DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Aetna employee arrested; found in possession of members’ identity information

Posted on March 28, 2015 by Dissent

Aetna Insurance has also reported a breach in recent months, but unlike the Anthem and Premera Blue Cross breaches, the Aetna breach does not appear to have been a massive one.

In a letter dated January 8, the insurance company notified the Maryland Attorney General’s Office that six Maryland residents were among those being notified that their information had been found in the possession of a former employee who had been arrested in Florida. The data theft was reported to Aetna by the IRS.

As Aetna explains:

On December 2, 2014, Aetna’s Investigative Services unit received notification from the IRS that a former Aetna employee had been arrested in Florida. The arrest took place in April 2014. The individual stopped working for Aetna in August 2013. The former employee’s personal cell phone was confiscated and pictures of screen shots from Aetna computer screens were found on it. The IRS has the cell phone and is conducting a criminal investigation of possible identity theft. The IRS also provided copies of the cell phone pictures to Aetna.

So it appears the data theft had occurred before August 2013 but was never detected (somewhat understandably if these were screen shots taken from a computer). Why law enforcement delayed over 7 months before notifying Aetna was not explained.

Aetna’s Investigative Services unit reviewed the pictures and found that 133 Aetna disability members had their name, date of birth, social security number and employer name captured in the screen shots.

Some of the pictures were blurry and only certain fields could be read by our investigators. However, in late December, by cross referencing information in our systems, we were able to recreate the data on the pictures. While it is unlikely that all members’ information was legible enough to be at risk, all of them are being notified of the incident and offered free credit monitoring services.

Aetna made a point of noting that they had conducted a criminal background investigation before hiring the employee in 2007. “A subsequent background check revealed no criminal activity for this employee from 2007 to August 2013, when she left our employ,” Aetna’s Chief Privacy Officer reports.

This is not the first time we’ve seen insiders take screenshots of computer screens for an ID theft scheme (cf, this case or  this case). I’d be curious to see what hospitals are doing to prevent this type of data theft.

Related: Notification letter template and notification template, Page 2

No related posts.

Category: Health DataID TheftInsiderU.S.

Post navigation

← Stolen Uber Customer Accounts Are for Sale on the Dark Web for $1
Nite Ize notifies consumers after hack at services provider →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.