DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Aaron’s operations computer stolen during burglary, contained customers’ Social Security numbers

Posted on November 2, 2011 by Dissent

It never rains but it pours?

I had never heard of Aaron’s until  earlier this year when they were sued for allegedly installing spyware on rent-to-own computers. But now I see their name again – this time, on a breach notification to the New Hampshire Attorney General’s Office.

According to the firm’s letter of October 18, a Fresno, California franchise was burglarized.  Aaron’s was informed of the burglary on September 26, and by September 30, had determined that a computer stolen in the burglary contained customers’ names and Social Security numbers.  According to their notification, 1,008 residents of New Hampshire were affected by the breach; the nationwide total was not provided.  Reportedly, the computer contained information on the franchisee’s customers and (other) Aaron’s customers.

The firm sent out notifications to consumers the week of October 17, offering them free credit monitoring services even though it appeared the computer was likely stolen for its hardware value and not for the data.

Category: Breach IncidentsBusiness SectorTheftU.S.

Post navigation

← 2,500 Avia Dental Plan members notified of security breach
E-mail failure-to-bcc error exposes U. Alabama students’ failing grades to each other →

1 thought on “Aaron’s operations computer stolen during burglary, contained customers’ Social Security numbers”

  1. NORMA WELCH says:
    November 13, 2011 at 6:28 pm

    I HAVE HAD PROBLEM WITH SS NUMBER, STARTED 1ST OF OCTOBER. CAUSING PROBLEMS WITH EMPLOYMENT,

    ABOUT 8 MO AGO THEY ALSO TRIED TO SUE ME OVER PAID OFF ITEMS.
    LUCKLY HAD RECEIPTS.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)
  • RCMP thumb drive with informant, witness data obtained by criminals: watchdog

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Meta AI app is a privacy disaster – TechCrunch
  • Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
  • Norwegian Data Protection Authority’s findings on tracking pixels: 6 cases
  • Multiple States Enact Genetic Privacy Legislation in a Busy Start to 2025
  • Rules Proposed Under New Jersey Data Privacy Act
  • Using facial recognition? Three recent articles of interest.
  • India publishes consent management rules under Digital Personal Data Protection Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.