DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NH: Litchfield School District employee wrongdoing created student data security incident

Posted on March 14, 2022 by Dissent

On January 19, 2022, the Litchfield School District in New Hampshire notified the state’s Attorney General of a data security/privacy incident that seems to have previously escaped this site’s awareness. Let’s correct that now.  From their report:

On December 6, 2021, the District discovered that an individual with authority to access student records exceeded their authority by sharing certain student records to their personal email account. This occurred on or around September 14, 2021 by adjusting privacy settings related to the records such that others within the School District could have accessed the records between September 14, 2021 and December 8, 2021.

The investigation did not uncover any other instances of improper access to the records or misuse of the data, and

Based on a review of the affected documents, it does not appear that data such as Social Security numbers, financial account information, or driver’s license numbers were implicated in this breach. However, the breach impacted various special education documents, which may include student names and one or more of the following: dates of birth, addresses, and SASID numbers.

Approximately 630 New Hampshire residents, students of the District, may have been affected by this incident of which 198 fell into the group of special education documents involved.  The remaining students’ compromised data included certain electronically stored school assignments, but those files or records did not contain similarly sensitive information.

Notice was provided to the 198 residents on December 28, 2021. The remaining residents were to be notified on or about January 21, 2022.

The notification did not explain why the employee transferred the files to personal email — was it to enable them to continue completing work at home? Given the nature of the information and the fact that the district did not report disciplining or firing any employee but (merely) “Reminding staff of the School District’s privacy and security practices and expectations,” it seems like the employee violated policies and procedures and left the door open for a more major breach that thankfully, didn’t happen.

 


Related:

  • Commentary: Repeated insider breaches at TD Bank should trigger federal regulator investigation (update 1)
  • Kept in the Dark -- Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • Audits of New York schools and the State Education Department reveal ongoing significant concerns
  • Pysa shuttered its leak site before it ever dumped data from more than half a dozen schools. Here's what we know so far.
  • LPL Financial reports theft of computers
Category: Education SectorInsiderU.S.

Post navigation

← The Human Factor in Data Security Breaches
Ukrainian hackers say HackerOne is blocking their bug bounty payouts (updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.