DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CA: Current and Former State Employees Advised of Breach of Personal Information

Posted on June 24, 2011 by Dissent

From the California Department of Public Health press release of June 24, 2011:

Date: 6/24/2011

Number: 11-028

Contact: Al Lundeen (916) 440-7259

SACRAMENTO

A California Department of Public Health (CDPH) investigation has found that personal and workers’ compensation information of approximately 9,000 current and former state employees was improperly copied to a private hard-drive and removed from state offices, said CDPH Director Dr. Ron Chapman. At this time, the CDPH investigation has not uncovered any indication that the information has been misused or further disclosed.

“We regret that the personal information of our employees was compromised,” said Chapman. “We take the breach of any secure documents very seriously and are committed to taking steps to minimize any impact of this action and further strengthen our security policy.”

The security breach of information impacts most current CDPH and California Department of Health Care Services (DHCS) employees, as well as nearly 3,000 employees of the former Department of Health Services (DHS). The personal information contained individual names and addresses in conjunction with varying combinations of Social Security numbers, ethnicity, birth dates, next of kin and the addresses of those individuals listed as next of kin, and/or information from workers’ compensation documents.

CDPH was alerted to unusual activity discovered by the department’s security detection system on April 5. CDPH immediately initiated an investigation and discovered the unauthorized removal of information from state premises by an employee. The employee is currently on administrative leave until the investigation is completed.

CDPH has begun implementing additional internal safeguards to protect employee information as the investigation progresses. CDPH is also conducting a thorough review of information security policies and will put in place any additional necessary policies or practices to help prevent such an incident from happening again.

CDPH will offer credit monitoring services to affected individuals. Additional information is available at http://www.cdph.ca.gov/programs/Pages/PrivacyOffice.aspx Also, a toll-free phone line has been established to help address questions from current and former employees: (877) 421-9634. CDPH encourages employees to activate the one-year credit monitoring membership by calling the toll-free line.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
Category: Breach IncidentsInsiderU.S.Unauthorized Access

Post navigation

← Seattle man sentenced to 5 yrs in bank fraud/id theft case
New Texas Health Care Privacy Law →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.