Employee Benefits, Atlanta Police, MARTA Police, Atlanta Fire Department

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
August 13, 2012
geo: 
Atlanta , GA
United States
Records Breached: 

39

Two representatives of Employee Benefits attempted to gather sensitive information from employees of Atlanta Police, MARTA Police, and Atlanta fire department employees.  They visited several locations and offered upgraded insurance and benefits packages through AFLAC insurance.  Employee Benefits is a legitimate provider of insurance, but not of AFLAC insurance.  The representatives handed out business cards and their supervisor was called when a police lieutenant noticed that the representatives appeared to be frauds.

Source: 
Databreaches.net

Forte Interactive, Children's Service Council of Palm Beach County, Ocean Reef Community Association

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
March 14, 2012
geo: 
West Palm Beach , FL
United States
Records Breached: 

Unknown

Information Forte Interactive inadvertently copied from web applications used by Children's Service Council and Ocean Reef Community accidentally became publicly accessible after a system upgrade.  Names, Social Security numbers, driver's license numbers, and dates of birth of individuals whose information was contained in the web portal or web portals was publicly accessible between December 7, 2011 and February 3, 2012. The issue was discovered on January 30, 2012.  

Source: 
Dataloss DB

University of Arizona (UA)

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
August 8, 2012
geo: 
Tucson , AZ
United States
Extra Info: 

Those with questions may call UA's incident contact line at 520-621-4746

Records Breached: 

7,700

A UA student ran a Google search and found her private information posted publicly.  The data belonged to several thousand people who had submitted their names and tax ID numbers to UA in order to receive payments or reimbursements.  Vendors, consultants, guest speakers, and UA students had their names and tax ID numbers exposed in February and early March.  Some people had their Social Security numbers exposed in lieu of tax ID numbers. The sensitive data was embedded within a larger set of files being transferred to the UA new financial system.

Source: 
Databreaches.net

BlueCross Blue Shield of North Carolina

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
June 25, 2012
geo: 
Durham , NC
United States
Records Breached: 

100

A mailing software error caused the private information of current and former Blue Cross Blue Shield members to be mailed to other members.  The error was discovered on April 12.  The records were more than 10 years old and included patient names, Social Security numbers, type of medical care received, and other protected health information.

Source: 
PHIPrivacy.net

Columbia University

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 30, 2012
geo: 
New York , NY
United States
Records Breached: 

3,500

A programmer erroneously saved an internal test file onto a public server in January 2010.  Current and former employees had their names, Social Security numbers, addresses, and bank account numbers available on the internet from January 2010 until April of 2012.  A total of 3,000 current and former employees were affected, but an additional 500 sole proprietors were also affected.  It appears that the file was not accessed at anytime between January 2010 and March 10, 2012.  

Source: 
Dataloss DB

Memorial Sloan-Kettering Cancer Center

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
June 13, 2012
geo: 
New York , NY
United States
Extra Info: 

Memorial Sloan-Kettering's statement about the breach is posted on their website and can be found here.

Records Breached: 

880 (Unknown number of SSNs)

A routine check for sensitive information by Memorial Sloan-Kettering revealed that a PowerPoint presentation that was posted on two medical professional websites in 2006 contained embedded private information.  The information included patient names, phone numbers, addresses, and in some cases, Social Security numbers.  Anyone who accessed and manipulated the PowerPoint presentation could have viewed the information that was used to create certain graphs.  A total of five PowerPoint files contained sensitive information.

Source: 
PHIPrivacy.net

Saint Mary's Hospital, Naugatuck Valley Community College

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 23, 2012
geo: 
Waterbury , CT
United States
Records Breached: 

Unknown

A Naugatuck Valley Community College instructor used patient X-rays from St. Mary's Hospital to teach radiology technology.  The instructor obtained the X-rays by using his Saint Mary's employee login to access medical records.  The X-rays were used without permission and contained patient names, dates of birth, and physician notes.  The instructor told students not to disclose the practice.

Source: 
PHIPrivacy.net

University of Arkansas for Medical Sciences (UAMS)

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 20, 2012
geo: 
Little Rock , AR
United States
Records Breached: 

7,000 (No SSNs or financial information reported)

A UAMS physician sent financial data to an individual who was not a member of UAMS's workforce in February of 2012.  Patient identifiers had not been removed from the data and UAMS learned of the error on April 6.  Patients of interventional radiology seen at UAMS between 2009 and 2011 had their names, UAMS account numbers, dates of service, interventional radiology procedures, diagnosis codes, charges, and payments exposed.

Source: 
PHIPrivacy.net

Virginia Military Institute

Type of organization: 
Year of Breach: 
Type of breach: 
Under Review: 
0
Date Breach Made Public: 
April 17, 2012
geo: 
Lexington , VA
United States
Records Breached: 

258 (No SSNs or financial information reported)

A Virginia Military Institute (VMI) administrator emailed a spreadsheet with the grade point average of every member of VMI's senior class to the VMI student president.  The email should have only contained an attachment with the names and hometowns of potential 2012 graduates.  The second attachment was not only emailed to the student president, but was then forwarded to 258 senior students before the student president and VMI administration realized the mistake.

Source: 
Dataloss DB

Phoenix Cardiac Surgery, P.C.

Type of breach: 
Year of Breach: 
Type of organization: 
Under Review: 
0
Date Breach Made Public: 
April 17, 2012
geo: 
Phoenix , AZ
United States
Extra Info: 

Patients in Prescott, Arizona may have also been affected.

Records Breached: 

Unknown

Phoenix Cardiac Surgery inadvertently posted the clinical and surgical appointments of patients on an Internet-based calendar that was publicly accessible.  The error went unnoticed for an unspecified amount of time.  The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) investigated the error and determined that Phoenix Cardiac Surgery had a number of Health Insurance Portability and Accountability Act (HIPAA) violations.  Phoenix Cardiac Surgery agreed to pay HHS a settlement totalling $100,000 and to comply with HIPAA.

Source: 
PHIPrivacy.net

Pages

Showing 71-80 of 793 results
Subscribe to DISC