University of Virginia, Aetna Health Care

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 19, 2013
geo: 
Charlottesville , VA
United States
Virginia US
Records Breached: 

18,700

A mailing error by a third-party mailing vendor used by Aetna Health Care resulted in the Social Security numbers of students being exposed in open-enrollment brochures.

Source: 
Media

NYC Bike Share, Citibike

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 24, 2013
geo: 
New York , NY
United States
New York US
Records Breached: 

1,200

NYC Bike Share discovered that customer credit card numbers, names, and addresses had been posted on a publicly accessible page of its website.  The glitch was corrected after being active between April 15 and late May.  Customers who initially entered their information incorrectly had their information posted online for 24 hours.  The data was cleared every 24 hours between April 15 and late May.

Source: 
Media

Fidelity Investments, Oracle

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 31, 2013
geo: 
Redwood , CA
United States
California US
Records Breached: 

Unknown

Current and former Oracle employees may have had their 401(k) information viewed by a plan administrator at the firm of another Fidelity client.  Names, Social Security numbers, compensation, and other 401(k) savings and investmant plan information was briefly viewed by accident.  The issue was discovered on July 10, 2013.  

Source: 
California Attorney General

Health Net, CalViva Health

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 2, 2013
geo: 
Suwanee , GA
United States
Georgia US
Records Breached: 

Unknown

A number of member identification cards were mailed to incorrect addresses.  The problem occurred because of a programming error.  The member identification cards contained names, dates of enrollment, addresses, telephone numbers of primary care physicians, issue dates of cards, and Medi-Cal client identification numbers.  

Source: 
California Attorney General

M2ComSys, Cogent Healthcare, Inc.

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
August 8, 2013
geo: 
Brentwood , TN
United States
Tennessee US
Extra Info: 

Cogent Healthcare offices across the country, Cogent Medical Care, Endion Medical Healthcare (Endion SeniorCare), Parkview Community Hospital Medical Center, Inpatient Specialists of Southwest Florida, and Comprehensive Hospital Physicians of Florida were affected.

Records Breached: 

32,000

M2ComSys (M2), a medical transcription company, stored physicians' notes for Cogent Healthcare.   It was discovered that the online system that stored the notes could be accessed.  Patient care notes with names, physician names, dates of birth, diagnosis descriptions. summary of treatment, medical history, medical record numbers, and other medical information were exposed.  The notes could have been accessed on May 5, 2013 and improper access to the site ended on June 24, 2013.  M2 no longer provides services for Cogent Healthcare.

Source: 
California Attorney General

Auburn University - School of Forestry and Wildlife Sciences

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 9, 2013
geo: 
Auburn , AL
United States
Alabama US
Records Breached: 

Unknown

Spreadsheets with donor and alumni information were accidentally uploaded to a publicly accessible server after an administrative error.  The error was discovered on June 19 and Auburn's IT office removed the information.  Names, Social Security numbers, maiden names, mailing addresses, first year at Auburn, graduation year, alumni status, email addresses, and phone numbers were exposed.

Source: 
Databreaches.net

US Airways, Advanced Data Processing

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 30, 2013
geo: 
Tempe , AZ
United States
Arizona US
Records Breached: 

40,000

A programming error at Advanced Data Processing (ADP) caused employee names, Social Security numbers, and total taxable W-2 wages for the tax years 2010, 2011, and 2012 to be exposed.  A group of other US Airway employees were able to download the payroll information of their colleagues.  ADP corrected the issue in early May and notified US Airways in early June.

Source: 
Media

Clark Memorial Hospital

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 2, 2013
geo: 
Jeffersonville , IN
United States
Indiana US
Records Breached: 

1,087 (No SSNs or financial information reported)

A third-party mailing error resulted in the exposure of patient health information.  Billing statements with names, dates of service, insurance information, billing information, and financial status were mailed to incorect addresses.

Source: 
Media

Securities and Exchange Commission (SEC)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 25, 2013
geo: 
Washington , DC
United States
District Of Columbia US
Records Breached: 

Unknown

A July 8 letter warned current and former employees that SEC employee data had been found on the networks of another federal agency.  The outside federal agency was not named. It appears that a former SEC employee inadvertently and unknowingly downloaded the names, Social Security numbers, and dates of birth of SEC employees onto a thumb drive and then transferred them to another agency.  The employee wanted a template of the document rather than the actual employee data that it contained.

Source: 
Media

Oregon Health & Science University (OHSU)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
July 29, 2013
geo: 
Portland , OR
United States
Oregon US
Records Breached: 

3,000 (No SSNs or financial information reported)

Patient data could have been accessed due to a storage error.  The information of patients admitted between January 2011 and July 3 of 2013 was placed on Google's cloud computing system.  The information was password-protected, but could have still been used for promotional and other purposes because OHSU does not have a contract with Google.  OSHU removed the information from the cloud.

Source: 
Media

Pages

Showing 71-80 of 910 results
Subscribe to DISC