DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GA: Tough Questions for staffing agency about discarded documents

Posted on January 10, 2012 by Dissent

Bernard Watson reports on a breach involving Staffing Solutions that they had reported last week. In this case, I think a business may get a bad rep for something that really wasn’t their fault at all. See what you think:

“We will keep your information secure.”

That is the mantra Shawn Poole has based his company’s reputation on. The CEO of Employ Bridge said keeping employees personal information secure is a top priority. But a little more than a week ago, CBS Atlanta started asking Tough Questions about one of Employ Bridge’s companies after thousands of documents containing personal information were found in a Gwinnett County recycling dumpster.

Poole said he saw a story on CBS Atlanta about the situation and he started an investigation.

“We couldn’t figure out how that could have happened, so what we did was we went and talked to each of our branch offices here in Metro Atlanta to see if they had disposed of any records over the weekend and really the last six months. The answer was no,” said Poole.

Poole said after investigating further he learned the documents were taken from a Alpharetta office without the company’s knowledge or permission.

“The lease ends in February of this year and the landlord [Tempo Real Estate Corporation] was under the impression it ended on Dec. 31 and he sent a cleaning crew in there to clean out the offices,” Poole said.

Read more on CBS Atlanta.

Category: Breach IncidentsBreach TypesPaperSubcontractor

Post navigation

← CA: School Accidentally Throws Out Books and Student Information
#OpFreePalestine continues to hack Israeli sites →

1 thought on “GA: Tough Questions for staffing agency about discarded documents”

  1. major_tom says:
    January 10, 2012 at 9:54 am

    Its a triple edged sword here, it seems like ALL 3 parties are at fault, mainly for lack of communication to each other, and ASSuming that everything will play out just fine.

    Since there is little information about the office that got cleaned out, its hard to tell if the place still looked occupied, or looked abandoned.

    The owner should have doble checked the lease agreement prior to barging in and assuming that the place was emptied. The owner probably did not visit the establishment, and ordered the cleaning crew to proceed.

    I am sure the 3rd party cleaning crew is at fault as well. If there is questionable materials that are found, they should have simply left them in the office and called the owner and told the owner THEY need to dispose of the potentially sensitive information vice just removing it. Once you get involved with a process that could be construed as a breach, then you have jumped in the pot of festering stew as well. The breach would have not happened if the 3rd Party cared.

    If the company knows they are about to vacate the premises over the next few months, and have a reputation to uphold, then they need to be proactive. If they had material that was sensitive and was not clearly marked, they too are part of the problem. Marking material appropriately can deter people from doing something they should not, and it could hold up in court if an insider used information illegally…. it was clearly marked and the person(s) cannot deny seeing a control in place.

    Maybe a clear cut work order form needs to be established. Not necessiarily a contract per se, but a list of what the 3rd party is supposed to do, and what not to do. Add in contact information along with a clause protecting the 3rd party should they run into any confidential info. This all seems like an easy fix, if the management and staff acts responsibly in all three companies.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.