<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://www.adamdodge.com/esi"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Educational Security Incidents (ESI)</title>
 <link>http://www.adamdodge.com/esi</link>
 <description>Educational Security Incidents (ESI) attempts to track and explore computer and information security incidents that occur at institutions of higher education. </description>
 <language>en</language>
<item>
 <title>Central Oregon Community College Web Site Offline After Dual Security Attacks</title>
 <link>http://www.adamdodge.com/esi/central_oregon_community_college_web_site_offline_after_dual_security_attacks</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 5/6/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.cocc.edu&quot;&gt;Central Oregon Community College&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Unknown&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.ktvz.com/news/27778993/detail.html&quot;&gt;KTVZ&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Central Oregon Community College recently notified users after taking the college&#039;s web site down following a two security breaches. According to notices sent by COCC officials, the web site was taken down on Wednesday and then again on Thursday following security breaches of the site on both days. While originally COCC did not believe any personal information was at risk, additional investigation showed the attacker(s) may have had accesses to 2011 COCC nursing program applicant data and 2012 COCC Foundation scholarship data. According to the notices sent to students in each of these groups, the applications did not contain credit card or Social Security numbers, but did contain email addresses and COCC ID numbers. According to the college, investigations are still ongoing to make sure no additional personal or sensitive information is at risk following the breaches. COCC is working with local and federal law enforcement during the investigation.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/central_oregon_community_college">Central Oregon Community College</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/educational_information">Educational Information</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <pubDate>Sat, 07 May 2011 00:46:47 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">664 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Error Exposes Trinity College Dublin Student Data To Campus Network</title>
 <link>http://www.adamdodge.com/esi/error_exposes_trinity_college_dublin_student_data_campus_network</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 4/29/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.tcd.ie&quot;&gt;Trinity College Dublin&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Unknown&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.databreaches.net/?p=18056&quot;&gt;DataBreaches.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.irishtimes.com/newspaper/breaking/2011/0429/breaking51.html&quot;&gt;Irish Times&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Trinity College Dublin recently announced the discovery of a file containing student and information was available to anyone on the college network. The file, which was accessible between August 2009 and March 2011, contained the names, addresses, ID numbers and email addresses of TCD students and staff. In the announcement to those affected, TCD officials stressed the fact that the file was not accessible via the Internet, only the campus network. As required by data privacy legislation, TCD reported this incident to the Data Protection Commissioner.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/trinity_college_dublin">Trinity College Dublin</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/databreachesnet">DataBreaches.net</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Sat, 30 Apr 2011 00:26:58 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">663 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>File Cabinet Containing Central Ohio Technical College Student Records Found At Storage Facility</title>
 <link>http://www.adamdodge.com/esi/file_cabinet_containing_central_ohio_technical_college_student_records_found_storage_facility</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 4/18/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.cotc.edu&quot;&gt;Central Ohio Technical College&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 617
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.dispatch.com/live/content/local_news/stories/2011/04/18/Personal-information-of-students-found-at-storage-facility.html?sid=101&quot;&gt;The Columbus Dispatch&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Central Ohio Technical College recently notified students after educational records were discovered in a file cabinet at an area storage facility. The cabinet, found at the Apple Tree Auction Center, contained course registration cards containing the names and Social Security numbers of 617 students registered for classes in Fall 2010. The cabinet was accidentally sent to storage when the college moved the Student Records office. Since January 2011, the college no longer records Social Security numbers on course registration cards. According to Central Ohio Technical College spokeswoman Alice Hutzel-Bateson, the records were back in the college&#039;s possession within 24 hours. The college is offering 12 months of free credit monitoring to those affected by this accident. Students with questions are asked to contact the college&#039;s Registrar Jackie Stewart at 740-364-9599.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/central_ohio_technical_college">Central Ohio Technical College</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/educational_information">Educational Information</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Tue, 19 Apr 2011 00:33:39 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">655 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Prank Results In Eastern Illinois University Data Breach</title>
 <link>http://www.adamdodge.com/esi/prank_results_eastern_illinois_university_data_breach</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 4/18/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.eiu.edu&quot;&gt;Eastern Illinois University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Student Misconduct
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Unknown&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://castle.eiu.edu/~pubaff/headline/2011/0418201190.php&quot;&gt;Eastern Illinois University Press Release&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Eastern Illinois University recently announced the potential exposure of sensitive information after the improper disposal of paper records. The records, contained in two bags taken by a student worker as part of a prank, contained the names and Social Security numbers of individuals employed by EIU in 2002. At this point, the university is working to identify the individuals affected. Coles County Sheriff&#039;s Department notified the university on Friday morning that coarsely shredded documents had been dumped roadside. The university responded quickly and staff were sent to find and collect the shredded documents. While the records were shredded in accordance with state guidelines, sensitive information may have been visible. The university is working to institute procedures to prevent a similar incident in the future.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/eastern_illinois_university">Eastern Illinois University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/student_misconduct">Student Misconduct</category>
