DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CA: Humboldt County Notice of Data Breach

Posted on May 4, 2016 by Dissent

May 2, 2016

The County of Humboldt announced today that five computer terminals used by the public in an office on the fifth floor of the county courthouse were misconfigured by a third-party software provider, potentially allowing access to limited confidential information.

On April 4, 2016, the county learned that individuals accessing parcel information in the fifth floor office may have been able to access certain information typically accessible only to county staff. Upon learning this, the county immediately launched an internal investigation and worked with its third-party software provider who maintains the software used on the terminals. The investigation determined that when the county upgraded its property assessment software last year, five computer terminals on the fifth floor of the county courthouse were misconfigured by a third-party software provider to allow access to additional non-public information.

Individuals who viewed parcel information from one of the misconfigured computer terminals may have been able to access confidential information, including the parcel owner’s name and Social Security number. However, access to these computers is monitored by staff and, to date, the county has no evidence that any information has been used improperly or even accessed as a result of this incident. Moreover, the affected computers are not permitted to access the internet and the USB ports are disabled, further limiting the ability for someone to download or email information externally. Still, as precaution, we are posting a website notification with more information. The website notice includes a number to call if an individual believes they may be affected by this incident or if they have any questions.

“Even though there was probably pretty limited exposure here, we take these issues very seriously because we’re dealing with people and their personal information,” said Rex Bohn, First District Supervisor. “Regardless of how few computers could access the information or how likely it was that people even noticed it, the bottom line is this information needs to be protected. That’s our top priority.”

To help prevent a similar incident from reoccurring, we have already taken steps to enhance the security of our public terminals and correct the misconfiguration by our third-party provider. Going forward, we are running checks of our existing publicly accessible software and instituting additional measures to ensure security concerns are addressed on any new or upgraded programs.

Website Notification of Data Breach

SOURCE: Humboldt County

Category: ExposureGovernment SectorSubcontractorU.S.

Post navigation

← FL: Owner of Vanguard Cybersecurity arrested for hacking into state, Lee elections websites
Romanian hacker Guccifer: I breached Clinton server, ‘it was easy’ →

2 thoughts on “CA: Humboldt County Notice of Data Breach”

  1. Regret says:
    May 5, 2016 at 3:25 pm

    I suspect that this can go into the category of “quit using SSN as a national ID number.” At this point, we’d be better to just assume that the SSN is completely public information and start over.

    1. Dissent says:
      May 5, 2016 at 5:38 pm

      Some of that have been arguing that for a decade now….. 🙁

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report