DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MO: Parking company issues cardholder security breach at Union Station

Posted on December 11, 2014 by Dissent

KPLR reports:

A security breach at the Union Station parking lot could cause a lot of headaches this Holiday season.

St. Louis Parking Company reveled (sic) Wednesday that security for users of credit and debit cards at the parking lot have had their card information compromised. The company says the breach occurred from October 6th through October 31st of 2014.

Since the breach St. Louis Parking Company has isolated the server affected and placed additional security measures in place. The breach at Union Station does not affect other parking facilities in St. Louis.

Read more on KPLR.

In a statement on their web site, SLPC writes:

St. Louis Parking Company recently learned of a security incident involving credit and debit card data collected at its Union Station Parking Facility between October 6, 2014 and October 31, 2014. Customers who utilized the public parking facility at Union Station could have had their credit card information compromised.

As soon as the breach was discovered, the affected server was isolated and security measures were put in place to eliminate any further compromise of data. The breach was isolated to the public parking lot and did not affect any other concessions. St. Louis Parking Company is asking any customers who used their credit or debit card to exit the parking facility between October 6th and October 31st to closely monitor their accounts. If customers notice any fraudulent activity they should notify the issuing bank or financial institution and St. Louis Parking Company at 314-241-7777 extension 11.

St. Louis Parking Company, the Parking Operator at Union Station, is working with Datapark, the manufacturer of the revenue controls system, to investigate the situation per the Payment Card Industry Data Security Standard. Third party forensic experts have been hired to assist with the investigation. The security compromise has been contained, and customers can use their credit and debit cards at the public parking facilities at Union Station. St. Louis Parking Company will continue to post relevant consumer updates on its website: www.stlouisparking.com.

St. Louis Parking Company is an autonomous company, and is wholly responsible for operating the parking facilities at Union Station. Union Station and Union Station Doubletree Hotel are separate, distinct corporate entities from St. Louis Parking Company. All inquiries concerning this matter should be directed to St. Louis Parking Company.

MORE INFORMATION ON WAYS TO PROTECT YOURSELF

We recommend that you remain vigilant by reviewing your account statements and credit reports for any unauthorized activity. You may obtain a copy of your credit report, free of charge, once every 12 months from each of the three nationwide credit reporting companies. To order your annual free credit report please visit www.annualcreditreport.com or call toll free at 1-877-322-8228. Contact information for the three nationwide consumer reporting agencies is as follows:

Equifax
PO Box 740256
Atlanta, GA 30374
www.equifax.com
1-800-525-6285

TransUnion
PO Box 2000
Chester, PA 19022
www.transunion.com/fraud
1-800-680-7289

Experian
PO Box 9554
Allen, TX 75013
www.experian.com
1-888-397-3742

No related posts.

Category: Business Sector

Post navigation

← Target to Make No Harm-No Foul Argument in Breach Suit
Ca: No more snooping into health records →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.