 <pubDate>Mon, 18 Apr 2011 23:48:13 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">656 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>NUI Galway Student Information Exposed In Breach</title>
 <link>http://www.adamdodge.com/esi/nui_galway_student_information_exposed_breach</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 4/14/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.nuigalway.ie&quot;&gt;National University of Ireland, Galway&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Unknown&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.databreaches.net/?p=17778&quot;&gt;DataBreaches.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://nuigalway.ie/dataprotection/&quot;&gt;NUI Galway Notice&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The National University of Ireland, Galway recently announced that a file containing personal student information was accidentally made available. The file contained the names, student ID numbers, email address, and mobile phone numbers of students from 2008. The data was exposed after a security issue with the NUI Galway Clubs and Societies computer housing the file and the university believes the file was accessed multiple times between September 2008 and December 2009. The university setup a hotline - 091 492852 - to help answer questions those affected might have.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/national_university_ireland/galway">Galway</category>
 <category domain="http://www.adamdodge.com/esi/institutions/national_university_ireland">National University of Ireland</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/databreachesnet">DataBreaches.net</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/educational_information">Educational Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Fri, 15 Apr 2011 02:20:15 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">654 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>[Update1]Financial Aid Computers Stolen From Albright College</title>
 <link>http://www.adamdodge.com/esi/financial_aid_computers_stolen_albright_college</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 4/13/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.albright.edu&quot;&gt;Albright College&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Theft
&lt;/li&gt;&lt;li&gt;Number Affected: 10,000
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.wfmz.com/berksnews/27531947/detail.html&quot;&gt;WFMZ&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Update1 Source: &lt;a href=&quot;http://readingeagle.com/article.aspx?id=301685&quot;&gt;Reading Eagle Press&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Albright College recently announced the possible breach of personal information following the theft of computers containing personal information. The computers, stolen from the college&#039;s Financial Aid Office in February, contained names, addresses, dates of birth, Social Security numbers and account information on as many as 10,000 current students, prospective students, former students, faculty and staff. According to Albright Vice President for Enrollment Management Gregory E. Eichhorn, the theft may also affect parents, spouses or joint account holders as well. In response to the theft, Albright Public Safety has increased evening and weekend patrols and the college&#039;s Information Technology Services are working with departments to reduce the amount of confidential information retained on desktops. The college is working with the Reading Police Department, the County District Attorney&#039;s Office and the FBI. Crime Alert Berks County has setup a hotline - 877-373-9913 - for individuals that have more information regarding the theft and is offering up to a $5000 reward for information leading to an arrest.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update1&lt;/strong&gt;&lt;br /&gt;
One of the two computers stolen from Albright College has been recovered by State Police. The suspect in the theft appears to have stolen the computers to fund a drug habit and was not after the information on the device. The recovered laptop appears to contain most of the sensitive and personal information exposed by the theft. According to Sgt. Raymond Guth, there does not appear to be any evidence that the information on the recovered drive had been compromised by the theft.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/albright_college">Albright College</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/financial_information">Financial Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/theft">Theft</category>
 <pubDate>Thu, 14 Apr 2011 01:33:58 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">653 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Public Records Request Exposes Wenatchee Valley College Student Information</title>
 <link>http://www.adamdodge.com/esi/public_records_request_exposes_wenatchee_valley_college_student_information</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/31/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.wvc.edu/&quot;&gt;Wenatchee Valley College&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 3,800
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.wenatcheeworld.com/news/2011/mar/31/wvc-accidentally-releases-social-security-numbers/&quot;&gt;The Wenatchee World&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Wenatchee Valley College recently contacted former students after an error processing a public records request released personal student information. In response to a request from a local law firm for 10 years of financial records, WVC forwarded 84,000 pages of information that contained the names and Social Security numbers of 3,800 students that attended the college in 2002. The error was discovered by Brent Magarrell on March 24th. Magarrell contacted WVC about the error and also filed a FERPA violation complaint with the Department of Education.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/wenatchee_valley_college">Wenatchee Valley College</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Thu, 31 Mar 2011 11:51:05 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">650 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Stolen Computer Contains NYU Langone Patient Data</title>
 <link>http://www.adamdodge.com/esi/stolen_computer_contains_nyu_langone_patient_data</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/29/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.nyu.edu&quot;&gt;New York University,&lt;/a&gt; &lt;a href=&quot;http://www.med.nyu.edu/&quot;&gt;Langone Medical Center&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Theft
&lt;/li&gt;&lt;li&gt;Number Affected: 670 (2 Social Security Numbers)
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://datalossdb.org/incidents/3518-stolen-computer-contained-diagnostic-and-clinical-information-on-670-patients&quot;&gt;OSF DataLoss DB&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;https://www.med.nyu.edu/patients-visitors/about-us/data-breach-notification&quot;&gt;NYU Langone Medical Center Breach Notification&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
