This document if provided for educational and informational purposes and is not intended to provide, nor does it constitute legal advice.

Size: px
Start display at page:

Download "This document if provided for educational and informational purposes and is not intended to provide, nor does it constitute legal advice."

Transcription

1 Instructions for Completing the Sample Breach Notification Template The attached sample Breach Notification Template is intended to be used to assist in drafting notices required under the HIPAA HITECH Act Breach Notification Rules. The following are instructions for completing the sample Breach Notification Template. It is important to note that the facts and circumstances surrounding any given breach are unique. As a result, the sample Breach Notification Template requires significant customization to the facts of the specific breach. Each numbered instruction below corresponds to a highlighted and numbered section in the Breach Notification Template. Please note that the examples and sample language provided below are intended to be examples only, and not intended to be an exhaustive list of potential descriptors. 1. Patient name: For breaches involving multiple patients who will each receive the same notice, it is appropriate to insert the word "Patient." 2. Description of the incident: Appropriate descriptors of the incident could include "access to," "use of," "disclosure of," "loss of" or "theft of." 3. Summary statement of the overall purpose for the notice: The purpose of this section is to generally inform the recipient of the purpose of the letter. The following are examples of statements that can be inserted depending on the facts: "Although we are not aware of any misuse of your information, we are notifying you to advise you of the incident and steps you can take to protect your information from misuse." In the event that there is evidence of a misuse of the information or potential for misuse, the following may be inserted: "We are notifying you of this incident to inform you of the incident, and describe steps we are taking in response, so that you are able to take prompt action to help protect your information from misuse." 4. Date of the breach: If the incident involves a range of dates, then describe the range (e.g., "between and "). If the exact date is not known, indicate that an estimated date is being provided. 5. Summary description of the incident: Insert a brief statement describing the incident (e.g., a fax containing PHI was inadvertently sent to the wrong number, or a laptop computer containing PHI was stolen). 6. Description of the types of PHI that were involved in the incident: List the types of identifiers and PHI that were involved (e.g., whether name, Social Security Number, date of birth, home address, account number, diagnosis, disability code, or other types of information were involved). PHI should be described in terms of categories only - do NOT insert any actual PHI.

2 7. Discovery Date: A breach is considered to be discovered on the first day that the breach is known, or by exercising reasonable diligence would have been known, to any person who is either a Workforce Member or agent of the Covered Entity, other than the person who committed the breach. For breaches discovered by Business Associates: In the event that a breach occurs to a Business Associate, the Covered Entity is deemed to have "discovered" the breach on the date it is notified of the breach by the Business Associate, UNLESS the Business Associate is an agent of the Covered Entity (under principles of federal common law of agency). If a Business Associate is an "agent" of the Covered Entity, the Business Associate's knowledge of the breach is imputed onto the Covered Entity on the date the Business Associate discovered the breach. 8. Law enforcement-requested delay in notification: In the event that law enforcement requested that notification be delayed, insert the following: "At the request of law enforcement, it was necessary to delay providing you with notification because notification would have impeded a criminal investigation or caused damage to national security." 9. Incident reported to law enforcement: In the event that the incident involved a potential crime and was reported to law enforcement, insert the following: "The incident was reported to law enforcement upon discovery, and together with law enforcement, we began investigating the matter." 10. Summary of conclusions of the investigation or initial investigation: Insert a statement summarizing the conclusions of the internal investigation. For example, insert the findings of a completed investigation or the initial findings of the investigation if it is not completed and will be ongoing (e.g., "although the information was inadvertently [insert appropriate descriptor (e.g., accessed, used or disclosed)], we do not believe it was further used or disclosed for inappropriate purposes" or "our initial investigation found."). If the investigation is ongoing, see also Instruction Summary regarding ongoing investigation: In the event that the investigation is ongoing, insert a summary statement as follows: "The investigation is ongoing and we will provide [you or insert the word "public" here if the breach involves multiple individuals and notice of updated information will be provided in a general, public manner (e.g., via website)] notice if we learn of any inappropriate use of the health information involved in this incident." 12. Mitigation actions: Insert description of mitigation steps (e.g., cooperation with law enforcement, sanctions of employees, implementation of additional security measures, revision of policies and procedures, training of employees or other Workforce 2

