DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New Zealand Nurses Organisation notifies 47,000 members of breach

Posted on November 2, 2016 by Dissent

From the Privacy Commissioner of New Zealand’s office, this statement:

Headline: Nurses data breach: what happened and how to get help

If you’re one of the 47 thousand members of the New Zealand Nurses Organisation (NZNO) whose names and email addresses were accidentally disclosed to a criminal third party, you might be wondering what you can do about it. The first thing you need to do is to try and understand what happened and what the risks are to you.

The NZNO yesterday notified our Office – as we would expect – that it had fallen victim to a spear phishing scam. An NZNO staff member received an email purportedly from its chief executive asking for names and contact details of all its members. Unfortunately, these details were sent to that email address before it became clear the request was fraudulent. The information lost consisted of the first names, surnames and the email addresses of all its members.

NZNO advised us that its IT team attempted to retrieve the email but it was too late. It also attempted to contact the email address provider, Yahoo. The organisation reported the incident to Police and has emailed its members to inform them about the breach.

The organisation also notified the Department of Internal Affairs and IDCare, an NGO that provides advice to victims of identity theft. NZNO has confirmed the only information breached was members’ names and email addresses. No financial or other personal information was disclosed.

How we can help

Accidental disclosure of personal information is a risk that every agency holding personal information faces. Our Office provides guidance on safeguards that can be put in place to minimise this risk, but it is always present. Whether the cause is a malicious third-party, a software error, or human error, the risk is never zero.

As well as advice about how to prevent unwanted disclosures (or data breaches), our Office has guidance about how to manage the breach once it has occurred. Although this resource is written to guide agencies, it does give useful information for individuals who have been affected by a data breach.

If you are one of the nurses affected, here’s what you can do:

Contact the NZNO and find out as much as you can.

Find out what information has been disclosed, who it has been disclosed to, and what steps the organisation is taking to resolve the issue.

Understand what information is at risk. This can help you identify passwords that may need to be reset, or prepare for other consequences of your personal information being disclosed. In its assessment of the NZNO incident, our colleagues at IDCare concluded there was a moderate risk that members would receive phishing emails resulting from this event.

Finally, if you’re concerned about a perceived lack of action or transparency about what is being done, you can contact our Office. We have been in contact with the NZNO and it has been open in its communication with us. But one of your rights in these circumstances is to make a complaint for us to investigate your individual case.

Spear phishing

Data breaches can affect organisations large and small. This data breach occurred as a result of a response to a malicious spear phishing email that a staff member received and responded to. Spear phishing emails are emails that deceive recipients into believing that they are responding to a legitimate request. These emails can happen to anyone at anytime. We’ve written about another incident of spear phishing here.

All organisations need to be very vigilant about the emails received by its staff. Phishing emails can look incredibly authentic. Staff should be reminded to be cautious about clicking on links or attachments. And remember to check the email address to see whether it is one the sender uses.

Category: Business SectorNon-U.S.Phishing

Post navigation

← NullCrew member sentenced to 45 months (update1)
Anxiety not a claim for damages in Barnes & Nobles data breach case →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.