DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Investigators say Bow Valley College failed to protect vital info of nearly 200,000

Posted on August 20, 2013 by Dissent

Here’s a breach from almost one year ago that I had missed until this follow-up report.  Michael Franklin reports:

An investigator into a possible leak of personal information of nearly 200,000 Bow Valley students has found that the institution had indeed failed to protect that information.

However, it also says that the school took reasonable steps to protect it and prevent a recurrence once the leak was discovered.

On September 19, 2012, an individual notified the Information and Privacy Commissioner about the purchase of a used computer server.

The server was one of 21 decommissioned servers that were scheduled to be picked up by the Electronic Recycling Association (ERA).

It contained personal information of approximately 183,900 students and 3,500 staff.

According to the OIPC report, in the course of its investigation, Bow Valley College (BVC) found that:

personal information of approximately 183,900 students and 3,500 employees over a nineteen year period (from 1991 to 2010) was on the purchased server. The personal information varied by individual, and included: names, email addresses, home addresses, phone number(s), DOB, SIN, BVC ID numbers, Alberta Education Student numbers, credit card numbers with expiry dates, salary, etc.

Although BVC originally stated that “The decommissioned computer server had been sent by the College to an electronic recycler contracted to wipe the server of all data prior to them disposing of it,” investigation by the OIPC reported:

ERA confirmed that BVC requested a pick-up service and ERA picked up the decommissioned servers on May 1, 2012. ERA said BVC did not request data wiping services, or tell ERA that there was data on the equipment. ERA’s May 1, 2012 invoice to BVC is for pick-up charges only, and does not include any charges for data wiping. (emphasis added by DataBreaches.net)

ERA said it does have formal written agreements with clients to provide data wiping and other specified services. ERA provided this Office with a copy of its template for its “Service Agreement”. However, ERA also said that they have no formal agreements in place with BVC, “and we have never guaranteed any services to them, in writing or otherwise…”

The College’s original breach disclosure from October 2012 can be found on their site, here. Media coverage at that time can be found in the Calgary Herald. The Alberta OIPC investigative report can be found here.


Related:

  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • How a hacking gang held Italy’s political elites to ransom
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash)
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
Category: Breach IncidentsEducation SectorExposureNon-U.S.

Post navigation

← UK: Foxtons investigates leak of 10,000 customer records
Email attachment error breaches privacy of 3,700 Hope Community Resources of Alaska clients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Des Moines Man Charged with Computer Fraud
  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.