Please ensure Javascript is enabled for purposes of website accessibility

'No data compromised' following Oklahoma Department of Veterans Affairs investigation


No personal identifiable information was discovered within the SAA applications. (Getty Images)
No personal identifiable information was discovered within the SAA applications. (Getty Images)
Facebook Share IconTwitter Share IconEmail Share Icon

OKLAHOMA CITY (KOKH) - Officials with the Oklahoma Department of Veterans Affairs (ODVA) have announced an investigation into the February data compromise to the Oklahoma Veterans Commission has concluded.

The state’s chief information officer told members of the Oklahoma Veterans Commission in February that six databases maintaining veterans’ personal information were being managed on a site outside the state network.

In a summary report to ODVA leadership, the agency noted that "No PII (Personal Identifiable Information) was discovered within the SAA applications. PII was, however, discovered in the website databases on the Bluehost server."

The ODVA/SAA website was primarily maintained by an ODVA contractor who provided web development services for the agency. In April 2020, migration of the website from the Bluehost server to an OMES system was completed.

“Thank you to Rear Admiral Slavonic for bringing in OMES Oklahoma Cyber Command to quickly investigate and protect sensitive ODVA information,” said Jerry Moore, state chief information officer and OMES deputy director. “We found no evidence that Oklahoma veterans' data was compromised, and the systems have since been secured and now operate within the state security standards.”

"We greatly appreciate OMES and their resolve to get to the bottom of this potentially serious situation in a swift, yet thorough manner" Slavonic said Wednesday. "While it was discovered that the potential for a breach existed, we are relieved to learn that no data was in fact compromised."

For more local news delivered straight to your inbox sign up for our daily newsletter by clicking here.

Loading ...