DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

And so it starts: Blumenthal Investigating Wellpoint Security Breach

Posted on July 2, 2010 by Dissent

From the CTWatchdog:

Connecticut Attorney General Richard Blumenthal is investigating a massive security breach that allegedly compromised private financial and health information on nearly a half million WellPoint consumers, including thousands in Connecticut.

In a letter to WellPoint Inc., Blumenthal has requested detailed information about how the breach occurred, what steps have been taken to protect the affected individuals, and what new procedures have been adopted to prevent future breaches.

Blumenthal is also calling on WellPoint to provide the same protection that other companies have done after similar breaches — at least two years of credit monitoring, at least $25,000 of identity theft insurance and expenses covered to impose and later lift any security freeze on consumers’ credit reports.

[…]

Blumenthal is seeking a response by July 9. The information he is seeking includes:

  • the name and address of the computer company who updated the online application process in October 2009;
  • What security protections, hardware or software, were present or used on the online application system prior to the upgrade;
  • the categories of information contained on the online system and compromised by this breach;
  • the process by which someone would be able to “manipulated the URL address” in order to view other individuals’ information;
  • Prior measures to safeguard sensitive information;
  • how and when WellPoint first learned about the breach;
  • the circumstances under which the information was accessed or viewed by anyone without authorization;
  • what, if any, security protocols or procedures were in effect to prevent the exposure of private information to users or applicants using the online system;
  • the number of individuals affected by this incident and their state of residence;
  • all steps taken to determine what caused the flaw in the online application system and the time period in which private information was publicly available;
  • how WellPoint determined that the information was accessed by fewer than 10 unidentified computers — someone other than the health insurer’s employees and affiliates;
  • copies of all investigative reports or audits relative to this incident;
  • all steps taken or that will be taken to warn all affected persons that their private information may have been compromised, and copies of any notification letters already sent;
  • an outline of any plan to prevent a future breach and a timeline for implementing that plan; and
  • corporate policies regarding securing servers, databases, or other systems containing private information.
Category: Health Data

Post navigation

← Bank of New York Mellon granted summary judgment in lost backup tapes lawsuit
Hospitals sued over HIV diagnosis →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.