DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Arkansas Blue Cross and Blue Shield offering credit protection to members affected by computer theft

Posted on July 14, 2015 by Dissent

From ABCBS:

Arkansas Blue Cross and Blue Shield is taking steps to protect its members and applicants from identity theft after an independent insurance agency was broken into last month. Treat Insurance Agency reported a break-in at its North Little Rock office on June 16, 2015. Two computers, which stored information from 560 Arkansas Blue Cross applicants and members dating back to October 1, 2012, were reported stolen.

As an independent insurance agency, Treat Insurance Agency solicits applications from individuals for insurance coverage through multiple insurers, including Arkansas Blue Cross. The computers contained personal information of people who had applied for insurance through the multiple carriers. There has been no arrest or recovery of the computers, so it is unknown whether the thieves have accessed or attempted to use any of the personal information stored on the computers.

Read more on THV11. Keep in mind that ABCBS is not the only insurer whose members will have been impacted by this computer theft, but so far, I’m not seeing any press notices from any other insurer.

Category: Health DataSubcontractorTheftU.S.

Post navigation

← Google accidentally reveals data on ‘right to be forgotten’ requests
Blue Cross Blue Shield Association to offer all members nationwide free identity theft protection service →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.