DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Rogue Penn Mutual employee may have accessed and disclosed customer personal and financial information

Posted on March 9, 2011 by Dissent

Penn Mutual Life Insurance reports that a former employee may have accessed and disclosed customer information.

Through their lawyers, Penn Mutual informed the New Hampshire Attorney General’s Office on February 1 that despite their forensic efforts, they were not able to determine definitively which customer accounts were improperly accessed, but they believe that the employee may have improperly accessed and disclosed names, addresses, Social Security numbers, dates of birth, and bank account information for “a number of our accounts.”

The matter was referred to federal prosecutors in the Eastern District of Pennsylvania and the Secret Service is also involved in the investigation.

Because they could not determine precisely which accounts were accessed improperly or disclosed, the company decided to notify all customers whose accounts the employee was known to access, even though many of those accesses were likely appropriate and job-related.

To their credit, the opening paragraph of their notification to customers minces no words:

We are writing to make you aware that a former employee of the Penn Mutual Life Insurance Company (“Penn Mutual”) accessed unlawfully from our records personal information of some of our clients and disclosed that information to others.

The rest of their notification later is written is a no-nonsense and very human tone, and even provides them with the Secret Service phone number and case number.

If I have any criticisms of their post-breach handling and reporting, it’s that; (1) they do not indicate when the breach(es) occurred – how long was this person in their employ and for how long might this have been going on?  (2) what steps have they taken  to prevent future recurrences of this type of incident? and (3) their phone support is only available during working hours Mon-Friday instead of having some evening or weekend hours for phone support.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsBusiness SectorInsiderU.S.

Post navigation

← Access privileges error on Chapman University file allowed viewing of file with sensitive student information
Audit finds confidential data on NJ state computers sent to auction →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.