DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CA: Humboldt County Notice of Data Breach

Posted on May 4, 2016 by Dissent

May 2, 2016

The County of Humboldt announced today that five computer terminals used by the public in an office on the fifth floor of the county courthouse were misconfigured by a third-party software provider, potentially allowing access to limited confidential information.

On April 4, 2016, the county learned that individuals accessing parcel information in the fifth floor office may have been able to access certain information typically accessible only to county staff. Upon learning this, the county immediately launched an internal investigation and worked with its third-party software provider who maintains the software used on the terminals. The investigation determined that when the county upgraded its property assessment software last year, five computer terminals on the fifth floor of the county courthouse were misconfigured by a third-party software provider to allow access to additional non-public information.

Individuals who viewed parcel information from one of the misconfigured computer terminals may have been able to access confidential information, including the parcel owner’s name and Social Security number. However, access to these computers is monitored by staff and, to date, the county has no evidence that any information has been used improperly or even accessed as a result of this incident. Moreover, the affected computers are not permitted to access the internet and the USB ports are disabled, further limiting the ability for someone to download or email information externally. Still, as precaution, we are posting a website notification with more information. The website notice includes a number to call if an individual believes they may be affected by this incident or if they have any questions.

“Even though there was probably pretty limited exposure here, we take these issues very seriously because we’re dealing with people and their personal information,” said Rex Bohn, First District Supervisor. “Regardless of how few computers could access the information or how likely it was that people even noticed it, the bottom line is this information needs to be protected. That’s our top priority.”

To help prevent a similar incident from reoccurring, we have already taken steps to enhance the security of our public terminals and correct the misconfiguration by our third-party provider. Going forward, we are running checks of our existing publicly accessible software and instituting additional measures to ensure security concerns are addressed on any new or upgraded programs.

Website Notification of Data Breach

SOURCE: Humboldt County

Category: ExposureGovernment SectorSubcontractorU.S.

Post navigation

← FL: Owner of Vanguard Cybersecurity arrested for hacking into state, Lee elections websites
Romanian hacker Guccifer: I breached Clinton server, ‘it was easy’ →

2 thoughts on “CA: Humboldt County Notice of Data Breach”

  1. Regret says:
    May 5, 2016 at 3:25 pm

    I suspect that this can go into the category of “quit using SSN as a national ID number.” At this point, we’d be better to just assume that the SSN is completely public information and start over.

    1. Dissent says:
      May 5, 2016 at 5:38 pm

      Some of that have been arguing that for a decade now….. 🙁

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.