DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MO: Parking company issues cardholder security breach at Union Station

Posted on December 11, 2014 by Dissent

KPLR reports:

A security breach at the Union Station parking lot could cause a lot of headaches this Holiday season.

St. Louis Parking Company reveled (sic) Wednesday that security for users of credit and debit cards at the parking lot have had their card information compromised. The company says the breach occurred from October 6th through October 31st of 2014.

Since the breach St. Louis Parking Company has isolated the server affected and placed additional security measures in place. The breach at Union Station does not affect other parking facilities in St. Louis.

Read more on KPLR.

In a statement on their web site, SLPC writes:

St. Louis Parking Company recently learned of a security incident involving credit and debit card data collected at its Union Station Parking Facility between October 6, 2014 and October 31, 2014. Customers who utilized the public parking facility at Union Station could have had their credit card information compromised.

As soon as the breach was discovered, the affected server was isolated and security measures were put in place to eliminate any further compromise of data. The breach was isolated to the public parking lot and did not affect any other concessions. St. Louis Parking Company is asking any customers who used their credit or debit card to exit the parking facility between October 6th and October 31st to closely monitor their accounts. If customers notice any fraudulent activity they should notify the issuing bank or financial institution and St. Louis Parking Company at 314-241-7777 extension 11.

St. Louis Parking Company, the Parking Operator at Union Station, is working with Datapark, the manufacturer of the revenue controls system, to investigate the situation per the Payment Card Industry Data Security Standard. Third party forensic experts have been hired to assist with the investigation. The security compromise has been contained, and customers can use their credit and debit cards at the public parking facilities at Union Station. St. Louis Parking Company will continue to post relevant consumer updates on its website: www.stlouisparking.com.

St. Louis Parking Company is an autonomous company, and is wholly responsible for operating the parking facilities at Union Station. Union Station and Union Station Doubletree Hotel are separate, distinct corporate entities from St. Louis Parking Company. All inquiries concerning this matter should be directed to St. Louis Parking Company.

MORE INFORMATION ON WAYS TO PROTECT YOURSELF

We recommend that you remain vigilant by reviewing your account statements and credit reports for any unauthorized activity. You may obtain a copy of your credit report, free of charge, once every 12 months from each of the three nationwide credit reporting companies. To order your annual free credit report please visit www.annualcreditreport.com or call toll free at 1-877-322-8228. Contact information for the three nationwide consumer reporting agencies is as follows:

Equifax
PO Box 740256
Atlanta, GA 30374
www.equifax.com
1-800-525-6285

TransUnion
PO Box 2000
Chester, PA 19022
www.transunion.com/fraud
1-800-680-7289

Experian
PO Box 9554
Allen, TX 75013
www.experian.com
1-888-397-3742

Category: Business Sector

Post navigation

← Target to Make No Harm-No Foul Argument in Breach Suit
Ca: No more snooping into health records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.