3 Members). Consider whether the following optional mitigation action should be taken: "Part of our commitment to protecting our patients' information means taking an abundance of caution in the event an incident like this occurs. To that end, we will cover the cost for you to receive months of credit report monitoring [or identity theft insurance]. To obtain this service, [insert details re: this offer]." 13. Steps to prevent reoccurrence of the incident: Insert any actions taken from an operational perspective to prevent further similar breaches. These actions may overlap with the mitigation actions, but both types of actions need to be addressed. 14. Notification to others: For breaches involving 500 or more individuals insert the following: "We will also report this incident to the United States Department of Health and Human Services, Office for Civil Rights." Note that there may be other state reporting obligations. As a result, the contents of the notification letter may need to be customized to address other states' security breach notification laws. 15. Description of steps for affected patients to take to protect themselves: The steps described in this section are common steps to be taken in the event that a breach potentially creates a risk of identity theft. Depending on the nature of the breach at issue, the provisions in this section may need to be included. There may be other steps that should be taken depending on the nature of the breach. As a result, this section should be customized. 16. Contact procedures: The contact procedures to be inserted will depend on the nature of the breach. For breaches affecting large numbers of patients, it is possible that a third-party call center may be engaged to handle questions. For breaches affecting a small number of patients, the Privacy Officer may be inserted as the primary contact. It is important to emphasize that the contact procedures must include EITHER a toll-free number, address, website or postal address. The following are examples of potential contact procedures: "If you have further questions or concerns, please contact our Privacy Officer at [insert telephone number]. "We have established a toll-free number and an address to contact us with questions and concerns about this incident. You may also call the Privacy Compliance Department toll-free at [insert telephone number] during normal business hours or us at [insert address]. We have also established a section on our website, [insert website address], with information on the incident and its investigation." 3

4 [insert date] [insert patient name and address, unless breach involves multiple patients who will each receive the same notice] Dear [insert patient name (Instruction 1)]: We are writing to inform you of a recent incident involving [insert appropriate descriptor (Instruction 2)] your personal health information at [insert Covered Entity or Business Associate Name]. [Insert summary purpose of the notice (Instruction 3)]. Description Of The Incident And Information Involved On [insert date (Instruction 4)], [insert a brief description of the incident, including a summary statement of what happened (Instruction 5)]. [Insert a description of the types of PHI that were involved in the incident (Instruction 6)]. We became aware of this incident on [insert discovery date (Instruction 7)]. [In the event of a law enforcement delay in notification, see Instruction 8]. Our Investigation And How We Are Responding To The Incident We take the protection of the privacy and security of your personal health information very seriously. Upon discovery of this incident, we initiated an internal investigation. [If the incident was reported to law enforcement, see Instruction 9]. We have concluded from our internal investigation that [insert brief statement of conclusions (Instruction 10)]. [In the event that the investigation is ongoing, see Instruction 11]. In response to this incident, we have taken the following actions [insert mitigation actions (Instruction 12). In addition, to help prevent an incident like this from happening in the future, we have taken the following actions [insert preventive actions (Instruction 13)]. [If a breach involves 500 or more individuals or residents, see Instruction 14]. What Steps You Can Take To Protect Yourself [See Instruction 15.] Although we are not aware of any misuse of your personal health information, we advise you to remain vigilant and consider taking the following steps.

