DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Audit finds confidential data on NJ state computers sent to auction

Posted on March 9, 2011 by Dissent

Angela Delli Santi reports:

Taxpayers’ Social Security numbers, confidential child abuse reports and personnel reviews of New Jersey workers nearly went to the highest bidder after the state sent surplus computers out for auction.

Nearly 80 percent of surplus computers in a comptroller’s office sample had not been scrubbed of data before being shipped to a warehouse, according to an audit released Wednesday.

Read more form the AP in the Orlando Sentinel.

Related:
Office of the Comptroller press release, March 9, 2011 (pdf)
Audit Report (pdf), March 9, 2011 (pdf)

From the report (p. 6):

As part of our audit research process, in January 2010 we obtained six hard drives and one laptop computer from the Warehouse. Despite the State’s degaussing requirements, one of the hard drives contained a list of children placed outside the parental home, and the laptop contained numerous files of a State judge, including:

  • the judge’s life insurance trust agreement, his tax returns for three years and a final mortgage payment letter that included the address of the property and the account number;
  • two documents with the judge’s Social Security number;
  • a “confidential fax” to the New Jersey Lawyers Assistance Program concerning an attorney’s “personal emotional problems”; and
  • non-public memoranda by the judge concerning potential impropriety by two lawyers

Note that as I have often pointed out, medical data resides on systems that are not under federal medical privacy laws like HIPAA. In this case, here’s what investigators found on one drive (p.10):

More than 230 files related to State investigative case screenings and reports of child abuse, endangerment and neglect. Many of the reports contained the names and addresses of the children. The files also included a child fatality report, child immunization records and a child health evaluation.

There was a vast amount of personal, sensitive, and confidential information on these computers.

Will any heads over this major security FAIL? If not, why not?


Related:

  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • Ex-CISA head thinks AI might fix code so fast we won't need security teams
Category: Commentaries and AnalysesExposureOf NoteU.S.

Post navigation

← Rogue Penn Mutual employee may have accessed and disclosed customer personal and financial information
Ca: Bureaucrats who violated veteran's privacy get ‘slap on the wrist’ →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.