BreachExchange mailing list archives
Re: (update) UT: U. patient records recovered
From: "TS Glassey" <tglassey () earthlink net>
Date: Thu, 3 Jul 2008 07:16:37 -0800
----- Original Message ----- From: "Michael Hill, CITRMS" <mhill () idtexperts com> To: "Jake Schroeder" <jschroeder () wavelink com>; "lyger" <lyger () attrition org>; <dataloss () attrition org> Sent: Wednesday, July 02, 2008 7:26 PM Subject: Re: [Dataloss] (update) UT: U. patient records recovered
You have to love this case.Winder said the courier will not face charges and is instead considered a victim in the case.How is the courier a victim when their employee violated company policy and probably some state and/or federal laws as well?One lawsuit filed by Christensen & Jensen against Perpetual Storage and the U. demands the university extend credit monitoring for at least five years; offer five years worth of fraud protection that would alert patients before new lines of credit are opened; and provide victims money and legal counsel to restore their credit and identities and money to reimburse them for money lost due to identity theft.Are there any identity theft protection plans that include access to legal counsel?
Not that I am aware of. If you asked a lawyer what to do most of them couldnt tell you either... Unless they are cutting edge and have experience in this area. This is all new material for many of them.
Before this afternoon's news conference, attorney Scot Boyd, who is representing 11 plaintiffs and potentially "hundreds" more in that lawsuit, couldn't say whether the recovery of the tapes would nullify the lawsuit. But in court filings, he wrote that it wouldn't, noting the thieves could copy the information and return the original tapes.Can you detect whether a tape has been copied? Can any techies out there answer that?
Probably not. If it had been a disk drive there are some SMART control's that could be used with a proper Disk Management Regimen to tell if a disk had been powered up since its last shutdown, but copying tapes is not likely to be something that can be determined.
In a separate lawsuit against Perpetual, patient Thelma Keachie demands $8 million to monitor and repair credit reports for at least five years and track the use of other private information for a lifetime.
I dont get that she is entitled to a lifetime's tracking. As it happens most of our financial info is already out in the open. So my take is that this wont fly too well. Todd Glassey CISM CIFI
Now that's a solution. Mike Michael Hill Certified Identity Theft Risk Management Specialist www.idtheft101.net 404-216-3751 "If You Think You're Not At Risk, Think Again!" NOTICE: This email and any attachment to it is confidential and protected by law and intended for the use of the individual(s) or entity named on the email. This information and all email information from the sender is not legal advice nor legal representation and should not be construed as legal advice nor legal representation. Check with your attorney in your State for legal advice. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination or distribution of this communication is prohibited. If you have received this communication in error, please notify the sender via return email and delete it completely from your email system. If you have printed a copy of the email, please destroy it immediately. _______________________________________________ Dataloss Mailing List (dataloss () attrition org) http://attrition.org/dataloss Tenable Network Security offers data leakage and compliance monitoring solutions for large and small networks. Scan your network and monitor your traffic to find the data needing protection before it leaks out! http://www.tenablesecurity.com/products/compliance.shtml
-------------------------------------------------------------------------------- No virus found in this incoming message. Checked by AVG. Version: 8.0.134 / Virus Database: 270.4.3/1529 - Release Date: 7/1/2008 7:23 PM _______________________________________________ Dataloss Mailing List (dataloss () attrition org) http://attrition.org/dataloss Tenable Network Security offers data leakage and compliance monitoring solutions for large and small networks. Scan your network and monitor your traffic to find the data needing protection before it leaks out! http://www.tenablesecurity.com/products/compliance.shtml
Current thread:
- UT: U. patient records recovered lyger (Jul 02)
- (update) UT: U. patient records recovered Jake Schroeder (Jul 02)
- Re: (update) UT: U. patient records recovered Michael Hill, CITRMS (Jul 02)
- Re: (update) UT: U. patient records recovered TS Glassey (Jul 03)
- Re: (update) UT: U. patient records recovered Al Mac Wheel (Jul 03)
- Re: (update) UT: U. patient records recovered TS Glassey (Jul 03)
- Re: (update) UT: U. patient records recovered Al Mac Wheel (Jul 03)
- Re: (update) UT: U. patient records recovered TS Glassey (Jul 03)
- Re: (update) UT: U. patient records recovered Michael Hill, CITRMS (Jul 02)
- (update) UT: U. patient records recovered Jake Schroeder (Jul 02)