DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

W.J. Bradley Mortgage Capital notifies clients after employee took their information to her new employer

Posted on December 20, 2013 by Dissent

Some companies shield others’ names in their breach notifications. Others are not averse to naming names. Consider this breach notification from W.J. Bradley Mortgage Capital:

The purpose of this letter is to notify you of a breach of some personal information that you disclosed to W.J. Bradley Mortgage Capital, LLC (“WJB”) in connection with a loan transaction. While this personal information was taken from WJB’s computer systems, we believe that it has been contained, not distributed to the public at large, that WJB has retrieved the information, and that such information was scrubbed from the offending parties’ systems.

During late July and early August 2013, one of WJB’s former loan officers, Shelly Logemann (“Ms. Logemann”), in concert with another mortgage company, RPM Mortgage, Inc. (“RPM”) took files from WJB’s computer systems, including some of your personal data while she was still employed with WJB. Specifically, the following items were taken: credit reports, social security numbers, bank account information, tax information and other private information contained in loan applications.

After discovering Ms. Logemann and RPM’s breach, WJB obtained a court order requiring the return of all private customer information to WJB, prohibiting the defendants from sending that information to others, and requiring that Ms. Logemann and RPM destroy all copies of the information in their possession. WJB was only recently able to confirm that your personal data was involved in this concerning incident.

You can read the rest of their December 20th breach notification letter to affected clients here (pdf).

The letter doesn’t explain when WJB first learned of the breach or how they learned of it, or why it took so long for them to figure out whose data were involved. Nor does the letter indicate whether RPM Mortgage had any knowledge of the employee’s actions. If someone has access to the court records and would like to provide more details, use the Comments section below.


Related:

  • California hospitals can escape fines if workers expose patient info
  • Harris Health discloses insider-wrongdoing breach that went on for a decade
  • Flagstar Agrees to $31.5 Million Deal in Accellion-Breach Suit
  • Lotte Card reissues 650,000 cards after data leak, protects 1.28 million customers
  • NY DFS Superintendent Adrienne A. Harris Extends Blockchain Analytics Guidance to New York State Banking Organizations
  • KR: Lotte Card hack exposes data of 3 million users
Category: Financial SectorInsider

Post navigation

← Danner hacked; notifies customers (updated)
Affinity Gaming announces breach affecting all 11 casinos; fraudulent charges reported →

1 thought on “W.J. Bradley Mortgage Capital notifies clients after employee took their information to her new employer”

  1. Gary Scannell says:
    December 29, 2013 at 1:07 am

    The questions above are great questions that I would like to see the answers too. The Logemann group and RPM mortgage website state that “customer service and integrity” are their hallmarks in business

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Gates Down: Third Circuit Says Breaking Employer Computer Access Policies Is Not Hacking
  • Short-term renewal of cyber information sharing law appears in bill to end shutdown
  • Yanluowang ransomware IAB pleads guilty
  • Lawsuit Alleges Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
  • HIPAA, but for non-Covered Entities?
  • Manassas City Public Schools close on Monday due to cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.