DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Glidewell notifies employees after security incident

Posted on September 14, 2015 by Dissent

James R. Glidewell, Dental Ceramics, Inc. and its subsidiaries (“Glidewell”) are notifying employees of a security incident.

According to a notification letter submitted to the California Attorney General’s Office, Glidewell learned that “an unauthorized individual may have taken certain documents and data maintained and/or owned by Glidewell, without Glidewell’s authorization.” The data theft occurred on February 28, and Glidewell discovered it on July 31, although those dates are not included in its notification to employees and only appear in the metadata submitted to California.

The letter does not indicate how Glidewell learned of the breach, but they note:

Based upon a forensic investigation conducted by outside data- security experts retained by Glidewell to assist in this matter, we believe that certain employee-personnel data may have been taken along with other Glidewell proprietary information, including your name, address, social security number, and financial account information relating to your direct deposit account.

The letter, signed by Gary Pritchard, Labor Counsel, indicates that Glidewell currently has no indication that there has been any misuse of the information, but asks employees to report any suspicious or fraudulent activity to Glidewell senior management in addition to others they may notify.

In response to the incident, Glidewell engaged outside forensic experts to assist them in developing an understanding of what took place and how. They also reported the incident to law enforcement and indicated that they will cooperate with appropriate authorities if and as a criminal investigation is undertaken.

Although the letter does not state that they suspect a former employee, statements in the letter hint at that possibility:

In the meantime, we are continuing to explore all available means of legal recourse and plan to pursue civil and/or injunctive relief, as may be appropriate. In light of this incident, we are reviewing our internal policies and protocols and are in the process of designing and implementing enhanced security measures to help prevent this type of incident from recurring in the future.

The firm is also offering its employees one year of complimentary fraud resolution and identity protection services with ProtectMyID.


Related:

  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: Business SectorU.S.

Post navigation

← FBI dumps on IoT security
Gov. Charlie Baker promises probe 
of E-ZPass hack risks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.