New York University Langone Medical Center recently announced that patient information may be at risk following the theft of a computer from a physician&#039;s office. The computer, used for research and stolen from the NYU School of Medicine Faculty Group Practice on January 27, contained the names, diagnosis, results of diagnostic tests, and clinical information gathered during office visits on 653 patients between April 1999 and September 2008. An additional 26 letters were sent to individuals whose medical record numbers, home addresses, dates of birth, occupation and, in two cases, Social Security numbers may have been contained on the computer. A suspect in the theft has been arrested but the stolen computer was not recovered at the time. NYU Langone has setup a hotline - 1-877-698-2333 - to help provide more information to those affected by the theft.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/new_york_university">New York University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/theft">Theft</category>
 <pubDate>Tue, 29 Mar 2011 23:29:07 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">652 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of Regina Web Server Compromised, No Data Exposed</title>
 <link>http://www.adamdodge.com/esi/university_regina_web_server_compromised_no_data_exposed</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/29/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.uregina.ca/&quot;&gt;University of Regina&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;None&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.cbc.ca/news/canada/saskatchewan/story/2011/03/29/sk-u-of-regina-computer-110329.html&quot;&gt;CBC&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of Regina recently announced that a security breach caused the university to shutdown its main web server. The breach appeared to effect only the web site. While the server was compromised university officials state that no confidential information was accessed by unauthorized individuals. Staff had corrected the problem causing the breach shortly after discovery.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_regina">University of Regina</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <pubDate>Tue, 29 Mar 2011 23:20:34 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">651 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of Kent Disability Services Email Discloses Patient Names</title>
 <link>http://www.adamdodge.com/esi/university_kent_disability_services_email_discloses_patient_names</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/18/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.kent.ac.uk/&quot;&gt;University of Kent&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 615
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.zdnet.com/blog/igeneration/university-email-disclosed-data-of-students-with-disabilities/8961&quot;&gt;ZDNet&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of Kent recently responded to a mistake that exposed the personal information of students registered with the Disability and Dyslexia Support Services at the university. The email, sent to inform students of arrangement being made for final exams, contained the names of 615 students in the CC field, exposing their names, email addresses and the fact that they receive support from Disability and Dyslexia Support Services to the other students. In a second email university officials apologized for the disclosure of protected information and had reported the incident to the Office of the Information Commissioner.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_kent">University of Kent</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Fri, 18 Mar 2011 11:59:34 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">649 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of York Web Site Leaks Data On Entire Student Population</title>
 <link>http://www.adamdodge.com/esi/university_york_web_site_leaks_data_entire_student_population</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/14/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.york.ac.uk&quot;&gt;University of York&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 17,904
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.nouse.co.uk/2011/03/14/university-leaks-private-details-of-entire-student-body/&quot;&gt;Nouse - University of York&#039;s Student Website&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of York is apologizing after a university website may have exposed personal student information. It was recently discovered that a student inquiry screening function enabled on the University of York web site disclosed personal details such as names, mobile phone numbers, home and university addresses, dates of birth, email addresses, and emergency contact information for 17,094 undergraduate, post-graduate and part-time students. The information was available to the general public and could be retried by entering as little as initials or course information. According to Stephen Town, University of York&#039;s Director of Information, the university rectified the situation as soon as it was notified and has notified the Information Commissioner about the breach. The university apologized for the incident and has launched an investigation to fully review data security at the university.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_york">University of York</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/educational_information">Educational Information</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Tue, 15 Mar 2011 02:13:07 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">647 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Zeus Computer Virus Exposes Virginia Tech Social Security Numbers</title>
 <link>http://www.adamdodge.com/esi/zeus_computer_virus_exposes_virginia_tech_social_security_numbers</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/11/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.vt.edu&quot;&gt;Virginia Tech&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: 370
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.roanoke.com/news/nrv/wb/279590&quot;&gt;The Roanoke Times&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Virginia Tech recently notified a number of current and former employees after a computer virus may have exposed personal information. The infected computer, located in VT&#039;s controller&#039;s office, contained the names and Social Security Numbers of 370 current and former employees. The Zeus infection, which occurred on Feb 15, was discovered on Feb 23 during an audit of computers that store Social Security numbers. In the letters to those affected the university is offering 12 months of credit monitoring. According to VT spokesman Mark Owczarski, there have been no reports of identity theft relating to the breach.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/virginia_tech">Virginia Tech</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <pubDate>Sat, 12 Mar 2011 02:31:22 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">646 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of Windsor Mailing Mixup Send Tax Slips To Wrong Addresses</title>
 <link>http://www.adamdodge.com/esi/university_windsor_mailing_mixup_send_tax_slips_wrong_addresses</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/10/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.uwindsor.ca&quot;&gt;University of Windsor&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 650
