DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ca: Electronic devices containing bureaucrats’ personal information stolen from government office

Posted on August 6, 2015 by Dissent

It’s probably diagnostic that I still get excited when I see a report that data on stolen devices were encrypted.

Michael Woods reports:

Someone broke in to a government building earlier this year and made off with electronic devices containing the personal information of 260 government workers, newly released documents show – a privacy breach that is only now coming to light.

Documents obtained by Metro under the Access to Information Act reveal the stolen devices contained employees’ performance agreements, grievances, travel records and other personnel files. But Public Works and Government Services Canada calls the risk of its employees’ personal information being compromised “very low” because the devices stolen from one of its offices were encrypted.

The details of the previously unreported breach are spelled out in a May 1 memo to the department’s deputy minister and an accompanying Privacy Act breach report.

The documents reveal that someone gained access to a Public Works office on the ninth floor of Edmonton’s ATB Plaza at around 6:15 p.m. on Friday, March 27.

Read more on Metro News.

The employees were not notified of the breach – or haven’t been notified yet – because the agency was waiting to hear back from the privacy commissioner’s office with their input as to whether notification was recommended.

 

Category: Government SectorNon-U.S.Theft

Post navigation

← The Federal Government Expects to Spend $500M on Post-Hack Benefits by 2020
UK: ICO issues £180,000 civil monetary penalty in wake of data breaches →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6
  • Official Indiana .gov email addresses are phishing residents
  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.