DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Montana Tech Takes Precautionary Measures Following Email Release Of Personal Data

Posted on April 28, 2010 by Dissent

From their announcement:

Montana Tech of the University of Montana administrators are notifying students and alumni whose personal information was released in an e-mail message sent out to the Montana Tech campus community late last week.

On April 22, 2010, an email message containing sensitive personal information such as name, social security number, address, phone number, and in some cases date of birth was inadvertently sent out to all Montana Tech faculty, staff, and students.

“We are treating this matter very seriously and are taking all measures to safeguard the personal information of those affected,” noted Chancellor Frank Gilmore. “We have recalled the email message, reviewed procedures to ensure that a similar incident does not occur in the future, and investigated methods to protect the credit of those affected. The University is working diligently to address problems caused by this incident and any further implications it might have.”

According to University officials, the email contained sensitive information for approximately 260 individuals. “Our major concern at this point is protecting the personal information of those involved,” Gilmore explained. To that end, University officials have attempted to contact—via phone, email, and/or letters—all those affected. In addition, Montana Tech has created a website to provide information and assist those affected in protecting their personal information at www.mtech.edu/incident.

Montana Tech does want individuals to be aware of any phone calls, e-mails, and other communications from individuals claiming to be from Montana Tech or other official sources, asking for their personal information or verification of it. This is often referred to as information solicitation. Montana Tech, other governmental agencies, and other legitimate organizations will not contact individuals to ask for or to confirm personal information without appropriate identification.

For more information, please contact Maggie Peterson at 496-4316 or Amanda Badovinac at 406-496-4828.

Source: Montana Tech, the University of Montana

Related: Letter to Those Affected

The Associated Press adds:

Montana Tech administrator Maggie Peterson says the e-mail was an invitation to watch students present their research projects. But the file that this year’s information was taken from included the names, addresses, Social Security numbers and in some cases birth dates of students whose research projects were done from 1998 through 2005.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsEducation SectorExposureU.S.

Post navigation

← The Medical Center at Bowling Green Notifies Patients of Breach of Protected Health Information
OH: Nurse Accused Of Using Patient Information To Obtain Painkillers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.