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.cbc.ca/news/canada/windsor/story/2011/03/10/wdr-u-of-windsor-tax-mistake.html&quot;&gt;CBC News&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of Windsor recently sent out notification letters after a mailing mixup exposed personal information. The university&#039;s Finance Department sent out 650 T4 tax slips, containing names, Social Insurance Numbers, and financial information, that were addressed to the wrong recipients. After discovering the mistake, the university sent out email messages and letters as well as placed phone calls to the recipients of these 650 tax slips and have received around half of them back. Executive Director of Communications Holly Ward said the university plans to increase communication efforts to get the rest of the 650 tax slips back.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_windsor">University of Windsor</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/financial_information">Financial Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Fri, 11 Mar 2011 01:09:56 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">645 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Stolen Midlands Tech Flash Drive Contains Personal Information</title>
 <link>http://www.adamdodge.com/esi/stolen_midlands_tech_flash_drive_contains_personal_information</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/9/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.midlandstech.edu&quot;&gt;Midlands Technical College&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Theft
&lt;/li&gt;&lt;li&gt;Number Affected: 500
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.databreaches.net/?p=17013&quot;&gt;DataBreaches.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.thestate.com/2011/03/09/1728561/midlands-tech-warns-employees.html&quot;&gt;The State&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Midlands Technical College recently notified employees after the theft a flash drive containing sensitive information. The flash drive, stolen from the college&#039;s human resource office, contained HR data on 500 employees. The flash drive was later returned to the college, but it did not contain any of the information that was on the drive when it was stolen. According to Midland&#039;s Director of Human Resources and Legal Counsel Crystal Rookard the individual responsible for taking the drive indicated they did not open or view any of the files on the drive. As a precaution, Midlands is offering one year of credit monitoring to affected employees.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/midlands_technical_college">Midlands Technical College</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/databreachesnet">DataBreaches.net</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/theft">Theft</category>
 <pubDate>Fri, 11 Mar 2011 00:36:52 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">643 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>[Update1]Former Eastern Michigan University Student Workers Investigated For Providing Personal Information To Third Party</title>
 <link>http://www.adamdodge.com/esi/former_eastern_michigan_university_student_workers_investigated_providing_personal_information_third_party</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/9/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.emich.edu&quot;&gt;Eastern Michigan University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Employee Fraud
&lt;/li&gt;&lt;li&gt;Number Affected: 64 (Updated)
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.databreaches.net/?p=17033&quot;&gt;DataBreaches.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.easternecho.com/index.php/article/2011/03/students_info_lifted_provided_to_third_party&quot;&gt;The Eastern Echo&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Update1 Source: &lt;a href=&quot;http://www.freep.com/article/20110401/NEWS06/104010363/Student-data-stolen-from-EMU-linked-tax-fraud&quot;&gt;Detroit Free Press&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Eastern Michigan University is notifying students after investigating inappropriate student records access by former student workers. The individuals under investigation appear have to inappropriately used their access records containing the names, dates of birth and Social Security numbers to provide the information of 45 students to an unauthorized third party. The EMU Police are investigating the incident with assistance from Federal authorities and EMU is not in a position to disclose details.  The individuals affected have been advised to place fraud alerts on their credit reports and the university has plans to notify the campus community when it is in a position to do so. &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update1&lt;/strong&gt;&lt;br /&gt;
Eastern Michigan University has identified 58 individuals whose information was accessed without authorization by two former student workers. In addition, 6 students have come forward after unable to file Income Tax Returns since someone had already used their Social Security numbers on other returns.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/eastern_michigan_university">Eastern Michigan University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/databreachesnet">DataBreaches.net</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/employee_fraud">Employee Fraud</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <pubDate>Thu, 10 Mar 2011 00:49:06 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">644 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>[Update1]UMass Amherst Health Service Breach Exposes PHI of 942 Individuals</title>
 <link>http://www.adamdodge.com/esi/umass_amherst_health_service_breach_exposes_phi_942_individuals</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/9/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.umass.edu&quot;&gt;University of Massachusetts Amherst&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: 942
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.come/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.healthdatamanagement.com/news/breach-notification-patient-hitech-hipaa-42120-1.html&quot;&gt;Health Data Management&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Update1 Source: &lt;a href=&quot;http://www.umass.edu/newsoffice/newsreleases/articles/123707.php&quot;&gt;UMass Press Release&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of Massachusetts Amherst began notifying individuals on March 7 after an investigation concluded a breach placed protected health information at risk. The breach, which involved a malware infection on a workstation that could have allowed unauthorized access, involved the names, insurance information, medical record numbers, medication information, physician information, pharmacist information and prescription history of 942 UMass Amherst Health Center patients. UMass staff became aware of the breach on October 28, 2010 and launched an investigation that was finished on Feb 1, 2011. The investigation discovered that the breach initially occurred on June 30, 2010. When asked about the 60 day notification requirement, the university believes it is in compliance since the notification was made less than 60 days after the investigation was concluded. A UMass spokesperson said the university feels the best process is to advise individuals to monitor their accounts and credit reports for unauthorized activity and will not offer free credit protection. Internally, UMass has implemented several steps to help increase security including installing automated software to detect unauthorized activity, increased staff training and will improve the identification of personal information on departmental computers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update1&lt;/strong&gt;&lt;br /&gt;
For more information, here is a link to the &lt;a href=&quot;http://www.umass.edu/newsoffice/newsreleases/articles/123707.php&quot;&gt;UMass Press Release&lt;/a&gt;.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_massachusetts/amherst">Amherst</category>
 <category domain="http://www.adamdodge.com/esi/institutions/university_massachusetts">University of Massachusetts</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <pubDate>Thu, 10 Mar 2011 00:20:39 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">642 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Stolen USB Drive Contained Information on Current, Former Western Michigan University Students And Staff</title>
 <link>http://www.adamdodge.com/esi/stolen_usb_drive_contained_information_current_former_western_michigan_university_students_and_staff</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/8/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.wmich.edu/&quot;&gt;Western Michigan University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Theft
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Hundreds&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.wwmt.com/articles/drive-1388207-university-hard.html&quot;&gt;WWMT&lt;/a&gt;, &lt;a href=&quot;http://www.mlive.com/news/kalamazoo/index.ssf/2011/03/some_western_michigan_universi.html&quot;&gt;mLive.com&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Western Michigan University recently began sending out notifications after a staff member discovered a USB drive was missing. The drive, used for backups in an unnamed WMU department, contained the names, addresses, student ID numbers and Social Security Numbers on hundreds of current and former faculty, staff and students. The drive was discovered missing on January 25 and, according to WMU spokesperson Cheryl Roland, the university is not sure if the drive was stolen or lost. The individuals affected by this incident have been offered 12 months of free credit monitoring. WMU&#039;s Public Safety department has investigated the incident but were unable to locate the missing drive.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/western_michigan_university">Western Michigan University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/theft">Theft</category>
 <pubDate>Wed, 09 Mar 2011 01:29:46 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">641 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>UMass Notifies Patients After Infection May Have Exposed University Health Services Records</title>
 <link>http://www.adamdodge.com/esi/umass_notifies_patients_after_infection_may_have_exposed_university_health_services_records</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/7/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.umass.edu&quot;&gt;University of Massachusetts Amherst&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: 942
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://datalossdb.org/incidents/3482-942-patients-names-health-insurer-names-medical-record-numbers-and-rx-info-on-infected-server&quot;&gt;DataLoss DB&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.healthdatamanagement.com/news/breach-notification-patient-hitech-hipaa-42120-1.html&quot;&gt;Health Data Management&lt;/a&gt;, &lt;a href=&quot;http://umass.edu/newsoffice/newsreleases/articles/123707.php&quot;&gt;University of Massachusetts News Release&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of Massachusetts recently notified individuals after staff discovered malware on a computer containing protected health information. The computer, used in UMass&#039;s University Health Services, contained the names, health insurance company and  medical record numbers on 942 UHS patients. In addition, the computer contained the prescription information, including medication, pharmacist, quantity, length of prescription and physician between Jan 2009 and Nov 2009 for these patients. The computer was originally infected in June 2010 and was corrected by the end of Oct 2010. A follow up investigation did not find any evidence that the protected health information was copied. In the letter, UMass officials advise affected individuals to monitor their health insurance information for any unusual activity but believes the likelihood of problems to be very low. UMass has responded to the incident by increasing training of UHS staff, installing automated software to discover malware infections and increasing efforts to discover protected information on desktops and workstations.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_massachusetts/amherst">Amherst</category>
 <category domain="http://www.adamdodge.com/esi/institutions/university_massachusetts">University of Massachusetts</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/source/osf_data_loss_database">OSF Data Loss Database</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <pubDate>Mon, 07 Mar 2011 11:40:29 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">648 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of South Carolina Breach Affected Thousands At All Eight Campuses</title>
 <link>http://www.adamdodge.com/esi/university_south_carolina_breach_affected_thousands_all_eight_campuses</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/4/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.uscsumter.edu/&quot;&gt;University of South Carolina, Sumter&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: 31,000
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.postandcourier.com/news/2011/mar/05/security-breach-at-usc/&quot;&gt;The Post and Courier&lt;/a&gt;, &lt;a href=&quot;http://www.thestate.com/2011/03/04/1723457/usc-warns-of-computer-breach-for.html&quot;&gt;The State&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The University of South Carolina recently notified individuals that their personal information may have been exposed during a January 2011 security breach. The notices were sent to 31,000 faculty, staff, students and retirees at all eight University of South Carolina campuses after the breach of a server that is used by USC campuses to share data and information. The university does not have any evidence that personal information was accessed during the breach. The affected server was taken offline within two hours of discovering the breach in January. However, notices did not go out until all individuals potentially affected had been identified on March 1. According to USC spokeswoman Margaret Lamb, the university has addressed the issue, notified the individuals affected and provided these individuals with information on how to protect themselves from identity theft. It is not clear how the breach occurred, but according to Lamb the cause was human error. &lt;/p&gt;
&lt;p&gt;&lt;em&gt;Updated to correct typos. Special Thanks to Allison Dolan for pointing out the error. - Adam &lt;/em&gt;&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_south_carolina/sumter">Sumter</category>
 <category domain="http://www.adamdodge.com/esi/institutions/university_south_carolina">University of South Carolina</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <pubDate>Sat, 05 Mar 2011 00:15:17 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">640 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Flinders University Employee Abuses Access, Steals $27 Million </title>
 <link>http://www.adamdodge.com/esi/flinders_university_employee_abuses_access_steals_27_million</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/4/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.flinders.edu.au/&quot;&gt;Flinders University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Employee Fraud
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;N/A&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://news.smh.com.au/breaking-news-national/man-admits-27m-theft-from-flinders-uni-20110304-1bhdh.html&quot;&gt;Sydney Morning Herald&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
A Filnders University cashier recently admitted to stealing over $27 million from the university. Christopher Wayne Fuss plead guilty to the charge he abused his position to falsify banking and financial records to steal $27,354,903 between 2008 and 2010. Fuss used two passwords to move the stolen money to different bank accounts including a personal account, the accounts of a few associates and even to a share trading account. Fuss used the money to purchase a $50,000 stake in a basketball team, donate $48,000 to a charity for the homeless and purchase a $1.7 million home. Fortunately Flinders University was able to recover more then $20 million and the expected shortfall of less then $1 million will not have any impact on the university being able to deliver programs.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/flinders_university">Flinders University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/employee_fraud">Employee Fraud</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/financial_information">Financial Information</category>
 <pubDate>Fri, 04 Mar 2011 13:08:24 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">639 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Google Indexes Missouri State University Students Social Security Numbers</title>
 <link>http://www.adamdodge.com/esi/google_indexes_missouri_state_university_students_social_security_numbers</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 3/3/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.missouristate.edu&quot;&gt;Missouri State University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 6,030
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.news-leader.com/article/20110303/NEWS04/110303007/0/_GALLERIES/?odyssey=nav|head&quot;&gt;News-Leader&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Missouri State University is working to notify students after personal information was discovered online. Nine lists containing the names and Social Security numbers of 6,030 College of Education students enrolled between 2005 and 2009 were posted to an unsecured server that allowed public Internet access. The lists were initially uploaded between October and November 2010 as part MSU&#039;s College of Education accreditation review. The lists were eventually indexed by Google which allowed the contents to show up as part of Google searches. According to Chief Information Officer Jeff Morrissey MSU is taking this breach very seriously and hopes the steps taken by the university will help prevent and misuse of the information. Thus far MSU has:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Removed the lists from the public web server and worked with Google to remove the information from Google&#039;s systems
&lt;/li&gt;&lt;li&gt;Contacted all 6,030 individual affected and offered identity theft protection at a negotiated rate of $7/person (~$42,210 total)
&lt;/li&gt;&lt;li&gt;Notified the Missouri Attorney General of the breach as required by state law
&lt;/li&gt;&lt;li&gt;Initiated disciplinary action against the employee that posted the information to the unsecured server
&lt;/li&gt;&lt;li&gt;Begun working with all college deans to ensure that policies and processes in place to secure university information are being followed&lt;br /&gt;
&lt;/li&gt;&lt;/ul&gt;</description>
 <category domain="http://www.adamdodge.com/esi/institutions/missouri_state_university">Missouri State University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Fri, 04 Mar 2011 00:42:16 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">638 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Imperial College Users Forced To Change Passwords Following Server Breach</title>
 <link>http://www.adamdodge.com/esi/imperial_college_users_forced_change_passwords_following_server_breach</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/25/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www3.imperial.ac.uk/&quot;&gt;Imperial College London&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Unknown&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://live.cgcu.net/news/2185&quot;&gt;Live!&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
The Department of Computing at Imperial College London recently warned staff and students that all users will need to change their passwords following a server breach. The breach affected a linux server at the college that is used in the network login process. In response to the breach, college staff shut down two servers, &quot;shell1&quot; and &quot;shell2&quot;, and sent a notice to users that everyone will need to change their passwords by 5PM GMT on February 25, 2011. Users that fail to changes their passwords by this deadline will have their accounts locked and will not be allowed to access any college services.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/imperial_college_london">Imperial College London</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/usernames_and_passwords">Usernames and Passwords</category>
 <pubDate>Fri, 25 Feb 2011 12:48:21 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">637 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>St George&#039;s University of London Server Breached</title>
 <link>http://www.adamdodge.com/esi/st_georges_university_london_server_breached</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/22/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.sgul.ac.uk/&quot;&gt;St George&#039;s University of London&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;N/A&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.guardian.co.uk/technology/2011/feb/22/hackers-st-george-university&quot;&gt;Guardian News&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
St George&#039;s University of London and the London Metropolitan Police have launched separate investigations into the breach of a St George&#039;s server that occurred in mid-February. Unknown individuals breached a database server run by St George&#039;s University of London medical school and used the access to send out a number of offensive email messages to users. One of the email messages claimed database was &quot;closed due to Aids&quot; and another claimed the St George&#039;s Administrative Board was involved with child pornography sting. The Primary Care Electronic Library (PECL) database is an online directory for doctors and nurses and does not contain any medical or sensitive information.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/st_georges_university_london">St George&#039;s University of London</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <pubDate>Wed, 23 Feb 2011 00:29:32 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">636 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Chapman University Discovers Personal Information Online</title>
