DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Two NBC Sports laptops stolen from unattended car

Posted on October 18, 2013 by Dissent

If you follow me on Twitter and thought I was mad at NBC Sports over their coverage of Formula One  (F1) racing, that may pale in comparison to how some others may be feeling this week  after they’ve received a breach notification letter from NBC Sports.

It seems that two of NBC Sports’ laptops were stolen from … wait for it… an unattended vehicle. The theft occurred in northern California on August 14. The laptops reportedly contained names plus at least one of the following elements: date of birth, driver’s license number, and/or Social Security number.

The letter to the New Hampshire Attorney General’s Office indicates that six New Hampshire residents were affected, but does not mention how many people, total, were affected by the breach. Nor does it indicate whether the individuals affected were employees or in some other capacity.  No copy of the letter to those affected was included in their submission to the state, and their notification to the state does not indicate what, specifically, they are doing to mitigate risk of potential harm or to prevent a recurrence. They also omit any mention of whether the employee who left the laptops with seemingly unencrypted personal information in a car was violating any of their security policies.

Dare I say it? Their coverage of their breach is as lame as their coverage of F1.

Category: Business SectorCommentaries and AnalysesTheftU.S.

Post navigation

← We don’t store credit card data…. oh wait, we are storing it?
Vietnamese national charged; allegedly acquired or sold PII on 500,000 people in carder forums →

2 thoughts on “Two NBC Sports laptops stolen from unattended car”

  1. IA Eng says:
    October 22, 2013 at 10:59 am

    And they need SSN’s for what reason? They aren’t in the credit granting business. There seems no due care for the sensitivity of data. Its not one laptop, it is two with probably redunant data which probably should have never been there in the first place.

    For security of PII, all it takes is a little brain power. Assume you are being watched travelling to/from your car on a daily basis. if you carry laptops to your car, but not out, the crooks take note of it.

    All of these breaches never heard of an Ironkey flash/thumb drive? Its a secure device – slap the wrong password it it 10 times in a row and it destroys itself. But thats a tedious security control and too much of a bother.

    There is a serious lack of security practices and reprimands for violations. Another thing is that the personnel involved in these acts aren’t tracked, so the same practices may apply for the next company they work for.

    The paperwork involved in a breach should be utterly painful. so those that eventually get through the paperwork fiasco will never want to go through it again.

    1. Dissent says:
      October 22, 2013 at 11:07 am

      They might need SSNs if these were employee data, but their letter doesn’t state whether these were employees’ data, contractors’, or what…

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.