SlideShare a Scribd company logo
1 of 3
Download to read offline
Identity Theft Resource Center
2014 Breach List:

Breaches: 10

Report Date:
1/7/2014
Page 1 of 3

Exposed: 62,628

How is this report produced? What are the rules? See last page of report for details.
ITRC Breach ID

Company or Agency

State

Est. Date

Breach Type

Breach Category

ITRC20140107-08

NC
Electronic
Banking/Credit/Financial Yes - Unknown #
Branch Banking & Trust Co.
(BB&T)
Pursuant to the provisions of the Maryland Code, Md. Code Com. Law§ 14-3501 et seq., we are notifying you of an information security
incident. In late October 2013, a call center employee circumvented our information security policy and controls, and altered information in
an effort to perpetrate fraud against an account.
Publication:

MD AG's office

Article Title:

0

http://www.oag.state.md.us/idtheft/Breach%20Notices/itu-235452.pdf

ITRC Breach ID

Company or Agency

ITRC20140107-07

Edgepark Medical Supplies

Author:

# Records Rptd

Branch Banking & Trust Co.

Article URL:

Attribution 1

Records Exposed?

State

Est. Date

Date Published:

Breach Category

Records Exposed?

Electronic

OH

Breach Type

Medical/Healthcare

# Records Rptd

Yes - Unknown #

0

This letter is to notify you that the website of Edgepark Medical Supplies was improperly accessed, resulting in the unauthorized access of
certain personal information related to youraccount. At this time, there is no indication that your personal information has heen misused in
any way that would harm you.
Publication:

VT AG's office

Article Title:

Edgepark Medical Supplies

Article URL:

Attribution 1

http://www.atg.state.vt.us/assets/files/2014%2001%2002%20Edgepark%20ltrt%20Consumer%20re%20Security%20Brea

ITRC Breach ID

Company or Agency

ITRC20140107-06

Riverside Health System

Author:

State

Est. Date

Date Published:

Breach Category

Records Exposed?

Electronic

VA

Breach Type

Medical/Healthcare

# Records Rptd

Yes - Published #

919

A local hospital is offering free credit monitoring after officials say an employee inappropriately accessed patients’ medical records.
Publication:

Phiprivacy.net / WAVY.com

Article Title:

Riverside Health System notifies 919 patients after employee improperly accessed their information

Article URL:

Attribution 1

http://www.phiprivacy.net/riverside-health-system-notifies-919-patients-after-employee-improperly-accessed-their-infor

ITRC Breach ID

Company or Agency

ITRC20140107-05

Spirit Home Health Care

State

Author:

Est. Date

Date Published:

Breach Category

Records Exposed?

Paper Data

FL

Breach Type

Medical/Healthcare

Yes - Published #

# Records Rptd

603

improper disposal - paper
Publication:

hhs.gov

Article Title:

Spirit Home Health Care

Article URL:

Attribution 1

Author:

http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html
State

Est. Date

Breach Type

Date Published:

ITRC Breach ID

Company or Agency

Breach Category

ITRC20140107-04

NM
Electronic
Medical/Healthcare
Yes - Published #
New Mexico Oncology
12,354
Hematology Consultants, Ltd.
On November 13, 2013, New Mexico Oncology and Hematology Consultants, Ltd. (NMOHC) discovered that a laptop computer was stolen
from an employee’s office.
Publication:

hhs.gov / phiprivacy.net

Article Title:

# Records Rptd

New Mexico Oncology Hematology Consultants, Ltd.

Article URL:

Attribution 1

Author:

Records Exposed?

http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html

State

Est. Date

Breach Type

Date Published:

ITRC Breach ID

Company or Agency

Breach Category

ITRC20140107-03

NC
Paper Data
Medical/Healthcare
Yes - Published #
Department of Health and
48,752
Human Services
The North Carolina Department of Health and Human Services in late December inadvertently mailed more than 48,000 Medicaid cards for
children to the wrong addresses.

Copyright 2014 Identity Theft Resource Center

Records Exposed?

