DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Massachusetts DESE finds Tewksbury data breach violated state law

Posted on July 23, 2015 by Dissent

In April, this site noted what I described as a “horrific” breach involving the Tewksbury public schools. A document included in a 222-page School Committee packet that had been publicly available online not only exposed personal and private details for the out of district placements of 83 special education students, but it rated their parents according to their “cooperativeness” with the district. Although the students’ names had been replaced with numbers, it was possible to identify at least some of the children.

A member of the school committee whose child’s data was exposed in the breach and who, herself, had been rated as “uncooperative” by the district as a parent, resigned from the committee the following month, citing the incident as part of her reason.

Now the Department of Elementary and Secondary Education has completed its investigation of the incident. Chelsea Feinstein reports:

In a letter dated June 18 and presented to the School Committee last week, representatives of DESE wrote that the district must provide training to all district staff before the beginning of the upcoming school year. School Committee participation is optional.

In addition, the district is required to submit a copy of the training agenda and signed attendance sheets to the DESE, along with a copy of the district’s policies and procedures.

“The department’s review of the case documentation, including a review of the information that was posted on the district’s website in March 2015, shows information that could have enabled a person who does not have personal knowledge about the students to make a reasoned identification of a particular student,” the letter says. “The combination of all types of information made public which students were placed out of district because of their special education status.”

Read more on The Lowell Sun.

This may not seem like a huge deal to those more familiar with mega-breaches involving millions of people’s health records or financial records, but it’s actually quite unusual for a state to come down on a public school district like this and to require corrective training. Kudos to Ellen Chambers and SPEDWatch for filing the complaint with the state.


Related:

  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Education SectorExposureU.S.

Post navigation

← More than 1,000 employees in Anchorage veterans administration notified of breach due to employee error
Is there a “constitutional right to informational privacy”? as claimed by NTEU’s data breach lawsuit? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.