5 Call the toll-free numbers of any of the three major credit bureaus (below) to place a fraud alert on your credit report. This can help prevent an identity thief from opening accounts in your name. You only need to contact one of the credit bureaus. As soon as that credit bureau confirms your fraud alert, the other two credit bureaus will automatically be notified to place alerts on your credit report, and all three reports will be sent to you free of charge. Equifax: ; P.O. Box , Atlanta, GA Experian: EXPERIAN ( ); P.O. Box 9532, Allen, TX TransUnion: ; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA Review your credit reports. By establishing a fraud alert, the credit bureaus will send you a free credit report. When you receive a credit report, you should examine it closely and look for signs of fraud, such as credit accounts that are not yours. Continue to monitor your credit reports and other accounts. Even though a fraud alert has been placed on your credit report, you should continue to monitor your credit reports to ensure an imposter has not opened an account with your personal information. You should also closely monitor your financial and other account statements, and if you notice any unauthorized activity, promptly contact the creditor. Contact law enforcement if you find suspicious activity. If you find suspicious activity on your credit reports or other account information, contact your local police department and file a report of identity theft. Keep copies of such reports for your records, as you may need to give them to creditors. Other resources. For more information about steps you can take to avoid identity theft, you may contact the Federal Trade Commission, by mail at Federal Trade Commission, Consumer Response Center, 600 Pennsylvania Avenue, NW, Washington DC, 20580, via the Internet at or by phone at ID-THEFT ( ). We deeply regret that this incident has occurred and apologize for the concern that this incident has caused you. [Insert contact procedures for affected patients to ask follow-up questions (Instruction 16)]. Sincerely, 5

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information.

We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. EQUIFAX AUTHORIZATION CODE July, 2012 Dear [insert name]: We are writing to you because of a recent security incident which may have resulted in unauthorized access of your personal information. On or

More information

Letter from the CEO. January 25, 2014. To Our Valued Michaels Customers:

Letter from the CEO. January 25, 2014. To Our Valued Michaels Customers: Letter from the CEO January 25, 2014 To Our Valued Michaels Customers: As you may have read in the news, data security attacks against retailers have become a major topic of concern. We recently learned

More information

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment

More information

NOTICE OF DATA BREACH. As an integral part of our dōterra family, we understand how important data security is to you.

NOTICE OF DATA BREACH. As an integral part of our dōterra family, we understand how important data security is to you. AllClear ID Processing Center P.O. BOX 141578 Austin, TX 78714 00001 ACD1234 00001 JOHN Q. SAMPLE 1234 MAIN STREET ANYTOWN US 12345-6789 April 18, 2016 Dear John Sample, NOTICE OF DATA BREACH As an integral

More information

How to Get Rid of Identity Theft

How to Get Rid of Identity Theft January 22, 2016 NOTICE OF DATA BREACH (For California Residents) What Happened? On November 20, 2015, Starwood Hotels & Resorts Worldwide, Inc. ( Starwood ) announced that a malware intrusion affected

More information

July 17, 2014. Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202

July 17, 2014. Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 July 17, 2014 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 VIA E-MAIL: Idtheft@oag.state.md.us To Whom It May Concern: Aon Hewitt is a human

More information

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240

IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240 IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) HIPAA Privacy - Data Breach Notification Policy 10240 POLICY INFORMATION Major Functional Area (MFA): MFA X - Office of General Counsel & Compliance

More information

WHAT INFORMATION WAS INVOLVED?

WHAT INFORMATION WAS INVOLVED? Processing Center P.O. BOX 141578 Austin, TX 78714 00001 ACD1234 00001 JOHN Q. SAMPLE 1234 MAIN STREET ANYTOWN US 12345-6789 May 11, 2016 Dear John Sample, We are writing to notify you about an incident

More information

DRAFT Template: Health Information Privacy and Security Breach Notification Letter

DRAFT Template: Health Information Privacy and Security Breach Notification Letter DRAFT Template: Health Information Privacy and Security Breach Notification Letter Health and Human Services Interim Final Rule for Breach Notification for Unsecured Protected Health Information, provided

More information

May 11, 2016. Re: Notice of a Data Breach. Dear

May 11, 2016. Re: Notice of a Data Breach. Dear Processing Center P.O. BOX 141578 Austin, TX 78714 May 11, 2016 Re: Notice of a Data Breach Dear Kalamazoo College is committed to maintaining the privacy and security of our current and former employees

