DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The state of data security – or lack thereof – in NY school districts

Posted on February 5, 2010 by Dissent

Yesterday, I posted an item about a Lindenhurst school district audit that indicated that a school district’s funds had been illegally transferred back in 2007 and that the district had not detected the problem. Last month, a similar situation occurred with the Duanesburg School District, also in New York.

Dee Alpert, publisher of The Special Education Muckraker, sent DataBreaches.net the following commentary:

It’s been reported that an upstate NY school district, Duanesburg, was the victim of a $3 million cyber theft in December 2009. NYS Comptroller Thomas DiNapoli announced today that a Long Island school district lost $600K due to hackers in 2007. http://www.osc.state.ny.us/press/releases/feb10/020410.htm.

The Long Island school district didn’t discover the hack since its finance and IT “experts” didn’t regularly check bank account info. and computer system logs. The FBI is handling both cases. Although the Long Island situation was discovered by the district’s bank over two years ago, the Comptroller reported that the district still hadn’t made all necessary (and elementary) changes needed to keep its IT system particularly secure by the time he finished the audit.

Over the last few years the NYS Comptroller has audited every one of the almost 700 districts in NYS and disclosed, with great regularity, truly dismal IT security situations. Districts with budgets of over $100 million per year often have less secure systems than the average home computer user. Many Comptroller-reported problems were not fixed by the time re-audits were done – years later. And the same security lapses have been reported in the last year’s district audits as were reported when these began being audited. There’s no learning curve for the NY school district industry when it comes to information security.

What’s worse? These districts tend to use the same systems for student-related data, all of which is hackable to the nth degree.

Names, addresses, health insurance information, parents’ names and contact information, health records, social security numbers, etc. For kids who have, or are suspected of having, disabilities, these records can include physicians’ and evaluating experts’ assessments, diagnoses, treatment recommendations, school psychologists’ evaluation reports, teachers’ notes on student and parent conferences, guidance counselors’ notes. These records are a goldmine for people who want to steal districts’ money *and* for those who want to steal personally-identifiable information. These files would be a bonanza for folks who’d like to open bogus credit card accounts in the name of high school students. Then there are the records for teachers, principals, aides, custodians … .

Now for the bad news. NY’s version of regional educational co-ops, called BOCES, have been audited and reportedly have as bad IT security problems as their member districts do. Because the BOCES are supposed to be really expert, they process a tremendous amount of highly confidential data, including Medicaid claims, for their districts.

The NYS Education Department is the only entity in the State of NY which has the legal authority to make districts and BOCES implement reasonable IT security. As far as we can tell, it hasn’t, and won’t. Ever! It certainly didn’t make districts and BOCES with bad IT security-related audit findings in prior years correct them all. /Au contraire! /In fact, Comptroller audits have shown time after time that State Ed. hasn’t made districts and BOCES implement many, sometimes most, audit recommendations relating to finances either. What is the United States Department of Education doing about this? As far as we can tell, nothing. It sends states checks, but seemingly doesn’t care if the money is then stolen.

What an education.

Dee Alpert
www.specialeducationmuckraker.com

If the NYS Education Department would care to respond, I’ll post their response.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • Ex-CISA head thinks AI might fix code so fast we won't need security teams
  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
Category: Commentaries and AnalysesEducation SectorOf Note

Post navigation

← Swiss Data Affair Could Pay Off Handsomely for Germany
TX: Owner of DME storefront charged with health care fraud, ID theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.