 <link>http://www.adamdodge.com/esi/chapman_university_discovers_personal_information_online</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/22/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.chapman.edu&quot;&gt;Chapman University&lt;/a&gt;, &lt;a href=&quot;http://www.brandman.edu&quot;&gt;Brandman University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number affected: 13,000
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://latimesblogs.latimes.com/lanow/2011/02/data-leaked-on-chapman-university-students.html&quot;&gt;LA Times&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Chapman University has begun notifying students after a document containing personal information was discovered online. The document, discovered by a Chapman student, contained the names, Social Security numbers, student ID numbers and financial aid information on 11,000 current and former Chapman University and Brandman University students as well as information on 2,000 applicants. The student immediately reported the file to Chapman officials. The file apparently was accidentally moved to the insecure folder. The investigation also found that the student who reported the file was the only individual to access the information according to Chapman spokesperson Mary Platt. As a precaution, Chapman is offering credit monitoring services to those affected by this incident.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/brandman_university">Brandman University</category>
 <category domain="http://www.adamdodge.com/esi/institutions/chapman_university">Chapman University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/financial_information">Financial Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Wed, 23 Feb 2011 00:16:35 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">635 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>[Update1]Saginaw Valley State University Web Server Shutdown By Attack</title>
 <link>http://www.adamdodge.com/esi/saginaw_valley_state_university_web_server_shutdown_attack</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/7/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.svsu.edu&quot;&gt;Saginaw Valley State University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;N/A&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.wnem.com/news/26777947/detail.html&quot;&gt;WNEM&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Update1 Source: &lt;a href=&quot;http://www.saginawvalleyjournal.com/site/home/?p=1689&quot;&gt;Saginaw Valley Journal&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Saginaw Valley State University recently sent a notice to students following an attack on the university&#039;s web site. An unknown individual was able to gain access to the web server and used it send out large amounts of spam over several days. According to SVSU Executive Director of Information Technology Services Ken Schindler, there is no evidence that the attacker attempted to gain access to any other SVSU system. There was no personal or protected information on the web server but the campus was notified about the incident since the university&#039;s web site was taken offline to give staff time to repair the server.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update1&lt;/strong&gt;&lt;br /&gt;
Saginaw Valley State University are still working to upgrade the SVSU web server following the breach. According to SVSU Executive Director of Information Technology Services Ken Schindler, it appears that the hackers gained access through two security holes, one in a student organization&#039;s web page and the other in the content management system used on the server. One of the causes for the delay is the changes in latest version of the content management system which renders parts of the SVSU &quot;unacceptably broken&quot;. To help get the web page back online, SVSU has engaged Cast Iron Coding at an hourly rate of $125. Overall, Schindler is pleased with the way his staff has responded to the breach despite comments from the SVSU community questioning the performance of ITS staff. According to an SVSU spokesperson, the breach of the web server has not affected SVSU President Eric Gilbertson&#039;s confidence in Schindler.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/saginaw_valley_state_university">Saginaw Valley State University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <pubDate>Mon, 14 Feb 2011 12:20:19 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">632 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Solano Community College Hacking Investigating Uncovers Large Fraud Scheme</title>
 <link>http://www.adamdodge.com/esi/solano_community_college_hacking_investigating_uncovers_large_fraud_scheme</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/11/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.solano.edu&quot;&gt;Solano Community College&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Unknown&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.databreaches.net/?p=16814&quot;&gt;DataBreaches.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.solanotempest.net/campus/financial-aid-hacked-fraud-scheme-is-under-active-investigation-1.2000040&quot;&gt;Solano Tempest&lt;/a&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Solano Community College recently alerted students after discovering attempts to alter the college&#039;s financial aid website. According to Solano Community College Chief of Police Steven J Dawson, it does not appear that any students were affected by this fraud. While the investigation is still on-going, Dawson did state they are now aware of a &quot;fairly large&quot; student financial aid loan fraud scheme. There is at least one person of interest in the investigation but Dawson declined to identify this individual.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;</description>
 <category domain="http://www.adamdodge.com/esi/institutions/solano_community_college">Solano Community College</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/databreachesnet">DataBreaches.net</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/financial_information">Financial Information</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <pubDate>Fri, 11 Feb 2011 12:06:38 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">634 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of Washington Medical Records Sold At Surplus Furniture Store</title>
 <link>http://www.adamdodge.com/esi/university_washington_medical_records_sold_surplus_furniture_store</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/3/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.washington.edu/&quot;&gt;University of Washington&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 17 (via PHIPrivacy.net)
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.phiprivacy.net/?p=5818&quot;&gt;PHIPrivacy.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.king5.com/news/local/Private-UW-medical-records-sold-at-surplus-store-115147484.html&quot;&gt;KING5&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
