DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Prince William County: Stolen Blackberry Contained Protected Health Information of 669 County Residents

Posted on July 15, 2010 by Dissent

Overnight, between June 18 and June 19, 2010, a Prince William County employee with the Intellectual Disabilities Case Management (IDCM) Program had a government-issued Blackberry stolen from the employee’s locked vehicle, which was parked in the driveway of the employee’s home. Saved onto the Blackberry’s hard drive along with some case files was the full client list of the 669 County residents enrolled in the program.

The personal information of those clients contained on the Blackberry includes:

* Name
* Date of Birth
* Address
* Phone number
* Social Security Number
* Medicaid Number

[…]

Prince William Community Services Department (CS) serves clients and their families throughout the County in numerous facilities and residences. To do this in the most effective and efficient way possible, the agency uses mobile devices and other technologies to serve its clients and assist its employees. However, in light of this current breach, CS is making every effort to mitigate current and potential harm to individuals.

Prince William County Police have been notified and are investigating the theft. The service provider was contacted and deactivated the phone to make certain calls cannot be made and certain features of the phone are rendered inoperable. CS notified all staff of the breach, and is making every effort to strengthen practices that will minimize the likelihood of client information being compromised in the future. To that end, CS has conducted an inventory of all mobile storage devices in use by case managers, and is investigating new encryption technologies and best practices to provide greater security of sensitive data entrusted to their employees.

CS is negotiating a contract with the three Credit Reporting Agencies to pay for a credit report covering the next 12 months at no cost to the clients. As soon as a contract is completed clients will be notified on how to use the service. However, clients should not wait to place a Fraud Alert with one of the companies listed above as this is a free service.

Notification has been sent to all affected individuals, and case managers are contacting each of their clients to help protect them from this breach of security. If you or someone you know is registered in the IDCM Program, and needs assistance, please contact the CS Office at: 703-792-7740.

Source: Prince William County web site


Related:

  • Paying cyberattackers is wrong, right? Should Taos County's incident be an exception? (1)
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: Health Data

Post navigation

← MasterCard: Most banks agree to breach settlement
(update 4) Utah concludes state resources were used in immigrant list →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.