DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

This Israeli Helped One of the World’s Biggest Jewish Organizations – Now He’s in Trouble

Posted on May 2, 2022 by Dissent

Ran Bar-Zik reports what sounds like a situation where a cybersecurity student who engaged in responsible disclosure after finding a leak at the scholarship application website of the American Joint Distribution Committee (“the Joint”) felt pressured and anxious by the Joint trying to get him to sign a statement afterwards. And so far, he hasn’t signed it, it seems.

Representatives of the Joint stress that they had told him he could edit or amend the statement to make it comfortable for him to sign:

“With regard to Shmuel Lenchner, he was contacted by phone and asked to delete the material and not to make use of it. In addition, he was sent a draft of a statement that he would act accordingly. He was explicitly informed and in writing that he could amend the text to the extent that he found it proper so that he would feel comfortable with the statement, but since then, his response has not been received.”

Okay, but having been in that situation myself numerous times, I would point out that he is under no obligation to provide any signed statement for them at all, is there?  Is there some legal obligation in Israel? An ethical one? What?  Did the Joint provide a draft statement that explicitly waived any action against him? Without any assurance, why would he sign anything?

DataBreaches has signed statements in some cases, and I know Jelle Ursem has also been asked to provide statements in some leaks we have reported together. I also know that I have not signed statements in some cases. This is where the approach of the entity or their counsel really matters.

Providing a statement helps an entity cover themselves for insurance or litigation purposes. But taking a threatening or heavy-handed approach to getting a statement, may not be  successful (the Joint says they told him he could edit it, but maybe even that wasn’t non-threatening enough?).

Based on my experiences, which may not be valid for others, one of the more effective approaches was when counsel for one firm contacted me, didn’t come across as threatening any legal action at all, and said they would be happy to provide me with a subscription to software that would provide military-grade destruction of any files of theirs that might be on my system.  I took them up on that offer after editing their draft statement a bit. As a result of how they handled it, they got a signed statement, their files were destroyed securely, and they got the report showing the secure destruction of files. And I wound up with a one-year subscription to a service to securely destroy files. And it was all very non-threatening.

You can read the sequence and details of this Israelis incident at Haaretz. Maybe the Joint could try again. The student obviously didn’t engage in responsible disclosure for a reward, but he sure as heck didn’t want to feel that he might get into trouble for doing the right thing on that.

 

 

No related posts.

Category: Commentaries and AnalysesExposureNon-U.S.

Post navigation

← Mozilla finds mental health apps fail ‘spectacularly’ at user security, data policies
Health startup myNurse to shut down after data breach exposed health records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.