# Records Rptd
Identity Theft Resource Center
2014 Breach List:

Breaches: 10

Report Date:
1/7/2014
Page 2 of 3

Exposed: 62,628

How is this report produced? What are the rules? See last page of report for details.
Publication:

Health Data Management

Article Title:

North Carolina Mails 48K Medicaid ID Cards to Wrong Recipients

Article URL:

Attribution 1

http://www.healthdatamanagement.com/news/north-carolina-mails-medicaid-cards-to-wrong-recipients-47072-1.html?E

ITRC Breach ID

Company or Agency

ITRC20140107-02

Loudon County Schools

State

Author:

Est. Date

Date Published:

Breach Category

Records Exposed?

Electronic

VA

Breach Type

Educational

# Records Rptd

Yes - Unknown #

0

Loudoun County school officials have responded to a data breach that made personal information about students and staff members, as well
as detailed emergency response plans for each school, publicly available through a webpage that was thought to be protected by a password.
Publication:

leesburgtoday.com

Article Title:

Loudon County Schools

Article URL:

Attribution 1

http://www.leesburgtoday.com/news/loudoun-schools-repair-online-data-breach/article_c633baea-77a4-11e3-8f36-001a

ITRC Breach ID

Company or Agency

ITRC20140107-01

'wichcraft

Author:

State

Est. Date

Date Published:

Breach Category

Records Exposed?

Electronic

NY

Breach Type

Business

# Records Rptd

Yes - Unknown #

0

‘wichcraft Operating, LLC recently learned that an unauthorized party gained access to our systems, compromising the payment card
information of certain customers who made purchases at a ‘wichcraft location in New York or San Francisco using a payment card from
approximately August 11, 2013 to October 2, 2013. Based on our investigation, the information accessed by the unauthorized party may have
included names, payment card numbers, security codes and expiration dates. Not all of these data elements were accessed for each affected
customer.
Publication:

CA AG's office

Article Title:

'wichcraft

Article URL:

Attribution 1

https://oag.ca.gov/system/files/wichcraft%20Notice%20to%20Customers_0.pdf?

ITRC Breach ID

Company or Agency

ITRC20140102-01

Barry University (Foot and
Ankle Institute)

Author:

State

Est. Date

Date Published:

Breach Category

Records Exposed?

Electronic

FL

Breach Type

Medical/Healthcare

# Records Rptd

Yes - Unknown #

0

The Miami Herald reports that Florida's Barry University recently began notifying patients of its Foot and Ankle Institute that their medical
records and personal information may have been accessed by hackers after a school laptop was infected with malware (h/t HealthITSecurity).

Publication:

Jeff Goldman

Article Title:

Barry University Acknowledges Security Breach

Article URL:

Attribution 1

http://www.esecurityplanet.com/network-security/barry-university-acknowledges-security-breach.html

ITRC Breach ID

Company or Agency

ITRC20140101-01

Snapchat

Author:

State
CA

Est. Date

Date Published:

Breach Type

Breach Category

Records Exposed?

Electronic

Business

# Records Rptd

Yes - Unknown #

0

Snapchat users are waking up to troubling news: Thanks to a gap in the service's security, the phone numbers and usernames for as many
as 4.6 million accounts have been downloaded by a Web site calling itself SnapchatDB.info.
Attribution 1

Publication:

WashingtonPost.com

Article Title:

A Snapchat security breach affects 4.6 million users. Did Snapchat drag its feet on a fix?

Author:

Article URL:

http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/01/a-snapchat-security-breach-affects-4-6-million-users-d

Copyright 2014 Identity Theft Resource Center

Date Published:
Identity Theft Resource Center
2014 Breach List:

Breaches: 10

Report Date:
1/7/2014
Page 3 of 3

Exposed: 62,628

How is this report produced? What are the rules? See last page of report for details.

2014 Breaches Identified by the ITRC as of:

1/7/2014

Total Breaches:
Records Exposed:

10
62,628

The ITRC Breach database is updated on a daily basis, and published to our website on each Tuesday. Unless noted
otherwise, each report includes breachs that occurred in the year of the report name (such as "2013 Breach List"), or
became public in the report name year, but were not public in the previous year. Each item must be previously
published by a credible source, such as Attorney General's website, TV, radio, press, etc. The item will not be
included at all if ITRC is not certain that the source is real and credible. We include in each item a link or source of
the article, and the information presented by that article. Many times, we have attributions from a multitude of media
sources and media outlets. ITRC sticks to the facts as reported, and does not add or subtract from the previously
published information. When the number of exposed records is not reported, we note that fact. When records are
encrypted, we state that we do not (at this time) consider that to be a data exposure. However, we do not consider
password protection as adequate, and we do consider those events to be a data exposure.
What is a breach? A breach is defined as an event in which an individual’s name plus Social Security Number (SSN),
driver’s license number, medical record, or a financial record/credit/debit card is potentially put at risk – either in
electronic or paper format.
The ITRC Breach Report presents individual information about data exposure events and running totals for the year.
The ITRC Breach Stats Report develops some statistics based upon the type of entity involved in the data exposure.

Copyright 2014 Identity Theft Resource Center

More Related Content

What's hot

George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftOPSWAT
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015James Sheehan
 
Employee background verification company in bangalore at Nearlyjobs
Employee background verification company in bangalore at NearlyjobsEmployee background verification company in bangalore at Nearlyjobs
Employee background verification company in bangalore at NearlyjobsJobsrodTeam
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
D2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-ReportD2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-ReportThe Internet of Things
 
Data security
Data securityData security
Data securityoco26
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesWhoisXML API
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII- Mark - Fullbright
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse Systemoldshaman
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2Heather Smith
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsPYA, P.C.
 

What's hot (20)

George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Ni sug disuk 2013
Ni sug disuk 2013Ni sug disuk 2013
Ni sug disuk 2013
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Employee background verification company in bangalore at Nearlyjobs
Employee background verification company in bangalore at NearlyjobsEmployee background verification company in bangalore at Nearlyjobs
Employee background verification company in bangalore at Nearlyjobs
 
State Board Of Education
State Board Of Education
State Board Of Education
State Board Of Education
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
D2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-ReportD2015 Protected-Health-Information-Data-Breach-Report
D2015 Protected-Health-Information-Data-Breach-Report
 
Data security
Data securityData security
Data security
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
INFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PIIINFORMATION SECURITY STUDY REGARDING PII
INFORMATION SECURITY STUDY REGARDING PII
 
Cyber security
Cyber securityCyber security
Cyber security
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
 
hex0316
hex0316hex0316
hex0316
 

Similar to ITRC Breach Report 2014

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...Protected Harbor
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionJoe Nathans
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05Daniel Kapellmann Zafra
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...mosmedicalreview
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
An analysis of george h cohen official statement in response to washington ex...
An analysis of george h cohen official statement in response to washington ex...An analysis of george h cohen official statement in response to washington ex...
An analysis of george h cohen official statement in response to washington ex...advocate123
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharingcwysopal
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Shawn Tuma
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftSteve Meek
 

Similar to ITRC Breach Report 2014 (20)

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Cyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive DiscussionCyber security legal and regulatory environment - Executive Discussion
Cyber security legal and regulatory environment - Executive Discussion
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
 
Chronology of Data Breaches
Chronology of Data BreachesChronology of Data Breaches
Chronology of Data Breaches
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
An analysis of george h cohen official statement in response to washington ex...
An analysis of george h cohen official statement in response to washington ex...An analysis of george h cohen official statement in response to washington ex...
An analysis of george h cohen official statement in response to washington ex...
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharing
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Data Breach: It Can Happen To You
Data Breach: It Can Happen To YouData Breach: It Can Happen To You
Data Breach: It Can Happen To You
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