More information

In the first week of November, E-conolight was made aware by its website hosting company of a malware attack

In the first week of November, E-conolight was made aware by its website hosting company of a malware attack e-conolight c/o Processing Center P.O. BOX 142589 Austin, TX 78714 e-conolight c/o Processing Center P.O. Box 142589 Austin, TX 78714 [Cardholder First_Name] [Cardholder Last_Name] [Address_Line_1] [Address_Line_2]

More information

Data Security Breach Notice Letter

Data Security Breach Notice Letter View the online version at http://us.practicallaw.com/3-501-7348 Data Security Breach Notice Letter DANA B. ROSENFELD & ALYSA ZELTZER HUTNIK, KELLEY DRYE & WARREN LLP A letter from a company to individuals

More information

The Home Depot 2455 Paces Ferry Road Atlanta, GA 30339

The Home Depot 2455 Paces Ferry Road Atlanta, GA 30339 Processing Center P.O. Box 3825 Suwanee, GA 30024 John Q. Sample February 7, 2014 123 Fake St. Apt. 99 Austin, TX 77022 AllClear ID Redemption Code: [REDEMPTION_CODE] Dear John Q. Sample, Please read this

More information

How To Prevent Identity Theft

How To Prevent Identity Theft We take the protection of your personal information seriously and are diligently taking action to prevent a recurrence. Both E-conolight and our hosting company continue to investigate every aspect of

More information

Northern Trust Attachment A

Northern Trust Attachment A Northern Trust Attachment A The Northern Trust Company 50 South LaSalle Street Chicago, Illinois 60603 July [ ], 2014 [First Name][Last Name] [Street Address] [City], [State] [Zip Code] Subject: Important

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year.

As a precaution, we have arranged with AllClear ID to provide identity protection services to affected clients at no cost for a period of one year. October 1, 2015 Office of the Attorney General Attn: Security Breach Notification 200 St. Paul Place Baltimore, MD 21202 Idtheft@oag.state.md.us To Whom It May Concern: I am writing on behalf of Scottrade

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Fred s Inc. Identifies and Stops Payment Card Security Incident Fred s Inc. recognizes the importance of protecting our customers payment card information, which is why we have been working tirelessly

More information

June 10, 2015 VIA EMAIL

June 10, 2015 VIA EMAIL ROBERT E CATTANACH Partner (612) 340-2873 FAX (612) 340-8800 cattanach.robert@dorsey.com June 10, 2015 VIA EMAIL Office of the Attorney General of the State of Maryland Attn: Security Breach Notification

More information

May 11, 2015. Re: Data Security Breach at Honig s Whistle Stop

May 11, 2015. Re: Data Security Breach at Honig s Whistle Stop May 11, 2015 New Hampshire Office of the Attorney General Consumer Protection and Antitrust Bureau 33 Capitol Street Concord, NH 03301 DOJ-CPB@doj.nh.gov Re: Re: Data Security Breach at Honig s Whistle

More information

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call 877-441-6943.

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call 877-441-6943. Mid Atlantic Professionals, Inc. DBA / SSI ( SSI ) had a data breach incident that occurred on or before March 7, 2014. As a result of this incident, some personal identifiable information was exposed

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls

More information

Background of the Incident

Background of the Incident BLAINE C. KIMREY SHAREHOLDER +1 (312) 609 7865 bkimrey@vedderprice.com 222 NORTH LASALLE STREET CHICAGO, ILLINOIS 60601 T: +1 (312) 609 7500 F: +1 (312) 609 5005 CHICAGO NEW YORK WASHINGTON, DC LONDON

More information

ARE YOU A VICTIM OF AN IDENTITY CRIME?

