Jennifer Godwin reports that 35,000 current and former Arkansas National Guardsmen will be notified that their names, Social Security numbers, and other personal information were on a hard drive that went missing last month. Investigators determined that a file on the drive contains information on those who enlisted in the Arkansas National Guard dating back…
HOW many years of free credit alerts?
I don’t know if this is some kind of record, but the Iowa Racing and Gaming Commission is notifying people who were affected by the security breach reported in January that they can get an additional 7 years of fraud victim alerts on their credit reports at no charge. The story’s here. Does anyone remember…
ICO outlines business case for privacy
In The Privacy Dividend, a report published on 4 March 2010, it said public and private sector organisations can use business cases to justify spending on privacy protection. It says the benefits of protecting privacy derive from four areas in which information has value. Firstly, protecting personal information as an asset can help to make…
Memo to arrestee: a flash drive is not a goldfish
The Smoking Gun reports: In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed the data storage device while in the custody of Secret Service agents, records show. Florin Necula ingested the Kingston flash drive shortly after his January 21…
Illinois Department of Insurance won’t fine MetLife… for now
Would the state of Illinois have treated a bank or health care provider the same way if the same data had been exposed by them? The Illinois Department of Insurance says it won’t fine insurance agency MetLife, at least for now, after a 13 News investigation revealed MetLife files were thrown into a dumpster without being…
Cyberthieves Using Bluetooth To Steal Gas Station Credit Card Data
Evan Schuman writes: When cyberthieves plant skimming devices inside POS PIN pads, they typically have one of two headaches. First, they have to return to the scene of the crime to retrieve the device and its stolen data, which is dangerous. If the thieves use the device to wirelessly phone the data to one of…