Missing laptop with data on 540,000 N.Y. state workers found
The computer had been missing since May 9
Computerworld - A laptop computer containing personal information on more than half a million New York state workers has been found after it disappeared May 9 from the offices of a third-party data management company.
In a statement today, the company -- Chicago-based CS Stars -- said the laptop belonging to the New York Special Funds Conservation Committee "has been found and secured."
Al Modugno, a spokesman for CS Stars, said he was notified today of the laptop's recovery, though he would not comment further on whether it had been lost or stolen, adding that the incident is still being probed by law enforcement authorities.
"That's part of what the FBI is still investigating," Modugno said. "I can't really give you any more detail on that."
Modugno said the FBI told CS Stars that the agency is reasonably certain that there was no improper use of any of the data stored on the laptop. The FBI has the laptop and is still analyzing it, he said.
The laptop contains the names, addresses and Social Security numbers of about 540,000 state employees.
The New York Special Funds Conservation Committee is a nonprofit organization that deals with special funds related to the New York State Workers' Compensation Board.
John Sullivan, a spokesman for the board, today said his agency had been notified that the laptop was found.
Last week, CS Stars mailed letters to the 540,000 people whose data might have been affected by the incident, according to the company. Each of the affected workers was offered credit-monitoring services for 12 months and $25,000 in identity theft insurance, Modugno said.
The delay between the disappearance of the laptop on May 9 and the mailing of the letters last week occurred because the CS Stars employee who determined that the laptop was missing didn't report it to his company until June 19, Modugno said. An internal investigation verified that the machine was missing, then the state agency was notified of the problem on June 29, he said.
The FBI was notified the following day.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts