![]() ![]() Researchers noted a higher concern for the call notes because of detailed reports and discussions with abuse victims and patients, including the problems reported, PII of people informing them of the concerns, the specific conditions of the people in need of assistance, and the names of the abusers for specific instances.Īccording to their website, LA County 211 “is the hub for community members and community organizations looking for all types of health, human, and social services in Los Angeles County.” The researchers noted that the organization assists up to 500,000 individuals annually. Readily available information included 211 system employees' access credentials, contacts’ email addresses, Social Security numbers, and the organization's registered sources. ![]() Researchers found the files stored in an Amazon S3 bucket subdomain labeled “lacounty.” And while not all the stored files were downloadable, around 200,000 rows of CSV exports and Postgres database backups of data were exposed. A misconfigured Amazon AWS S3 storage bucket leaked downloadable databases containing rows of information concerning their employees, informants, and persons in need as the settings were programmed to be public and anonymously accessible. Security researchers discovered LA-based non-profit organization Los Angeles County 211 accidentally exposed approximately 3.5 million records, including personally identifiable information (PII) and call notes logged between 20. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |