DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Marriott notifies associates of breach at unnamed vendor

Posted on November 2, 2019 by Dissent

In a year that has seen a number of reports that suggest how costly a past data breach may be for Marriott in Canada as well as the U.K. and U.S., Marriott is disclosing yet another breach.

On October 30, Marriott International notified the California Attorney General’s Office of a breach at an unnamed vendor that impacted some of its associates.  Their notification described the incident this way:

Marriott learned on September 4, 2019, that an unknown person gained access to information about certain Marriott associates by accessing the network of an outside vendor formerly used by Marriott. Once we became aware, Marriott immediately confirmed that the vendor was taking appropriate to steps to investigate the incident. The vendor reported that it was working with a forensic firm and had notified law enforcement. This vendor served as Marriott’s agent for receiving service of official documents, such as subpoenas and court orders. A document containing your information was sent to this vendor, and it was accessed during the incident. This incident did not impact the security of Marriott’s internal HR systems or platforms.

What Information Was Involved
The information in the document received by this vendor that contains your information includes your name, address, and Social Security number.

The date of the breach at the vendor’s was not disclosed.

Marriott is offering those notified one year of complimentary protection services with Experian’s® IdentityWorksSM Credit 3B program.

In an Appendix to their submission, Marriott disclosed that the documents that were accessed included documents relating to 1,552 California residents. The total number of individuals impacted was not disclosed.  Marriott also noted it “has already
terminated its relationship with the vendor,” and the vendor has confirmed that it
securely removed all information regarding Marriott associates from its network.

DataBreaches.net sent an email inquiry to Marriott seeking clarification as to whether the vendor was a former vendor at the time of the breach or only became a former vendor because of the breach. This site also inquired as to the total number of associates, nationwide, that were impacted. Other details were also requested. This post will be updated if a response is received.

Update:  On Nov 4., this site received a response from Jeff Flaherty, Global Communications & Public Affairs for Marriott. They did not answer any of this site’s questions:

Although we understand your interest, Marriott’s notification that you saw on the California Attorney General’s website contains the information that Marriott is providing. Marriott is notifying all associates involved. If you do choose to use any of the information provided, please attribute to a Marriott spokesperson. Thank you.

 


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
Category: Breach IncidentsBusiness SectorSubcontractor

Post navigation

← Brooklyn Hospital Center notifies patients after data could be not be recovered after malware attack
Ca: Digital pirates search for prey in Southwestern Ontario →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.