DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

When is “an excess of caution” not excessive?

Posted on January 6, 2013 by Dissent

Over on DataLossDB.org, I was entering a security breach notification sent by Atlanta-based Oldcastle APG, Inc. They had informed the New Hampshire Attorney General’s Office that a laptop containing over 5,000 employees’ names, Social Security numbers, and bank account information had been stolen from an employee’s car.  As required by the state. they had attached a copy of the notification letter they were sending to employees, and I read it to see it provided any additional details not included in their cover letter. It didn’t.

But then I came to this statement in their notification to employees:

APG_notice
Okay, maybe programs that wipe data if the stolen laptop connects to the Internet are of value. But if a thief simply powers up without connecting, then there’s all that valuable unencrypted data just waiting to be misused, isn’t there?

So is it really an “excess of caution” to notify people that their SSN’s and bank account information are in the wild? Especially when the law requires you to notify them?

I don’t think so. Do you?


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
Category: Breach IncidentsBusiness SectorCommentaries and AnalysesTheftU.S.

Post navigation

← 51 Sites Defaced, PSF.gov.pk Hacked & data leaked
Jefferson County Sheriff Taken offline →

3 thoughts on “When is “an excess of caution” not excessive?”

  1. Mike says:
    January 6, 2013 at 9:33 am

    Remember when you were a kid, and that bully’s mom made him apologize? Yeah, this notification letter carries all of that apology’s sincerity.

  2. JJ says:
    January 6, 2013 at 10:06 pm

    Too many companies have jumped on the insincere apology bandwagon. It’s lost its value. These guys know of no “intent” to access the information? Unless there was a blackmail threat, how would they? If they had something like Lojack for Laptops installed, they would know when it was wiped out. But they haven’t said they got the confirmation. Maybe that’s why they’re “apologizing”.

  3. IA Eng says:
    January 7, 2013 at 12:05 pm

    Companies like this – I just have to shake my head and frown. I don’t know what they are thinking – You’re absolutely right – Smart crooks are probably going to remove the hard drive, MAYBE replace it and try to sell the laptop to a pawn shop as quick as possible, or from the trunk of a car. Heck, take the thing apart and sell the entire unit as parts – minus anything that may have a serial number on it.

    Another theft from a car. This happens so often. The people who have objects stolen probably have never heard the saying “out of sight out of mind”. Nor do they have the presence of mind to think about the area they are in when they are entrusted with a device that contains PII. It should be treated like cash, stocks, heck Gold. Instead it could be shrugged off as “eh, if it is stolen, it’s not mine”. For their security blunder, the offender should be required to pay resititution in the form of a single payment for the replacement cost of a like or newer computer.

    The data on the hard drive can be duplicated and put back. There are so many possiblities/ variables that a slick command to a laptop’s MAC address or phone-home software is useless. Trying to comfort someone with a line of semi-technical jargon is a way to interject doubt in the thieve’s ability to do harm, and by doing so, converts a ticked off user who will probably sit and wait vice take action.

    I don’t understand companies that will allow this. Biometrics is the way to go on laptops. Use a fingerprint and a PIN and your in. PII data should be required to be on Ironkey type technology only – a USB flash drive that is password protected. After 10 unsuccessful attempts in a row, it self destructs.

    Until the government starts to slap companies hard with fines, or they provide “PII insurance” over multiple years, like up to 5 years – then this sort of lethargic attention to detail and secuirty protocols will always be status quo. No matter what, it seems like the government goes soft, in case there is a public outcry of another act of heavy handed actions by the US government. They are catching on, but it is waaaaay too late.

    I am avid about customer service. I give the best possible customer service, and when its inbound to me, and I ask questions about a service that is being provided to me and it is failing/failed and I hear the stereotypical monotone phrase ” I am sorry for the inconvenience” – more times than I wish to count, I simply say “I know you are” now how is this going to be rectified? Don’t have an answer, then let me talk to your supervisor. I will wait.

    A one year offering is trivial, its a minimum cost, and the company probably receives some sort of compensation or acknowledgement that they are bringing in temporary customers.The the PII consultants or sharks…. sell these souls additional multiyear PII coverage that comes out of their pockets. Its a racket. It’s a BS way for America to operate. I believe it happens more than I wish to think about = \

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.