DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Jeanne D’Arc Credit Union notifies hundreds of insider breach – without telling them what happened?

Posted on December 7, 2011 by Dissent

USB ports are so convenient… and such a risk.

Lowell, Massachusetts-based Jeanne D’Arc Credit Union recently notified the New Hampshire Attorney General’s Office of a breach that occurred when an employee voluntarily left her employ on December 27, 2010 and took some files with her on a USB drive. She reportedly  planned to use the forms in her new employment.  When she left that new position in July 2011, her employer looked at her hard drive, noticed that there were files from Jeanne D’Arc, and sent them copies of the files that they had found.

An analysis of the files revealed that customers’ personal data had been copied onto the flash drive and then uploaded onto the new employer’s system.  Some files contained names and Social Security numbers, while other files contained names and loan account numbers.  There were 327 New Hampshire residents affected; the total was not disclosed.

The CU’s letter to its affected customers nforms them that there was a breach (not described) on or about December 27, that the CU found out months later, and that the CU doesn’t believe the data have been misused.  It offers affected customers no services, does not explain why it believes there is a low risk of misuse, does not indicate what steps it is taking to prevent a similar breach in the future, and its only apology is “We regret that this incident occurred.”

All in all, Jeanne D’Arc customers will learn more about the breach from reading this blog than they will have learned directly from the credit union.

That Jeanne D’Arc did not have sufficient controls in place to prevent an officer from downloading and removing files with personal information is, of course, a concern. That they never would have discovered the breach were it not for the diligence of the employee’s next employer is embarrassing, at least. But why not tell customers what happened so that they can make their own risk determination?

Jeanne D’Arc responded promptly to the breach once it learned of it, and its letter to the Attorney General’s office is sufficiently detailed. Its letter to customers… not so much.

Actually, the more I look at it, it may be one of the worst notification letters I’ve seen in years.  See what you think. The notification and letter are available here.


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsFinancial SectorInsiderU.S.

Post navigation

← RSA Shuts Down More Than 500,000 Cyber Attacks Across 185 Countries
Heartland gets most of banks’ claims dismissed over its massive data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.