Laptop with credit card info for 80,000 DOJ workers stolen
It was taken from a Virginia travel agency three weeks ago
Computerworld - The FBI and Fairfax, Va., police are investigating the theft of a laptop containing the names and credit card numbers of about 80,000 U.S. Department of Justice workers.
Gina Talamona, a DOJ spokeswoman, said the laptop was stolen between May 7 and May 9 from the Fairfax, Va., headquarters of Omega World Travel, a travel agency used by the DOJ for its employees.
The computer did not contain employees' personal information, such as home addresses, office addresses or Social Security numbers, Talamona said. All the data was password-protected to prevent unauthorized access.
"We don't provide to Omega the kind of information that's typically used for identity theft," she said.
The credit cards were issued by J.P. Morgan Chase & Co. and by Bank One Corp., she said, and since the theft occurred, there have been "no indications that there has been any [unauthorized] activity on the cards."
The DOJ did not cancel all of the credit cards immediately because many DOJ workers are traveling and would be affected by a mass cancellation during their trips, Talamona said. The agency is working with affected workers to determine how best to protect their accounts, she said.
At the DOJ's request, Omega World Travel is bolstering security to better protect such information in the future, she said. The travel agency has added unspecified physical security measures and an off-hours security patrol. It is also doing a complete security review.
Electronic Data Systems Inc., a prime contractor for the department, has also put measures in place to prevent the stolen laptop from being connected to the DOJ's network, Talamona said.
Spokesmen for the Fairfax County police and for Omega World Travel declined to comment today on the incident.
The incident follows a recent string of data theft cases. Last week, Bank of America Corp. officials confirmed that information on about 60,000 customers was stolen by a New Jersey data-theft ring, which is thought to be at the center of the largest U.S. banking security breach in history (see story).
Other data theft cases have involved lost backup tapes, stolen laptops and desktop PCs, and network intrusions.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts