DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Georgia Department of Driver Services public computers expose personal information

Posted on November 18, 2013 by Dissent

Ross McLaughlin reports:

11Alive’s Center for Investigative Action went undercover to expose how a state agency that you trust to protect your personal information is putting people at risk for identity theft.

Your private information, available for anyone to see — tax returns, Social Security numbers, you name it. It may not have been intentional, but it needed to be fixed.

“It was a little disconcerting that my complete tax returns were on the computer,” said Michelle Hogan.

Hogan alerted 11Alive News to it, after going to a DDS center in Marietta to get her son’s driver’s permit. She needed to use the public computer to access her account in order to print out her tax return to prove he was a dependent.

“Tried to delete it and wasn’t able to off of the computer,” she said.

She told 11Alive that a supervisor wasn’t much help either, and that’s why she contacted us.

We went in with a hidden camera and discovered all kinds of private and personal information on the computer for all to see.

Read more on 13WMAZ. They actually got DDS to issue and tell them a corrective action plan.

Category: ExposureGovernment Sector

Post navigation

← Patients Worried About Compromised Records At AnMed
Papen And Morales Call For Patient Information Security After Behavioral Health Audit →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.