DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Lower Merion School District says a data breach was caused by a computer glitch (1)

Posted on June 1, 2025June 2, 2025 by Dissent

DataBreaches cannot read “Lower Merion School District” without recalling the “Webcamgate” scandal of 2010, when the district was discovered monitoring students remotely in their bedrooms on district-issued MacBooks. At the time, they initially denied any misuse of remote access that was part of a security feature.

Now the district is back in local news in Pennsylvania. CBS Philadelphia reports:

The Lower Merion School District blamed a computer glitch after some confidential material was shared online. The district said it posted the information on a password-protected section of the website called BoardDocs. But people were still able to access the private documents. BoardDocs couldn’t say which documents were accessible, how long they were available or who may have seen them.

In other coverage, the district has reportedly removed all confidential docs from BoardDocs as a result of the incident.

But how was this a “computer glitch?” Is the district allegling that BoardDocs has or had a vulnerability? Or was this human error on the district’s part somehow?

DataBreaches emailed BoardDocs to ask about the alleged “computer glitch.” No reply was immediately provided, but DataBreaches will update this post when a reply is received.

Update 1: A fuller explanation of the breach involving BoardDocs was reported by The Philadelphia Inquirer.  Some details from that reporting:

  • The school district first learned of the breach on April 10, when it was contacted by a litigant in a legal proceeding unrelated to the breach.
  • The leaked documents included attorney-client privileged legal memos that discuss ongoing litigation, confidential employee information and issues involving students who are identified by their initials.
  • It remains unclear exactly how many internal Lower Merion documents were publicly accessible and for how long. The Inquirer obtained and reviewed a sample of confidential records from 2017 to 2024. Nor is it known whether the apparent bug could have impacted other school districts that use BoardDocs.

DataBreaches understands that Diligent, the company responsible for BoardDocs, has sent out letters to affected clients.  DataBreaches sent a second request to BoardDocs.


Related:

  • Report released on PowerSchool cyber attack
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
Category: Breach IncidentsEducation SectorExposureSubcontractorU.S.

Post navigation

← After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition
  • US Posts $10 Million Bounty for Iranian Hackers
  • South Korea police raid e-commerce giant Coupang over data leak; govt schedules hearing
  • FinCEN Report: Reported Ransomware Incidents and Payments Reached All-Time High in 2023
  • Leavenworth, Kansas cyberattack disrupts city services
  • They’ve escaped a lot of media attention, but Anubis RaaS is a threat to the medical sector (1)
  • “In the most expedient time possible…”
  • Portugal updates cybercrime law to exempt security researchers
  • LockBit 5’s “new secure blog domain” infra leaked already

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.