KING5 was recently contacted by an individual that obtained University of Washington medical records while purchasing surplus furniture. The information is stored on 19 DVDs and one paper record and is comprised of mostly X-ray and MRI images of spines. KING5 Allen Schauffler was able to trace Vicki Goetz, whose name, along with phone number, was on a post-it note attached to a DVD. According to Goetz, she was a patient of the UW Bone and Joint Center and had two different surgeries there before finding another doctor. UW has stated that they are not sure how these files could have been left in surplus furniture but offers apologies to everyone affected. A UW spokesperson also said the university is reviewing policies and procedures and will work to tighten things up.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_washington">University of Washington</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/source/personal_health_information_privacy">Personal Health Information Privacy</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Thu, 03 Feb 2011 11:28:22 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">631 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>University of Iowa Staff Fired, Suspended After Inappropriate Records Access</title>
 <link>http://www.adamdodge.com/esi/university_iowa_staff_fired_suspended_after_inappropriate_records_access</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 2/3/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.uiowa.edu/&quot;&gt;University of Iowa&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Employee Fraud
&lt;/li&gt;&lt;li&gt;Number Affected: 13
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.press-citizen.com/article/20110203/NEWS01/110203005/3-fired-2-suspended-in-football-player-UIHC-breach&quot;&gt;Press-Citizen&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
University of Iowa officials have taken access against five staff members for their involvement in unauthorized access to hospital records. Three staff members have been fired and two have been suspended without pay for five days for inappropriately accessing the medical records of 13 UI football players being treated for rhabdomyolysis. Citing federal privacy laws, UI has not named the individuals involved, the information accessed or how the information was used.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/university_iowa">University of Iowa</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/employee_fraud">Employee Fraud</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <pubDate>Thu, 03 Feb 2011 06:00:00 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">630 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Hundreds of East Carolina University Higher One Cards Affected By Breach At Local Store</title>
 <link>http://www.adamdodge.com/esi/hundreds_east_carolina_university_higher_one_cards_affected_breach_local_store</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 1/26/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.ecu.edu&quot;&gt;East Carolina University&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Penetration
&lt;/li&gt;&lt;li&gt;Number Affected: &lt;em&gt;Hundreds&lt;/em&gt;
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.adamdodge.com/esi&quot;&gt;ESI&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www2.wnct.com/news/2011/feb/07/4/9oys-consumer-alert-ube-credit-card-system-hacked-ar-763259/&quot;&gt;WNCT&lt;/a&gt;, &lt;a href=&quot;http://www.wcti12.com/news/26865099/detail.html&quot;&gt;WCTI 12&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Hundreds of East Carolina University students that used their ECU issued Higher One debit and credit cards at the University Book Exchange in mid-January have reported unauthorized charges following a breach of the UBE&#039;s systems. The fraudulent charges are for a wide range of goods and services mostly around the Los Angeles area. Don Edwards, owner of UBE, said they do not know how this happened but are studying the situation. While the investigation is still ongoing, UBE has implemented additional security measures to help protect customer data. Fortunately for ECU students, all Higher One cards have zero liability protections so students are not responsible for fraudulent charges.&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/east_carolina_university">East Carolina University</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/source/educational_security_incidents_esi">Educational Security Incidents (ESI)</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/financial_information">Financial Information</category>
 <category domain="http://www.adamdodge.com/esi/type_incident/penetration">Penetration</category>
 <pubDate>Wed, 26 Jan 2011 12:24:05 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">633 at http://www.adamdodge.com/esi</guid>
</item>
<item>
 <title>Wentworth IT Student Information Posted Online</title>
 <link>http://www.adamdodge.com/esi/wentworth_it_student_information_posted_online</link>
 <description>&lt;p&gt;&lt;strong&gt;Quick Facts&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Date: 1/24/2011
&lt;/li&gt;&lt;li&gt;Institution: &lt;a href=&quot;http://www.wit.edu&quot;&gt;Wentworth Institute of Technology&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Type of Incident: Unauthorized Disclosure
&lt;/li&gt;&lt;li&gt;Number Affected: 1,300
&lt;/li&gt;&lt;li&gt;Source: &lt;a href=&quot;http://www.phiprivacy.net/?p=5688&quot;&gt;PHIPrivacy.net&lt;/a&gt;
&lt;/li&gt;&lt;li&gt;Abstract Source: &lt;a href=&quot;http://www.thebostonchannel.com/news/26599566/detail.html&quot;&gt;WCVB&lt;/a&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br /&gt;
Wentworth Institute of Technology is notifying current and former students after personal information was discovered online. According to the letter, the information found online included the names, Social Security numbers, dates of birth, allergies, medications, medical conditions and disability information on 1,300 current and former students. According to WIT spokesperson Jamie Kelly, the information was placed online by mistake and could only be found through a &quot;targeted search&quot; of the WIT  website.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Special Thanks to Dissent from &lt;a href=&quot;http://phiprivacy.net&quot;&gt;PHIPrivacy.net&lt;/a&gt;, &lt;a href=&quot;http://databreaches.net&quot;&gt;DataBreaches.net&lt;/a&gt; and &lt;a href=&quot;http://www.pogowasright.org&quot;&gt;PogoWasRight&lt;/a&gt; for letting ESI know about this incident - Adam&lt;/em&gt;&lt;/p&gt;
</description>
 <category domain="http://www.adamdodge.com/esi/institutions/wentworth_institute_technology">Wentworth Institute of Technology</category>
 <category domain="http://www.adamdodge.com/esi/year/2011">2011</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/medical_information">Medical Information</category>
 <category domain="http://www.adamdodge.com/esi/source/personal_health_information_privacy">Personal Health Information Privacy</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/personally_identifying_information">Personally Identifying Information</category>
 <category domain="http://www.adamdodge.com/esi/information_exposed/social_security_numbers">Social Security Numbers</category>
 <category domain="http://www.adamdodge.com/esi/type_of_incident/unauthorized_disclosure">Unauthorized Disclosure</category>
 <pubDate>Tue, 25 Jan 2011 00:30:00 +0000</pubDate>
 <dc:creator>Adam Dodge</dc:creator>
 <guid isPermaLink="false">626 at http://www.adamdodge.com/esi</guid>
</item>
</channel>
</rss>
