DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Lower Merion School District says a data breach was caused by a computer glitch (1)

Posted on June 1, 2025June 2, 2025 by Dissent

DataBreaches cannot read “Lower Merion School District” without recalling the “Webcamgate” scandal of 2010, when the district was discovered monitoring students remotely in their bedrooms on district-issued MacBooks. At the time, they initially denied any misuse of remote access that was part of a security feature.

Now the district is back in local news in Pennsylvania. CBS Philadelphia reports:

The Lower Merion School District blamed a computer glitch after some confidential material was shared online. The district said it posted the information on a password-protected section of the website called BoardDocs. But people were still able to access the private documents. BoardDocs couldn’t say which documents were accessible, how long they were available or who may have seen them.

In other coverage, the district has reportedly removed all confidential docs from BoardDocs as a result of the incident.

But how was this a “computer glitch?” Is the district allegling that BoardDocs has or had a vulnerability? Or was this human error on the district’s part somehow?

DataBreaches emailed BoardDocs to ask about the alleged “computer glitch.” No reply was immediately provided, but DataBreaches will update this post when a reply is received.

Update 1: A fuller explanation of the breach involving BoardDocs was reported by The Philadelphia Inquirer.  Some details from that reporting:

  • The school district first learned of the breach on April 10, when it was contacted by a litigant in a legal proceeding unrelated to the breach.
  • The leaked documents included attorney-client privileged legal memos that discuss ongoing litigation, confidential employee information and issues involving students who are identified by their initials.
  • It remains unclear exactly how many internal Lower Merion documents were publicly accessible and for how long. The Inquirer obtained and reviewed a sample of confidential records from 2017 to 2024. Nor is it known whether the apparent bug could have impacted other school districts that use BoardDocs.

DataBreaches understands that Diligent, the company responsible for BoardDocs, has sent out letters to affected clients.  DataBreaches sent a second request to BoardDocs.

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
Category: Breach IncidentsEducation SectorExposureSubcontractorU.S.

Post navigation

← After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.