The Children’s Center of Hamden (“TCCOH”) is providing notice of a recent data security incident that may have involved personal and/or protected health information. TCCOH takes the privacy and security of all information within their possession very seriously. TCCOH has sent notice of this incident to potentially affected individuals and provided resources to assist them.

Cyber Technology Insights : Gigamon Visualyze Bootcamp 2025: Unravel Hybrid Cloud with Deep Observability and AI

On December 28, 2024 TCCOH discovered unusual activity within our digital environment, and immediately initiated an investigation of the matter. TCCOH engaged independent cybersecurity experts to assist with the process. As a result of the investigation, TCCOH determined that certain files may have been accessed and acquired without authorization on June 29, 2025. TCCOH then undertook a review of those files to determine the individuals whose information could have been involved and the nature of the potentially affected information. That process was completed on August 7, 2025, at which time TCCOH took additional steps in furtherance of providing written notice. Notice of this event was mailed directly to potentially affected individuals with an available mailing address on August 28, 2025.

Cyber Technology Insights : DTEX Names Mike Price CRO to Drive Global Growth in AI-Powered Insider Risk and Data Security

Based on our review of the potentially affected data, the following information varied per individual but may have been involved in the incident: Name, date of birth, Social Security number, license or passport information, biometric data, and diagnosis or treatment information.

As soon as they discovered this incident, TCCOH took the steps described above and implemented measures to enhance security and minimize the risk of a similar incident occurring in the future. We have established a toll-free call center to answer questions about the incident and address related concerns.

Cyber Technology Insights : CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

Source: prnewswire

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com