Posted by:
admin
15 years, 10 months ago
It's a long standing joke that no matter where you move, your alumni association can find you. That may change after OU's experience with their data breaches as chronicled here. Of course, they use your Social Security Number to track you down.
"Tampke said the reason for holding the numbers is "primarily to track lost alumni." When an alum moves and doesn't leave a forwarding address, she said, OU will give the person's Social Security number to a tracking service, to find the new residence."
So, for those keeping track, now the service has your SSN as well as the university.
OU is getting some very angry email that indicate their alumni contributions will not be on the increase.
"If there is any financial damage or compromise to my other accounts stemming from this breach of security, I will hold Ohio University at fault and seek legal counsel to recover any and all loss, with punitive damages," one alum threatened. "I will further network with my other alumni to seek a class-action suit for the same."
Read the article to see teh reactions that won't make it past our new trackback spam filters. One alum simple sent in a bill.
Seems pretty simple to me: Universities should only keep SSNs for alumni that have not given. ;).
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)