DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More breaches reported to Maryland that we didn’t know about

Posted on August 11, 2010 by Dissent

In response to a Freedom of Information request, Maryland Attorney General’s Office sent me the 14 breach reports they received in March of this year.  Of the 14,  six were never previously reported on this site and four others gave us breach reports for incidents that we were aware of but had few details for:

Newly revealed:

  • Thomson Reuters reported that in January, the St. Paul police contacted them and informed them that during the course of an investigation into a residential burglary, they had uncovered evidence that an employee had removed some papers containing names, addresses and credit card information on certain Thomson CompuMark customers.  Further investigation revealed that between May and December of 2009, the employee had processed payments from 140 customers but only processed manual payments and did not have access to the electronic database.  The firm reported that there had been no reports of fraud linked to the breach.
  • NBC Universal reported that a laptop belonging to an employee of NBC News was stolen from a home in California on February 4.  The laptop contained names and Social Security Numbers of  “certain employees, daily hires, temporary employees and former employees of NBC and NBC Universal or YOH Services.”   Law enforcement recovered the laptop on February 24 along with other property from residential burglaries.  To their credit, NBC informed employees of the details of the incident and offered them free credit monitoring services, even though this is one of those incidents that really does seem like opportunistic theft where there’s a low risk of data misuse.
  • LPL Financial had  learned on February 24 of the theft of an unencrypted  portable drive from the car of Christian D’Urso (one of their advisors) and reported  that to the New Hampshire Attorney General, as previously reported on this site.  But it seems that they were also busy informing the Maryland Attorney General’s Office of a second breach that they had learned of on February 23. In the newly revealed incident,  another advisor, Sam Eisen, had sent an e-mail to his clients with an attachment that exposed the names and account numbers of 38 other clients.
  • Fox Entertainment reported that JPMorgan Chase Bank had inadvertently disclosed one pension member’s name, address, Social Security number, and pension information in an errant email attachment to another pension member.   The bank administers the pension payments.
  • ProAssurance Mid-Continent Underwriters reported they became aware of a compromise involving their Per Diem Insurance web site at hsi.perdieminsurance.com.   The compromise involved 141 121 customers’ names, addresses, dates of birth, and Social Security numbers, although the company reports that it had received no information of any misuse of the data.
  • NVR, t/a Ryan Homes reported that a laptop stolen from an employee’s car contained the unencrypted names and Social Security numbers of 8 individuals.

New Information on Previously Known Incidents:

  • Thrivent Financial for Lutherans reported that a laptop was stolen from a field representative’s office.  Although we knew something about this breach already from media and other sources,  including their report to Maine that the breach affected 9,386 individuals, this is the first time we’ve seen their actual breach report.  It indicates that the “laptop had strong password requirements to access the laptop and all information on the laptop is encrypted.  However, we believe that some of the information stored on the laptop may be at risk. Information at risk included name, address, phone number, birth date, health information and Social Security number, and in some cases personal health information.
  • State Farm had made two reports to New York State earlier this year about insider wrongdoing, but we didn’t have the actual reports.  One of them may be a March 5 report that the company had discovered that a State Farm agent had used credit card information of two customers for fraudulent purposes.  At the time of the notification, the firm was still investigating the possibility that other customers’ information had also been misused.
  • Ahold USA had reported the loss of two DVDs to NYS (as noted here), but until now, we didn’t have the actual breach report.   The report indicates that the unnamed service provider lost the unencrypted DVDs in early February but didn’t notify Ahold until “recently.”   The DVDs, which were supposed to have been encrypted,  contained unencrypted names and SSN of employees, including employees of American Sales Company, an Ahold subsidiary.
  • The General Motors inadvertent disclosure incident noted here was due to an electronic file being erroneously sent to an outside email address.  The file contained names, e-mail addresses and Social Security numbers.  GM contacted the recipient and their employer, who both confirmed that the errant email had been deleted without ever being opened.  Despite that, GM sent a letter to those affected that begins, “The purpose of this letter is to advise you of an incident that may expose you to the risk of identity theft.”   While they forthrightly described their error, it is somewhat surprising to me that they would say that the incident might expose them to the risk of identity theft and yet not offer them any free services.

As with previous reports, all of the breach reports have been sent to the Open Security Foundation for inclusion in the DataLossDB.  They could probably use some help entering the files in the database, so if you’ve got some time and would like to help with a great project, why not contact them and offer to pitch in on the Primary Sources project.

[8-12: Corrected number for ProAssurance to 121. Thanks to the alert reader who caught my mistake and apologies to ProAssurance.]

Category: Business SectorFinancial SectorID TheftMiscellaneousU.S.

Post navigation

← InPsych app is a privacy threat – psychologist
Ca: Hospital faces privacy probe →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.