DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CA: San Juan Unified School District notifies parents of information security breach

Posted on March 8, 2014 by Dissent

Sharokina Shams reports:

Officials at a Sacramento school district are notifying parents that records containing personal identifying information were found at the Southern California home of a wire fraud suspect.

The San Juan Unified School District posted the information on its website Friday, one day after KCRA 3 informed the district that an FBI investigation had uncovered the materials at an address in Studio City.

How the records wound up there is still a mystery.

KCRA 3 uncovered the information in a criminal complaint filed by the FBI in federal court this week.

Read more on KCRA 3.

So the FBI uncovered evidence of a breach but didn’t notify the school district, who only found out from a diligent reporter? How many times have we seen this failure of the government to notify victims of a breach? When are we going to address this gap and assign responsibility to law enforcement to let victims know if their information is discovered in the course of a criminal investigation?

The district’s statement on their web site:

Important information about breach of District documents

According to a criminal complaint obtained by local media outlet KCRA 3, more than 50 “academic records” from San Juan Unified including personally identifiable information were found March 5 in a Southern California home. FBI agents recovered the documents when they served a search warrant in connection with a credit card fraud investigation. It’s unclear whether the documents in question relate to student, parent, employee or vendor personal information.

The matter was first brought to the attention of the District on March 6 when contacted by KCRA 3. In response the District is:

  • Reaching out to the FBI and requesting additional information to identify the specific documents in question so the District can notify those impacted and determine how the documents might have made their way to the Southern California home;
  • Reviewing the criminal report provided by KCRA 3 and checking all names, addresses and phone numbers for connections with students, parents, employees, or vendors;
  • Notifying our community of the reported breach via messages on our Web site, employee intranet and upcoming e-newsletters.
  • Committing to keeping our community informed of any developments and notifying those whose information may have been contained in the documents as that information is known.

“This report is very troubling and we are working to obtain additional information so that we can determine the details and scope of this breach,” said Interim Superintendent Kent Kern. “In recent years, we have worked hard to reduce the amount of personal information kept on file, such as social security numbers. We will continue that those efforts and work to ensure we are doing everything possible to prevent this type of incident from happening again.”

Identity theft and financial fraud continue to be a growing criminal problem. In 2012, an estimated 16.6 million people, or 7 percent of those over age 16 in the U.S., experienced identity theft or fraud according to U.S. Department of Justice statistics. Visit the California Attorney General’s Top 10 Tips for Identity Theft Protection or any of the resources linked below to see how you can protect yourself. If you find any evidence that you have been the victim of identity theft it is vital to notify your local police immediately.

Updates to this situation will be posted as they become available at http://www.sanjuan.edu/identitytheft. You may also call the Community Relations Office at (916) 979-8281 for updates or with questions.

Additional resources: 
FTC Consumer Website – http://www.consumer.ftc.gov/features/feature-0014-identity-theft
FDIC – http://www.fdic.gov/consumers/theft/National Crime Prevention Council – http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft
California Office of the Attorney General – https://oag.ca.gov/idtheft

This is not the first breach involving this school district. In May 2011, thousands of employees discovered their information had been exposed online by an an employee who accidentally updated the data to her church’s website.

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
Category: Education SectorID TheftU.S.

Post navigation

← Audit finds high-risk security vulnerabilities in the automated systems used to process Medicaid claims
The Timken Company notifying 5,000 associates after data exposed on insecure server →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.