DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Aetna employee arrested; found in possession of members’ identity information

Posted on March 28, 2015 by Dissent

Aetna Insurance has also reported a breach in recent months, but unlike the Anthem and Premera Blue Cross breaches, the Aetna breach does not appear to have been a massive one.

In a letter dated January 8, the insurance company notified the Maryland Attorney General’s Office that six Maryland residents were among those being notified that their information had been found in the possession of a former employee who had been arrested in Florida. The data theft was reported to Aetna by the IRS.

As Aetna explains:

On December 2, 2014, Aetna’s Investigative Services unit received notification from the IRS that a former Aetna employee had been arrested in Florida. The arrest took place in April 2014. The individual stopped working for Aetna in August 2013. The former employee’s personal cell phone was confiscated and pictures of screen shots from Aetna computer screens were found on it. The IRS has the cell phone and is conducting a criminal investigation of possible identity theft. The IRS also provided copies of the cell phone pictures to Aetna.

So it appears the data theft had occurred before August 2013 but was never detected (somewhat understandably if these were screen shots taken from a computer). Why law enforcement delayed over 7 months before notifying Aetna was not explained.

Aetna’s Investigative Services unit reviewed the pictures and found that 133 Aetna disability members had their name, date of birth, social security number and employer name captured in the screen shots.

Some of the pictures were blurry and only certain fields could be read by our investigators. However, in late December, by cross referencing information in our systems, we were able to recreate the data on the pictures. While it is unlikely that all members’ information was legible enough to be at risk, all of them are being notified of the incident and offered free credit monitoring services.

Aetna made a point of noting that they had conducted a criminal background investigation before hiring the employee in 2007. “A subsequent background check revealed no criminal activity for this employee from 2007 to August 2013, when she left our employ,” Aetna’s Chief Privacy Officer reports.

This is not the first time we’ve seen insiders take screenshots of computer screens for an ID theft scheme (cf, this case or  this case). I’d be curious to see what hospitals are doing to prevent this type of data theft.

Related: Notification letter template and notification template, Page 2

Category: Health DataID TheftInsiderU.S.

Post navigation

← Stolen Uber Customer Accounts Are for Sale on the Dark Web for $1
Nite Ize notifies consumers after hack at services provider →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • MathWorks, Creator of MATLAB, Confirms Ransomware Attack
  • Russian hospital programmer gets 14 years for leaking soldier data to Ukraine
  • MSCS board renews contract with PowerSchool while suing them
  • Iranian Man Pleaded Guilty to Role in Robbinhood Ransomware
  • Developments surrounding data breach at Dutch police
  • Estonia launches international search for Moroccan citizen wanted over data theft
  • Now it’s Tiffany: Another LVMH luxury brand hit by hackers
  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report