DoD Sued over Stolen Tricare Tapes

January 2012
Information Management Journal;Jan/Feb2012, Vol. 46 Issue 1, p6
The article focuses on a 4.9 million dollar lawsuit against the U.S. Department of Defense (Dod) by Tricare Inc. beneficiaries and four military families about stolen tapes containing sensitive personal information. The tapes were stolen from a car in San Antonio, Texas. The Tricare stated that the data on the tapes may have included Social Security numbers, addresses and phone numbers from the health records. As stated by a Science Applications International Corp. (SAIC) spokesman Vernon Guidry, stolen tapes were not encrypted to match federal standards.


Related Articles

  • Cat's Out. Andersen, Steven // InsideCounsel;Jun2011, Vol. 22 Issue 234, p30 

    The article discusses a court case involving a former employee of U.S. finance company Goldman Sachs, Sergey Aleynikov, in 2009. The case focused on the encryption of software that the firm acquired in 1999 by the employee. It reports that U.S. District Court Judge Denise L. Cote ruled that...

  • SAIC in the News.  // Military Technology;2010, Vol. 34 Issue 12, p36 

    The article offers news briefs about Science Applications International Corp., including a new prime contract received by the company from the Space and Naval Warfare Systems Center Atlantic to provide C4ISR engineering and software integration support services, and a prime follow-on contract...

  • Tricare Young Adult.  // Army Magazine;Jun2011, Vol. 61 Issue 6, p9 

    The article reports that the U.S. Department of Defense (DoD) has announced the availability of Tricare Young Adult (TYA) insurance coverage program on May 1, 2011.

  • A CLASSROOM PROJECT ON PROTECTING SOCIAL SECURITY NUMBERS FROM IDENTITY THEFT. Zhu, Katherine; Yujun Yang // Mathematics & Computer Education;Fall2009, Vol. 43 Issue 3, p216 

    The article discusses research on the application of encryption as a method to protect personal information and prevent identity theft on social security numbers (SSN). Encryption of SSN will allow mathematics students to create other unique numbers that can be used for non-social security...

  • Exposures. Wolfe, Daniel // American Banker;6/11/2008, Vol. 173 Issue 112, p5 

    The article reports on two cases of institutions that have put people at risk of identity theft. A laptop that contained social security numbers of 72,000 people at Stanford University was reported missing. "Computerworld" reported that the information was not encrypted. The Selco Community...

  • Feds encrypt 800,000 laptops. Marsan, Carolyn Duffy // Network World;5/26/2008, Vol. 25 Issue 21, p11 

    The article reports that federal agencies have bought 800,000 licenses for encryption software through the fedral Data at Rest Encryption (DAR) program, jointly run by the U.S. General Services Administration and Department of Defense. It relates that numerous news headlines of computer and...

  • Defense Pilot Will Pave Way for Department-Wide PKI Use. Jackson, William // Program Manager;Mar/Apr2000, Vol. 29 Issue 2, p57 

    Reports that the United States Defense Department has chosen General Dynamics Communications Systems to conduct a one-year pilot public-key encryption pilot project. Levels of risk; CyberTrust's provision of digital certificates; Smart cars from Datakey Inc.

  • Iridium to P2T.  // Mobile Radio Technology;May2005, Vol. 23 Issue 5, p8 

    The article reports that Iridium Satellite has planned to offer push-to-talk service to the U.S. Department of Defense by tine end of the year and to other customers during 2006. The system has been designed to let hundreds of users worldwide join a talk group secured by end-to-end encryption.

  • Military Cyber Policy: A Legal Primer. Rippeon, Ryan A. // U.S. Naval Institute Proceedings;Jun2015, Vol. 141 Issue 6, p82 

    The article offers information related to military cyber policy and system-monitoring of navy cyber defense operation. Topics discussed include the need of changing the U.S. Department of Defense (DOD) policy for eliminating loopholes, deleting a higher classification email sent to a lower...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics