DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NV: Washoe County School District notifies parents of stolen student info

Posted on April 2, 2010 by Dissent

A reader informed DataBreaches.net that on February 15, a burglary at a locked Washoe County School District building resulted in the theft of two flash drives containing limited personal information on a number of the district’s students.

On March 11, the Department of Student Health Services notified parents and guardians about the theft of the unencrypted drives, which reportedly contained the names, dates of birth, and schools the students re-enrolled in or withdrew from between January 1, 1986 and February 12, 2010. According to the letter signed by Dana Balchunas, Director of Student Health Services, the flash drives were used to store information about the location of student health records. The district stated that it is required, by its own policy, to retain health records for a “period of time after students graduate.”

When asked whether any other kind of information was on the stolen drives, a Washoe County School District spokesperson informed DataBreaches.net by e-mail that no contact information, Social Security Numbers, or Medicaid ID numbers were on the flash drives:

“No student records as defined by FERPA, HIPPA (sic), or NRS [Nevada Revised Statutes] 603A were on the flash drives.”

According to the spokesperson, the flash drives, which were used as backup devices, contained the described information on 26,152 students. The district’s current enrollment is approximately 60,000. In their statement to DataBreaches.net, the spokesperson expressed the district’s regret over the incident and indicated that the district was bolstering its security to prevent future recurrences:

The Washoe County School District regrets that the limited information was released, but we remind everyone that it was due to a burglary in one of our facilities, not from negligence on any employee’s part. Additional security steps have been implemented in that facility and all these data devices are now encrypted.


Related:

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
Category: Breach IncidentsEducation SectorTheft

Post navigation

← Navy took more than a year to announce personal data breach
The DOJ Criminal Division’s Laptop Computer Encryption Program and Practices – Audit Report →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found
  • Seminole County Schools recovers money taken by hackers
  • Minnesota National Guard deployed; St. Paul declares state of emergency in response to cyberattack
  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.