Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Mike Simon (mikeasimongmail.com)
Date: Wed Apr 16 2008 - 10:34:15 CDT
Typically, even a FOIA request can be refused while police are investigating
the crime. Something to do with not alerting the criminals to exactly what
the police know and what actions they are taking.
On Wed, Apr 16, 2008 at 8:16 AM, Chris Walsh <chriscwalsh.org> wrote:
> Time for somebody to FOIA the Virginia AG's office.
> Breaches must be centrally-reported to the AG there.
> On Wed, Apr 16, 2008 at 07:49:57AM +0000, security curmudgeon wrote:
> > ---------- Forwarded message ----------
> > A laptop stolen from a University of Virginia employee contained
> > information about more than 7,000 students, staff and faculty members.
> > Stolen from an unidentified employee from an undisclosed location in
> > Albemarle County, the laptop contained a confidential file filled with
> > names and Social Security numbers.
> > "As soon as we learned about the theft, we starting moving as quickly as
> > we could," UVa spokeswoman Carol Wood said.
> > UVa mailed out letters Monday to each person affected by the data
> > The university will publicly announce the incident today. The Albemarle
> > County Police Department is investigating the theft. At the police
> > department's request, UVa is releasing few details about the incident.
> > Wood declined to say when the burglary occurred or which academic
> > departments were affected. She did say, however, that the theft did not
> > occur on UVa's campus.
> Dataloss Mailing List (datalossattrition.org)
> Tenable Network Security offers data leakage and compliance monitoring
> solutions for large and small networks. Scan your network and monitor your
> traffic to find the data needing protection before it leaks out!
Dataloss Mailing List (datalossattrition.org)
Tenable Network Security offers data leakage and compliance monitoring
solutions for large and small networks. Scan your network and monitor your
traffic to find the data needing protection before it leaks out!