DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

And so it starts: Blumenthal Investigating Wellpoint Security Breach

Posted on July 2, 2010 by Dissent

From the CTWatchdog:

Connecticut Attorney General Richard Blumenthal is investigating a massive security breach that allegedly compromised private financial and health information on nearly a half million WellPoint consumers, including thousands in Connecticut.

In a letter to WellPoint Inc., Blumenthal has requested detailed information about how the breach occurred, what steps have been taken to protect the affected individuals, and what new procedures have been adopted to prevent future breaches.

Blumenthal is also calling on WellPoint to provide the same protection that other companies have done after similar breaches — at least two years of credit monitoring, at least $25,000 of identity theft insurance and expenses covered to impose and later lift any security freeze on consumers’ credit reports.

[…]

Blumenthal is seeking a response by July 9. The information he is seeking includes:

  • the name and address of the computer company who updated the online application process in October 2009;
  • What security protections, hardware or software, were present or used on the online application system prior to the upgrade;
  • the categories of information contained on the online system and compromised by this breach;
  • the process by which someone would be able to “manipulated the URL address” in order to view other individuals’ information;
  • Prior measures to safeguard sensitive information;
  • how and when WellPoint first learned about the breach;
  • the circumstances under which the information was accessed or viewed by anyone without authorization;
  • what, if any, security protocols or procedures were in effect to prevent the exposure of private information to users or applicants using the online system;
  • the number of individuals affected by this incident and their state of residence;
  • all steps taken to determine what caused the flaw in the online application system and the time period in which private information was publicly available;
  • how WellPoint determined that the information was accessed by fewer than 10 unidentified computers — someone other than the health insurer’s employees and affiliates;
  • copies of all investigative reports or audits relative to this incident;
  • all steps taken or that will be taken to warn all affected persons that their private information may have been compromised, and copies of any notification letters already sent;
  • an outline of any plan to prevent a future breach and a timeline for implementing that plan; and
  • corporate policies regarding securing servers, databases, or other systems containing private information.

Related posts:

  • Unanswered questions for WellPoint and Congress (commentary)
  • Settlement of yet another lawsuit against WellPoint /Anthem Blue Cross gets preliminary approval
  • Settlement of yet another lawsuit against WellPoint /Anthem Blue Cross gets preliminary approval
  • Indiana Attorney General reaches settlement with WellPoint in consumer data breach
Category: Health Data

Post navigation

← Bank of New York Mellon granted summary judgment in lost backup tapes lawsuit
Hospitals sued over HIV diagnosis →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Terrible tales of opsec oversights: How cybercrooks get themselves caught
  • International Criminal Court hit with cyber attack during NATO summit
  • Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”
  • Iran-linked hackers threaten to release emails allegedly stolen from Trump associates
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.