DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More than 10,000 medical marijuana establishment agent applicants in Nevada had their personal info exposed online

Posted on December 28, 2016 by Dissent

Another day, another leak.

It appears a security researcher who searches for leaks on public FTP servers has uncovered another leak involving personal information. This time, it’s the personal information of 11,771 individuals who applied to the State of Nevada Medical Marijuana Program to become an agent for a medical marijuana establishment (MME).

The researcher announced his finding on Twitter and sent a message to this site, seemingly thinking that it was medical information on patients, which it is not. Under Nevada law, “a Medical marijuana establishment agent” means an “owner, officer, board member, employee or volunteer of a medical marijuana establishment, an independent contractor who provides labor relating to the cultivation or processing of marijuana or the production of usable marijuana, edible marijuana products or marijuana-infused products for a medical marijuana establishment or an employee of such an independent contractor. “(NRS 453A.117)

Although not patient data, the wealth of personal information on the applicants makes this a concerning leak. The application forms include the applicants’ name, position, physical and mailing addresses, date of birth, Social Security number, telephone number, citizenship, hair and eye color, height and weight, and their driver’s license numbers. Applicants also also submit their photos and signatures, which do not appear to be in the exposed files. Applications for fingerprinting or notation that fingerprints are on file are also included, as the following screenshot, redacted by DataBreaches.net, shows:

Application to become an MME agent for State of Nevada. Redacted by DataBreaches.net.

Simple url manipulation would allow people to obtain applications, allowing for potential scraping and acquisition of all the data.

DataBreaches.net verified that the data in an exposed application was valid via a voter records check on the named individual. Andrew Couts of The Daily Dot also reported that he had verified the accuracy of the data.

The state’s Medical Marijuana Program is under the Department of Health and Human Services Division of Public and Behavioral Health.

DataBreaches.net contacted the state and in addition to leaving voicemails with their IT security and DHHS, spoke with someone on their 24-hour security helpdesk who indicated they would escalate the message about the exposed files. Approximately one hour later, the files were no longer accessible.

This report will be updated as more information becomes available.

Update: Zack Whittaker got confirmation from a spokesperson that applicants will be notified in the next few days.

 

 

 

Category: Breach IncidentsExposure

Post navigation

← Oilpro.Com Founder Pleads Guilty to Hacking Competitor
NH Department of Health & Human Services hacked; 15,000 affected (UPDATED) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
  • HHS OCR Settles HIPAA Security Rule Investigation of BayCare Health System for $800k and Corrective Action Plan

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.