ITRC Breach Report 2014

  • 1. Identity Theft Resource Center 2014 Breach List: Breaches: 10 Report Date: 1/7/2014 Page 1 of 3 Exposed: 62,628 How is this report produced? What are the rules? See last page of report for details. ITRC Breach ID Company or Agency State Est. Date Breach Type Breach Category ITRC20140107-08 NC Electronic Banking/Credit/Financial Yes - Unknown # Branch Banking & Trust Co. (BB&T) Pursuant to the provisions of the Maryland Code, Md. Code Com. Law§ 14-3501 et seq., we are notifying you of an information security incident. In late October 2013, a call center employee circumvented our information security policy and controls, and altered information in an effort to perpetrate fraud against an account. Publication: MD AG's office Article Title: 0 http://www.oag.state.md.us/idtheft/Breach%20Notices/itu-235452.pdf ITRC Breach ID Company or Agency ITRC20140107-07 Edgepark Medical Supplies Author: # Records Rptd Branch Banking & Trust Co. Article URL: Attribution 1 Records Exposed? State Est. Date Date Published: Breach Category Records Exposed? Electronic OH Breach Type Medical/Healthcare # Records Rptd Yes - Unknown # 0 This letter is to notify you that the website of Edgepark Medical Supplies was improperly accessed, resulting in the unauthorized access of certain personal information related to youraccount. At this time, there is no indication that your personal information has heen misused in any way that would harm you. Publication: VT AG's office Article Title: Edgepark Medical Supplies Article URL: Attribution 1 http://www.atg.state.vt.us/assets/files/2014%2001%2002%20Edgepark%20ltrt%20Consumer%20re%20Security%20Brea ITRC Breach ID Company or Agency ITRC20140107-06 Riverside Health System Author: State Est. Date Date Published: Breach Category Records Exposed? Electronic VA Breach Type Medical/Healthcare # Records Rptd Yes - Published # 919 A local hospital is offering free credit monitoring after officials say an employee inappropriately accessed patients’ medical records. Publication: Phiprivacy.net / WAVY.com Article Title: Riverside Health System notifies 919 patients after employee improperly accessed their information Article URL: Attribution 1 http://www.phiprivacy.net/riverside-health-system-notifies-919-patients-after-employee-improperly-accessed-their-infor ITRC Breach ID Company or Agency ITRC20140107-05 Spirit Home Health Care State Author: Est. Date Date Published: Breach Category Records Exposed? Paper Data FL Breach Type Medical/Healthcare Yes - Published # # Records Rptd 603 improper disposal - paper Publication: hhs.gov Article Title: Spirit Home Health Care Article URL: Attribution 1 Author: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html State Est. Date Breach Type Date Published: ITRC Breach ID Company or Agency Breach Category ITRC20140107-04 NM Electronic Medical/Healthcare Yes - Published # New Mexico Oncology 12,354 Hematology Consultants, Ltd. On November 13, 2013, New Mexico Oncology and Hematology Consultants, Ltd. (NMOHC) discovered that a laptop computer was stolen from an employee’s office. Publication: hhs.gov / phiprivacy.net Article Title: # Records Rptd New Mexico Oncology Hematology Consultants, Ltd. Article URL: Attribution 1 Author: Records Exposed? http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html State Est. Date Breach Type Date Published: ITRC Breach ID Company or Agency Breach Category ITRC20140107-03 NC Paper Data Medical/Healthcare Yes - Published # Department of Health and 48,752 Human Services The North Carolina Department of Health and Human Services in late December inadvertently mailed more than 48,000 Medicaid cards for children to the wrong addresses. Copyright 2014 Identity Theft Resource Center Records Exposed? # Records Rptd
  • 2. Identity Theft Resource Center 2014 Breach List: Breaches: 10 Report Date: 1/7/2014 Page 2 of 3 Exposed: 62,628 How is this report produced? What are the rules? See last page of report for details. Publication: Health Data Management Article Title: North Carolina Mails 48K Medicaid ID Cards to Wrong Recipients Article URL: Attribution 1 http://www.healthdatamanagement.com/news/north-carolina-mails-medicaid-cards-to-wrong-recipients-47072-1.html?E ITRC Breach ID Company or Agency ITRC20140107-02 Loudon County Schools State Author: Est. Date Date Published: Breach Category Records Exposed? Electronic VA Breach Type Educational # Records Rptd Yes - Unknown # 0 Loudoun County school officials have responded to a data breach that made personal information about students and staff members, as well as detailed emergency response plans for each school, publicly available through a webpage that was thought to be protected by a password. Publication: leesburgtoday.com Article Title: Loudon County Schools Article URL: Attribution 1 http://www.leesburgtoday.com/news/loudoun-schools-repair-online-data-breach/article_c633baea-77a4-11e3-8f36-001a ITRC Breach ID Company or Agency ITRC20140107-01 'wichcraft Author: State Est. Date Date Published: Breach Category Records Exposed? Electronic NY Breach Type Business # Records Rptd Yes - Unknown # 0 ‘wichcraft Operating, LLC recently learned that an unauthorized party gained access to our systems, compromising the payment card information of certain customers who made purchases at a ‘wichcraft location in New York or San Francisco using a payment card from approximately August 11, 2013 to October 2, 2013. Based on our investigation, the information accessed by the unauthorized party may have included names, payment card numbers, security codes and expiration dates. Not all of these data elements were accessed for each affected customer. Publication: CA AG's office Article Title: 'wichcraft Article URL: Attribution 1 https://oag.ca.gov/system/files/wichcraft%20Notice%20to%20Customers_0.pdf? ITRC Breach ID Company or Agency ITRC20140102-01 Barry University (Foot and Ankle Institute) Author: State Est. Date Date Published: Breach Category Records Exposed? Electronic FL Breach Type Medical/Healthcare # Records Rptd Yes - Unknown # 0 The Miami Herald reports that Florida's Barry University recently began notifying patients of its Foot and Ankle Institute that their medical records and personal information may have been accessed by hackers after a school laptop was infected with malware (h/t HealthITSecurity). Publication: Jeff Goldman Article Title: Barry University Acknowledges Security Breach Article URL: Attribution 1 http://www.esecurityplanet.com/network-security/barry-university-acknowledges-security-breach.html ITRC Breach ID Company or Agency ITRC20140101-01 Snapchat Author: State CA Est. Date Date Published: Breach Type Breach Category Records Exposed? Electronic Business # Records Rptd Yes - Unknown # 0 Snapchat users are waking up to troubling news: Thanks to a gap in the service's security, the phone numbers and usernames for as many as 4.6 million accounts have been downloaded by a Web site calling itself SnapchatDB.info. Attribution 1 Publication: WashingtonPost.com Article Title: A Snapchat security breach affects 4.6 million users. Did Snapchat drag its feet on a fix? Author: Article URL: http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/01/a-snapchat-security-breach-affects-4-6-million-users-d Copyright 2014 Identity Theft Resource Center Date Published:
  • 3. Identity Theft Resource Center 2014 Breach List: Breaches: 10 Report Date: 1/7/2014 Page 3 of 3 Exposed: 62,628 How is this report produced? What are the rules? See last page of report for details. 2014 Breaches Identified by the ITRC as of: 1/7/2014 Total Breaches: Records Exposed: 10 62,628 The ITRC Breach database is updated on a daily basis, and published to our website on each Tuesday. Unless noted otherwise, each report includes breachs that occurred in the year of the report name (such as "2013 Breach List"), or became public in the report name year, but were not public in the previous year. Each item must be previously published by a credible source, such as Attorney General's website, TV, radio, press, etc. The item will not be included at all if ITRC is not certain that the source is real and credible. We include in each item a link or source of the article, and the information presented by that article. Many times, we have attributions from a multitude of media sources and media outlets. ITRC sticks to the facts as reported, and does not add or subtract from the previously published information. When the number of exposed records is not reported, we note that fact. When records are encrypted, we state that we do not (at this time) consider that to be a data exposure. However, we do not consider password protection as adequate, and we do consider those events to be a data exposure. What is a breach? A breach is defined as an event in which an individual’s name plus Social Security Number (SSN), driver’s license number, medical record, or a financial record/credit/debit card is potentially put at risk – either in electronic or paper format. The ITRC Breach Report presents individual information about data exposure events and running totals for the year. The ITRC Breach Stats Report develops some statistics based upon the type of entity involved in the data exposure. Copyright 2014 Identity Theft Resource Center