DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VA: University of Mary Washington notifies students of data breach (update1 with memo to students)

Posted on June 8, 2011 by Dissent

Jeff Branscome reports UMW sent the following e-mail to all employees to remind them of security policies in the wake of a breach involving student information:

To All Faculty/Staff:

This is to advise you that UMW experienced an information security incident, which you may read about in the news media. The attached letter was sent to all students whose personal information was subject to unauthorized exposure. The exposure was very limited and we have no reason to believe that there will be further harm to the privacy of the individuals involved. In compliance with the policies and procedures of UMW and the Commonwealth of Virginia, the incident was brought to the attention of all affected students. In brief, a UMW student who was searching the EagleNet portal for his own information found student data files on a departmental EagleNet site. The data files included personal information for a large number of UMW students. The student proactively and responsibly reported this fact to university officials and immediate steps were taken to prevent further access to this information and to remove the files from the departmental EagleNet site. Based upon our review of the situation, we have determined that a total of three currently enrolled students opened these files. We have spoken with all three students and have no reason to suspect there was any malicious intent involved or that any student data will be targeted for identity theft.

Earlier this year, all faculty and staff were notified of the requirement to complete Information Security Awareness training. This training reviewed various information security related policies, including the Electronic Storage of Highly Sensitive Data Policy. These policies require all of us to diligently safeguard and protect the university’s data, and to take extra precautions to ensure the protection of highly sensitive, personally identifiable information involving members of the UMW community. All university employees should review these policies, found at: http://www.umw.edu/doit/itsecurity/it_security_policies.php.

So far, I don’t see any notice on UMW’s web site or in the media, but have e-mailed the university to request more information and I imagine we’ll see more details revealed soon.

Update 1: The university kindly sent me a copy of the notice sent to students, which indicates that Social Security numbers were involved.   In a separate email, a university spokesperson informs DataBreaches.net that 7,566 students were notified of the problem.

 

Category: Breach IncidentsEducation SectorExposureU.S.

Post navigation

← Check Point and Ponemon Survey Reveals 77% of Businesses Experienced Data Loss Last Year
Hacker fallout: Partial Tory donors list posted online →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.