DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Laptop stolen from VA contractor contains veterans’ personal data

Posted on May 13, 2010 by Dissent

Bob Brewin reports on a breach that I don’t think we knew about here:

A laptop belonging to a contractor working for the Veterans Affairs Department was stolen earlier this year and the personal data on hundreds of veterans stored on the computer was not encrypted, a violation of a VA information technology policy, said the top-ranking Republican on the House Veterans Affairs Committee.

The VA reported the theft of the laptop from an unidentified contractor to the committee on April 28 and informed members the computer contained personally identifiable information on 644 veterans, including data from some VA medical centers’ records, according to a letter Rep. Steve Buyer, R-Ind., sent to VA Secretary Eric Shenseki.

The VA declined to identify the contractor:

The laptop was stolen from a contractor employee’s car on April 22, and she notified local police within 10 minutes, said Roger Baker, chief information officer at VA, in an interview. Although the vendor had certified to VA that it had encrypted laptops that stored department data, Baker confirmed the data on the stolen laptop was unencrypted.

The vendor, who Baker declined to identify because he said it would make it more difficult for contractors to report future data breaches if they knew their name would be made public, reported the theft to VA on April 23.

So contractors for entities covered by HIPAA/HITECH have their names made public by HHS but the VA decides it can withhold the contractor’s identity? If that laptop contained any unprotected health information on the veterans (and the laptop had access to medical center data), then the contractor *will* be publicly identified on OCR’s site (unless it’s a “private practice” contractor), as over 500 individuals were affected. In any event, I firmly believe that all contractors who leave laptops with unencrypted PII or PHI in a vehicle for stealing should be publicly named, at the very least.

But the news is even worse:

After learning about the unencrypted laptop, Buyer investigated how many VA contractors might not be complying with the encryption requirement and learned that 578 vendors had refused to sign new contract clauses that required them to encrypt veteran data on their computers, an apparent violation of rules.

Buyer told Shinseki that the vendor had 69 contracts in more than half of the department’s 21 regional medical networks operated by the Veterans Health Administration, and 25 of those contracts, more than a third, did not have a clause that required data be encrypted.

Note that it’s not totally clear to me whether the vendor with 69 contracts is the same contractor that had the laptop stolen with 644 veterans’ info on it. Representative Buyer’s letter indicates that there were two breaches in Texas in the past two weeks and he prefaces the comments about the vendor with 69 contracts saying, “The most current breach involved a service disabled veteran owned business that had an unencrypted laptop stolen.” Was this the same laptop theft or the second one? It may be the second one alluded to. It really would help if they would name the vendors!

Read the full news coverage on Nextgov.

Update: From subsequent coverage, it appears that the vendor with the 69 contracts is the same one that had the laptop with 616 veterans’ info on it. The other incident affected 3,265 veterans.

Category: Breach IncidentsGovernment SectorOf NoteTheftU.S.

Post navigation

← UCSF employee charged with wire fraud
UCSF employee charged with wire fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.