DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Kansas woman pleads guilty to computer fraud

Posted on September 22, 2009 by Dissent

A Kansas woman  has pleaded guilty to stealing from her employer and damaging the company’s computer system in an effort to cover up the thefts.

Barbara James pleaded guilty to one count of exceeding authorized access to a protected computer and intentionally causing damage to the computer system. In her plea, she admitted the crimes took place in 2004 and 2005 while she was employed as a controller for Star Signs & Graphics in Lawrence, Kan. Through a service provided by a company in Santa Barbara, Calif., James had remote access to her company’s accounting system. She used her access to falsely increase her salary, to create forged checks on the company’s accounts, to make unauthorized charges on the company’s American Express account, and to make unauthorized payments from the company’s accounts to her personal credit cards.

In an effort to conceal the thefts, on March 18 and 19, 2005, she used her access to the company’s computer server to delete software that handled the company’s accounting. She also deleted more than 18,000 files from her workstation account. As a result, the company’s server had to be rebuilt at a cost of more than $87,872. Total loss to the company is calculated at $105,604. In her plea, James agreed to pay restitution for the full amount.

Sentencing is set for Dec. 14, 2009. She faces a maximum penalty of 10 years in federal prison and a fine up to $250,000.

Category: Breach IncidentsBusiness SectorInsiderU.S.

Post navigation

← Rocky Mountain Bank reveals “oops” in court papers
Laptop with some of Madoff victims’ data stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.