[ISN] [Dataloss Weekly Summary] Week of Sunday, October 31, 2010

From: InfoSec News <alerts_at_private>
Date: Thu, 11 Nov 2010 01:20:34 -0600 (CST)
========================================================================

Open Security Foundation - DataLossDB Weekly Summary
Week of Sunday, October 31, 2010

6 Incidents Added.

========================================================================

DataLossDB is a research project aimed at documenting known and reported 
data loss incidents world-wide. The Open Security Foundation asks for 
contributions of new incidents and new data for existing incidents. For 
any questions about the project or the data contained within this email 
or the website (http://www.datalossdb.org), please contact us at 
curators_at_private

========================================================================

DataLossDB News/Updates

  No news this week!


========================================================================

Incidents Added


Reported Date: 2010-11-06
Summary: 50 Social Security numbers of town employees disclosed in e-mails
Organizations: Town of New Baltimore
http://datalossdb.org/incidents/3236
---------------------

Reported Date: 2010-10-25
Summary: 12,000 names and Social Security Numbers sent to a private e-mail address
Organizations: U.S. General Services Administration
http://datalossdb.org/incidents/3235
---------------------

Reported Date: 2010-10-21
Summary: Personal information of 1,500 seniors contained in an email attachment was accidentally sent to 400 students
Organizations: Seton Hall University
http://datalossdb.org/incidents/3231
---------------------

Reported Date: 2010-10-21
Summary: External hard drive containing back up of patient information missing from hospital
Organizations: St Vincent’s University Hospital
http://datalossdb.org/incidents/3233
---------------------

Reported Date: 2010-10-21
Summary: Email sent to employees contained 110 students names and Social Security numbers
Organizations: Richmond Public Schools
http://datalossdb.org/incidents/3232
---------------------

Reported Date: 2010-02-04
Summary: 35 flight students' credit card info improperly stored on desktop computer accessed by unknown party
Organizations: Honolulu Community College, University of Hawaii
http://datalossdb.org/incidents/3234
---------------------


========================================================================

Blotter Posts


Added: 2010-11-07
Title: Man faces 400 identity theft charges
http://feedproxy.google.com/~r/IntelligencerNews/~3/ReV_rWF-quk/man-faces-400-identity-theft-charges.html
---------------------

Added: 2010-11-07
Title: Identity theft victims can now register status at DMV
http://hamptonroads.com/2010/11/identity-theft-victims-can-now-register-status-dmv-0
---------------------

Added: 2010-11-05
Title: Identity Theft Council launches in Bay Area
http://rss.feedsportal.com/c/32447/f/475521/s/f52985c/l/0Lnews0Bcnet0N0C830A10E270A80A0I30E20A0A2170A0A0E2450Bhtml0Dpart0Frss0Gamp0Psubj0Fnews0Gamp0Ptag0F25470E10I30E0A0E20A/story01.htm
---------------------

Added: 2010-11-05
Title: Health care the new playground for identity thieves
http://www.zdnet.com/blog/healthcare/health-care-the-new-playground-for-identity-thieves-/4157
---------------------


_______________________________________________
Dataloss Mailing List (dataloss_at_private)

CREDANT Technologies, a leader in data security, offers advanced data encryption solutions.
Protect sensitive data on desktops, laptops, smartphones and USB sticks transparently 
across your enterprise to ensure regulatory compliance.
http://www.credant.com/stopdataloss


___________________________________________________________      
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery 
Network, Cisco Switches, SAS 70 Type II Datacenter. 
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/
Received on Wed Nov 10 2010 - 23:20:34 PST

This archive was generated by hypermail 2.2.0 : Wed Nov 10 2010 - 23:28:09 PST