: 

39

Two representatives of Employee Benefits attempted to gather sensitive information from employees of Atlanta Police, MARTA Police, and Atlanta fire department employees.  They visited several locations and offered upgraded insurance and benefits packages through AFLAC insurance.  Employee Benefits is a legitimate provider of insurance, but not of AFLAC insurance.  The representatives handed out business cards and their supervisor was called when a police lieutenant noticed that the representatives appeared to be frauds.

Source: 
Databreaches.net

Forte Interactive, Children's Service Council of Palm Beach County, Ocean Reef Community Association

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 14, 2012
geo: 
West Palm Beach , FL
United States
Records Breached: 

Unknown

Information Forte Interactive inadvertently copied from web applications used by Children's Service Council and Ocean Reef Community accidentally became publicly accessible after a system upgrade.  Names, Social Security numbers, driver's license numbers, and dates of birth of individuals whose information was contained in the web portal or web portals was publicly accessible between December 7, 2011 and February 3, 2012. The issue was discovered on January 30, 2012.  

Source: 
Dataloss DB

Bethpage Federal Credit Union

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 12, 2012
geo: 
Bethpage , NY
United States
Records Breached: 

86,000

An employee accidentally posted data onto a file transfer protocol site that was not secure on May 3.  The data contained customer VISA debit card names, addresses, dates of birth, card expiration dates and checking and savings account numbers.  The error was discovered on June 3. The data was accessed, but there was no evidence of identity theft or fraud as of June 12.  New cards were issued to 25% of the affected members and the remaining members will have their affected cards deactivated on June 30.

Source: 
Databreaches.net

BlueCross Blue Shield of North Carolina

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 25, 2012
geo: 
Durham , NC
United States
Records Breached: 

100

A mailing software error caused the private information of current and former Blue Cross Blue Shield members to be mailed to other members.  The error was discovered on April 12.  The records were more than 10 years old and included patient names, Social Security numbers, type of medical care received, and other protected health information.

Source: 
PHIPrivacy.net

Columbia University

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 30, 2012
geo: 
New York , NY
United States
Records Breached: 

3,500

A programmer erroneously saved an internal test file onto a public server in January 2010.  Current and former employees had their names, Social Security numbers, addresses, and bank account numbers available on the internet from January 2010 until April of 2012.  A total of 3,000 current and former employees were affected, but an additional 500 sole proprietors were also affected.  It appears that the file was not accessed at anytime between January 2010 and March 10, 2012.  

Source: 
Dataloss DB

Choice Hotels Internationals

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 26, 2012
geo: 
Silver Spring , MD
United States
Records Breached: 

Unknown

An unknown number of customers had their personal information entered into the wrong field in a database.  The information should have been encrypted but was not because of the error. Customers may have received mail with their credit card number, driver's license number, Social Security number, passport number, or any combination of these elements printed on the outside of envelopes. The issue was discovered in late December of 2011.

Source: 
California Attorney General

Saint Mary's Hospital, Naugatuck Valley Community College

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 23, 2012
geo: 
Waterbury , CT
United States
Records Breached: 

Unknown

A Naugatuck Valley Community College instructor used patient X-rays from St. Mary's Hospital to teach radiology technology.  The instructor obtained the X-rays by using his Saint Mary's employee login to access medical records.  The X-rays were used without permission and contained patient names, dates of birth, and physician notes.  The instructor told students not to disclose the practice.

Source: 
PHIPrivacy.net

University of Arkansas for Medical Sciences (UAMS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 20, 2012
geo: 
Little Rock , AR
United States
Records Breached: 

7,000 (No SSNs or financial information reported)

A UAMS physician sent financial data to an individual who was not a member of UAMS's workforce in February of 2012.  Patient identifiers had not been removed from the data and UAMS learned of the error on April 6.  Patients of interventional radiology seen at UAMS between 2009 and 2011 had their names, UAMS account numbers, dates of service, interventional radiology procedures, diagnosis codes, charges, and payments exposed.

Source: 
PHIPrivacy.net

Virginia Military Institute

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 17, 2012
geo: 
Lexington , VA
United States
Records Breached: 

258 (No SSNs or financial information reported)

A Virginia Military Institute (VMI) administrator emailed a spreadsheet with the grade point average of every member of VMI's senior class to the VMI student president.  The email should have only contained an attachment with the names and hometowns of potential 2012 graduates.  The second attachment was not only emailed to the student president, but was then forwarded to 258 senior students before the student president and VMI administration realized the mistake.

Source: 
Dataloss DB

Pages

Showing 71-80 of 795 results
Subscribe to DISC