DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Indiana University notifying 146,000 current & former students that details were accessed by webcrawlers over 11-month period

Posted on February 25, 2014 by Dissent

Indiana University issued the following statement today:

Indiana University notified the Indiana attorney general’s office today of the potential exposure of personal data for some students and recent graduates.

The data potentially at risk for disclosure includes names, addresses and Social Security numbers for approximately 146,000 students and recent graduates across seven IU campuses who attended the university from 2011 to 2014.

Unlike recent high-profile data breaches, however, no servers or systems were compromised. The information was not downloaded by an unauthorized individual looking for specific sensitive data, but rather was accessed by three automated computer data mining applications, called webcrawlers, used to improve Web search capabilities.

Immediately upon discovering the potential issue, IU secured the data, and the university has no evidence that the files have been viewed or used for inappropriate or illegal purposes. As a precaution, however, the university will begin notifying all affected students of the possible data exposure this week.

“IU takes the security of all its data, especially the personal information of its students, extremely seriously and apologizes for any concern this issue may cause among our students and their families,” said John Applegate, executive vice president for university academic affairs. “The university also is committed to assisting those whose information was potentially exposed.”

In addition to notifying those affected by the potential exposure, IU is taking the following steps to minimize the potential impact of this incident:

  • The university will set up a call center to handle questions from anyone whose information was potentially placed at risk as a result of this situation. That center will be operational no later than 8 a.m. EST on Friday, Feb. 28, at 866-254-1484.
  • A website with information on how to monitor one’s credit accounts and with answers to other questions regarding the potential data exposure has been established at https://apps.usss.iu.edu/usss-data-exposure/faq.cfm.
  • To assist with credit monitoring, IU will supply the Social Security numbers and names of those potentially affected to all three major credit-reporting agencies.

The university discovered late last week that the data had been stored in an insecure location for the past 11 months. The issue was discovered by a staff member of the university registrar’s office who accessed the files in question for internal use. The site was immediately locked down, and the information was moved to a secure location the following day.

It was determined that a change in the security protections for the site that housed the information, made in March 2013, inadvertently allowed the site to be accessed without the necessary authentication. A subsequent review of access logs late last week determined that the data in question had been downloaded only by the three automated webcrawling programs. The files in question were safeguarded to mask the nature of the data contained in them.

“This is not a case of a targeted attempt to obtain data for illegal purposes, and we believe the chance of sensitive data falling into the wrong hands as a result of this situation is remote,” said James Kennedy, associate vice president for financial aid and university student services and systems. “At the same time, we have moved quickly to secure the data and are conducting a thorough investigation into our information handling process to ensure that this doesn’t happen again.”


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Education SectorExposureOf NoteU.S.

Post navigation

← MI: Hackers target Carson City Village Market, credit card info stolen and misused
Lawsuits against Target continue to be filed in wake of breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.