DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Subcontractor

OH: ‘Human error’ causes county data loss

Posted on January 8, 2020 by Dissent

Jennifer Woods reports: Due to “human error,” up to six months of data for a few county offices was lost or had to be re-uploaded to a computer system in December, according to the Fayette County Commissioners. Essentially, the data was being transferred by an employee of “YourColo” from one system into a more secure…

Read more

OR: The City of Bend discloses Click2Gov breach

Posted on January 7, 2020 by Dissent

The City of Bend was recently informed that a potential data security incident may have compromised the payment card information of some City utility customers who made one-time utility bill payments or enrolled in auto pay using a credit or debit card between August 30, 2019 and October 14, 2019. The data that may have…

Read more

Mercy Health Lorain Hospital Laboratory patients notified of HIPAA breach due to contractor invoice printing error

Posted on January 7, 2020 by Dissent

Although no actual or attempted access or misuse of patient or guarantor information has been discovered, RCM Enterprise Services, Inc. (“RCM”) is providing notice to certain individuals regarding an error in the invoice mailing process that caused individually identifiable information to appear in the clear address “window” on medical invoices.  RCM provides patient billing services…

Read more

CO: Aurora Water announces data breach involving Click2Gov payment system

Posted on December 31, 2019 by Dissent

Author: Janet Oravetz reports: Personal information of some Aurora Water customers, such as names, card numbers and expiration dates, may have been compromised through a data breach, according to the city’s water department. The department made an announcement about the security incident on Monday and said customers who used the Click2Gov payment system to make one-time…

Read more

As 2019 draws to a close, some entities are taking harder look at storing PHI in employee email accounts

Posted on December 30, 2019 by Dissent

Okay, so two exemplars doesn’t prove any kind of trend, but I’m glad to see some entities now taking steps to reduce how much PHI is stored in employee email accounts.  Here are two recent incidents, both reported to HHS in December: Healthcare Administrative Partners (HAP) is a Pennsylvania-based business associate under HIPAA.  On December…

Read more

SG: Personal data of Ministry of Defence and Singapore Armed Forces were potentially affected by unrelated attacks on two vendors

Posted on December 21, 2019 by Dissent

Clara Chong reports that two unrelated incidents involving government vendors had put the data of Ministry of Defence and Singapore Armed Forces staff at risk. 2,400 Mindef and SAF leaked after ST Logistics phished: The data included the full names and NRIC numbers, and a combination of contact numbers, e-mail or residential addresses, Mindef said…

Read more
  • Previous
  • 1
  • …
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • …
  • 277
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.