DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Aaron’s operations computer stolen during burglary, contained customers’ Social Security numbers

Posted on November 2, 2011 by Dissent

It never rains but it pours?

I had never heard of Aaron’s until  earlier this year when they were sued for allegedly installing spyware on rent-to-own computers. But now I see their name again – this time, on a breach notification to the New Hampshire Attorney General’s Office.

According to the firm’s letter of October 18, a Fresno, California franchise was burglarized.  Aaron’s was informed of the burglary on September 26, and by September 30, had determined that a computer stolen in the burglary contained customers’ names and Social Security numbers.  According to their notification, 1,008 residents of New Hampshire were affected by the breach; the nationwide total was not provided.  Reportedly, the computer contained information on the franchisee’s customers and (other) Aaron’s customers.

The firm sent out notifications to consumers the week of October 17, offering them free credit monitoring services even though it appeared the computer was likely stolen for its hardware value and not for the data.

Category: Breach IncidentsBusiness SectorTheftU.S.

Post navigation

← 2,500 Avia Dental Plan members notified of security breach
E-mail failure-to-bcc error exposes U. Alabama students’ failing grades to each other →

1 thought on “Aaron’s operations computer stolen during burglary, contained customers’ Social Security numbers”

  1. NORMA WELCH says:
    November 13, 2011 at 6:28 pm

    I HAVE HAD PROBLEM WITH SS NUMBER, STARTED 1ST OF OCTOBER. CAUSING PROBLEMS WITH EMPLOYMENT,

    ABOUT 8 MO AGO THEY ALSO TRIED TO SUE ME OVER PAID OFF ITEMS.
    LUCKLY HAD RECEIPTS.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.