DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Employees of five client firms notified by Fidelity Investments that their data were exposed to the wrong parties

Posted on July 31, 2013 by Dissent

Fidelity Investments has reported a number of breaches this year, all involving exposure of information to the wrong people:

On June 17, Fidelity notified the NH Attorney General’s Office that information (names and Social Security numbers) of  Apria Healthcare plan members was accidentally included in a secure email sent to three employees of another client plan sponsor on April 26. The breach was discovered on May 10. Those affected were offered free credit monitoring for one year.

On June 18, Fidelity notified the NH Attorney General’s Office that information about Citrix System employees was accidentally included in a secure email sent to three employees of another client plan sponsor. This appears to have been part of the same breach reported above.

On June 21, Fidelity notified the NH Attorney General’s Office that information about Group 1 Automotive employees was accidentally included in a secure email sent to three employees of another client plan sponsor. This, too, appears to have been part of the same breach reported above.

On June 28, Fidelity notified the NH Attorney General’s Office that information about Power Advocate, Inc. employees was accidentally included in a secure email sent to three employees of another client plan sponsor. This, also, appears  to have been part of the same breach reported above.

And on  July 31,  Fidelity wrote to current and former Oracle employees enrolled in a 401(k) savings and investment plan:

On July 10, 2013, information about you was inadvertently included in a report that was briefly viewed by a plan administrator at another Fidelity client firm. The report included your name, Social Security number, compensation, and other information related to administration of your 401(k) savings and investment plan. The report that contained this information was only accessible through a password-protected application and only one employee at the Fidelity client firm had access to this report, a Human Resources manager, who is authorized to handle personal data related to his firm’s benefits plans as part of his job responsibilities. That employee fully and promptly cooperated with Fidelity in the return and deletion of the report.

 


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash)
Category: ExposureFinancial SectorU.S.

Post navigation

← South Central Los Angeles Regional Center notifies clients after employee’s car with iPad stolen
Rocky Mountain Spine Clinic fires employee who e-mailed patient information to her personal e-mail account →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.