DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MN: Dakota County Notifies 1,000 Clients After Employee Email Account Hacked

Posted on April 12, 2019 by Dissent

HASTINGS, Minn., April 12, 2019 /PRNewswire/ –Dakota County has become aware of a data security incident that involved protected health information maintained by the Dakota County Social Services Department. Dakota County has sent notification letters to the potentially impacted individuals to notify them of this incident and to provide resources to assist them.

On February 13, 2019,Dakota County learned that an email account belonging to one of its employees was accessed without authorization. Upon learning of this incident,Dakota County took steps to further secure its email system and network, including resetting the passwords on all employee email accounts and setting up an additional layer of authentication for remote access to the Dakota County network. Dakota County also launched an investigation and engaged independent cybersecurity experts to provide assistance. On March 27, 2019, as a result of this investigation,Dakota County learned that some of those messages within the impacted email account contained private information belonging to approximately 1,000 current and former clients of Dakota County. The private information may have included names, addresses, driver’s license numbers, Social Security numbers, health insurance information, and/or medical history, treatment, or diagnoses information.

Dakota County is not aware that any of the private information involved in this incident has been misused.Dakota County takes the security of all information very seriously and is implementing additional security measures to prevent a similar occurrence in the future.

Notification letters were sent to all potentially impacted individuals on April 12, 2019. The letters include information about this incident and about steps that potentially impacted individuals can take to monitor and help protect their private information. Dakota County has established a toll-free call center to answer questions about the incident and to address related concerns. The call center is available Monday through Friday from 8:00 a.m. to 7:00 p.m. Central Time and can be reached at 1-800-939-4170. In addition, as a precaution,Dakota County is offering complimentary identity protection services through ID Experts to potentially impacted individuals.Dakota County also notified the U.S. Health and Human Services Office for Civil Rights and consumer reporting agencies of this incident.

The privacy and protection of private information is a top priority for Dakota County. Dakota County deeply regrets any inconvenience or concern this incident may cause.

SOURCE Dakota County


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← MD Anderson Cancer Center Appeals $4.3 Million HIPAA Fine
UT fired counselor accused of disclosing student’s PTSD →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.