Credit card and bank account details could be found on one of the stolen computers

Nov 22, 2011 14:31 GMT  ·  By
One of the stolen comptuers stored sensitive information belonging to YMCA members
   One of the stolen comptuers stored sensitive information belonging to YMCA members

Some of the members of YMCA Metro Atlanta received letters in which they were advised to keep a close eye on their bank accounts after the association discovered on November 9 that several of their computers were stolen, including one that was packed with sensitive information.

Names, addresses, phone numbers, bank accounts and credit card information of members who were active in 2008 and who had transactions that required the data could be found on the device, reports WSBTV.

The letter to the involved individuals reveals that the computer was password protected and that the whole incident seems to be more about the stolen devices than their actual content.

However, members are recommended to take preemptive measures to prevent any unfortunate situations that might result from the theft.

“We recommend you closely monitor your financial accounts and review all transactions. You should be alert for any unauthorized activity and contact your financial institution promptly should that occur,” reads the letter.

The precise number of individuals exposed is not yet known, but they're not quite happy with the way the YMCA is handling the situation.

They believe that the YMCA should do more than just advise them on how to handle the situation.

"Just because a computer was stolen that's password protected, like they said, that doesn't mean anything. If the information is in the computer anybody can get it," Felix Ledee, one of the potential victims, told Channel 2's Amy Napier Viteri.

This is a scenario that shows it's not necessary for sensitive information to be targeted in a theft in order for innocent individuals to become exposed to identity fraud.

One conclusion, however, can be drawn from this. An encryption software is always recommended on devices that hold private data.

That way, no matter if a device gets left behind, dumped accidentally or even stolen, the crooks will have a hard time getting to the information.