Update: Another VA computer missing
Missing from a subcontractor's office, it contains personal data on 38,000 vets
Computerworld - Editor's note: Due to an editing error, an earlier version of this story incorrectly said the stolen computer was a laptop.
The U.S. Department of Veterans Affairs yesterday announced that a desktop computer containing the personal information on 38,000 veterans is missing from the office of Unisys Corp., the subcontractor hired to assist in insurance collection for the VA's medical centers in Pittsburgh and Philadelphia.
"VA's inspector general, the FBI and local law enforcement are conducting a thorough investigation of this matter," Secretary of Veterans Affairs R. James Nicholson said in a statement. Unisys told the VA on Aug. 3 that the computer was missing from its Reston, Va., offices. The VA immediately sent a team to Unisys to help search for the missing computer and to determine exactly what information it contained.
The VA said it believes the data involved is limited to veterans who received treatment at the two Pennsylvania medical centers during the past four years. According to the agency, the desktop computer may have contained patients' names, addresses, Social Security numbers and dates of birth, the names of their insurance companies, billing information, dates of military service and claims data that may include some medical information.
The VA estimates that the computer contained information on approximately 5,000 patients treated at a center in Philadelphia, approximately 11,000 patients treated at a Pittsburgh facility and about 2,000 deceased patients. The VA is also investigating the possibility that the computer contained information on another 20,000 people who received care through the Pittsburgh medical center.
VA officials are also working with Unisys about notifying those who may be affected and offering them credit-monitoring services.
Unisys officials today continued their search for the missing desktop. The company can't say for certain that it was stolen and is not ruling out the possibility that it had been misplaced. "We can't find it. It's missing from where it's regularly housed and the building has been swept several times," said Lisa Meyers, a company spokeswoman.
Unisys is continuing to review security tapes, records and logs and conduct interviews. "It is ongoing," said Meyers of the company's search for the desktop.
The Reston facility from which the computer disappeared has been used by Unisys since June 2004, said Meyers. There have been no previous reports of thefts from it.
The work being done for the VA wasn't classified, although Unisys does work for other government agencies that is classified, and the building has security guards working around-the-clock, with video monitoring of exits and entrances -- including elevators -- as well as a need for key cards.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts