DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MO: Parking company issues cardholder security breach at Union Station

Posted on December 11, 2014 by Dissent

KPLR reports:

A security breach at the Union Station parking lot could cause a lot of headaches this Holiday season.

St. Louis Parking Company reveled (sic) Wednesday that security for users of credit and debit cards at the parking lot have had their card information compromised. The company says the breach occurred from October 6th through October 31st of 2014.

Since the breach St. Louis Parking Company has isolated the server affected and placed additional security measures in place. The breach at Union Station does not affect other parking facilities in St. Louis.

Read more on KPLR.

In a statement on their web site, SLPC writes:

St. Louis Parking Company recently learned of a security incident involving credit and debit card data collected at its Union Station Parking Facility between October 6, 2014 and October 31, 2014. Customers who utilized the public parking facility at Union Station could have had their credit card information compromised.

As soon as the breach was discovered, the affected server was isolated and security measures were put in place to eliminate any further compromise of data. The breach was isolated to the public parking lot and did not affect any other concessions. St. Louis Parking Company is asking any customers who used their credit or debit card to exit the parking facility between October 6th and October 31st to closely monitor their accounts. If customers notice any fraudulent activity they should notify the issuing bank or financial institution and St. Louis Parking Company at 314-241-7777 extension 11.

St. Louis Parking Company, the Parking Operator at Union Station, is working with Datapark, the manufacturer of the revenue controls system, to investigate the situation per the Payment Card Industry Data Security Standard. Third party forensic experts have been hired to assist with the investigation. The security compromise has been contained, and customers can use their credit and debit cards at the public parking facilities at Union Station. St. Louis Parking Company will continue to post relevant consumer updates on its website: www.stlouisparking.com.

St. Louis Parking Company is an autonomous company, and is wholly responsible for operating the parking facilities at Union Station. Union Station and Union Station Doubletree Hotel are separate, distinct corporate entities from St. Louis Parking Company. All inquiries concerning this matter should be directed to St. Louis Parking Company.

MORE INFORMATION ON WAYS TO PROTECT YOURSELF

We recommend that you remain vigilant by reviewing your account statements and credit reports for any unauthorized activity. You may obtain a copy of your credit report, free of charge, once every 12 months from each of the three nationwide credit reporting companies. To order your annual free credit report please visit www.annualcreditreport.com or call toll free at 1-877-322-8228. Contact information for the three nationwide consumer reporting agencies is as follows:

Equifax
PO Box 740256
Atlanta, GA 30374
www.equifax.com
1-800-525-6285

TransUnion
PO Box 2000
Chester, PA 19022
www.transunion.com/fraud
1-800-680-7289

Experian
PO Box 9554
Allen, TX 75013
www.experian.com
1-888-397-3742

Category: Business Sector

Post navigation

← Target to Make No Harm-No Foul Argument in Breach Suit
Ca: No more snooping into health records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.