ARE YOU A VICTIM OF AN IDENTITY CRIME? RESOURCE KIT FOR VICTIMS OF IDENTITY CRIME ARE YOU A VICTIM OF AN IDENTITY CRIME? If someone is using your identifying information, (name, date of birth, social security number, etc.), you ARE a victim

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft IDENTITY THEFT: PROTECTING YOUR CREDIT Free Credit Report A recent amendment to the federal Fair Credit Reporting Act requires each of the nationwide consumer reporting companies to provide you with a

More information

IDENTITY THEFT INFORMATIONAL PACKET

IDENTITY THEFT INFORMATIONAL PACKET IDENTITY THEFT INFORMATIONAL PACKET...January 2003 i Directory Disclaimer Public Counsel Law Center, the nation s largest pro bono law firm, is the public interest law firm of the Los Angeles County and

More information

Substitute Notice for Village Pizza

Substitute Notice for Village Pizza Substitute Notice for Village Pizza Village Pizza is committed to protecting the personal information provided to us by our customers. This notice is regarding an incident involving some of that information.

More information

HIPAA Breach UPDATED 9/21/15

HIPAA Breach UPDATED 9/21/15 HIPAA Breach UPDATED 9/21/15 Benefits Administration was informed on September 10 th of a cyberattack that may have affected records of those eligible for long term care through MedAmerica and, possibly,

More information

UNTOI~ b& ~1\1IL.I1[A?v1S TEL 2I2309~ 1000

UNTOI~ b& ~1\1IL.I1[A?v1S TEL 2I2309~ 1000 H 0 0 UNTOI~ b& ~1\1IL.I1[A?v1S TEL 2I2309~ 1000 NEW HUNTON 200 PARK YORK, & AVENUE WILLIAMS NY 10166-0005 LLP FAX 212 309 1100 LISA J. SOflO DIRECT DIAL: 212 309~ 1223 EMAIL: LSotlo@hunton.com April 18,

More information

Credit Reports. Colorado Bureau of Investigation Identity Theft & Fraud Unit

Credit Reports. Colorado Bureau of Investigation Identity Theft & Fraud Unit Checking your credit reports annually is a great way to detect Financial. Early detection is important and will allow you to report and repair the damage quickly. By following a few simple steps, you will

More information

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION Effective August 31, 2007 Publication Name(s): Version #(1): ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters Dear Consumer, Sometimes an identity thief can strike even if you ve been very careful about protecting your personal information. If you suspect that your personal information has been stolen and used

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

March 2, 2015 Page 2. If you have any questions or need further information regarding this incident, please do not hesitate to contact me.

March 2, 2015 Page 2. If you have any questions or need further information regarding this incident, please do not hesitate to contact me. BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. FOUNDED 1866 March 2, 2015

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

The Home Depot Provides Update on Breach Investigation

The Home Depot Provides Update on Breach Investigation The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers

More information

April 30, 2015 VIA E-MAIL. Attorney General Joseph Foster Office of the Attorney General NH Department of Justice 33 Capitol Street Concord, NH 03301

April 30, 2015 VIA E-MAIL. Attorney General Joseph Foster Office of the Attorney General NH Department of Justice 33 Capitol Street Concord, NH 03301 Partner April 30, 2015 VIA E-MAIL Attorney General Joseph Foster Office of the Attorney General NH Department of Justice 33 Capitol Street Concord, NH 03301 Dear General Foster, I am writing on behalf

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist Page 1 of 5 Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 This checklist can help identity theft victims to clear up their records. It lists the actions most identity theft victims should

More information

KCSO IDENTITY THEFT KIT

KCSO IDENTITY THEFT KIT KCSO IDENTITY THEFT KIT This Kit will provide information to assist you in filing an Identity Theft report. If you have access to a computer with internet connection and a valid email address: Go to the

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso Police Department and obtained a police report number related to your identity

More information

Identity Theft Victim Checklist

Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 4/30//08 Identity Theft Victim Checklist This checklist can help identity theft victims clear up their records. It lists the actions most identity theft victims should take

More information

Chapter 6 Appendix A

Chapter 6 Appendix A Chapter 6 Appendix A Instructions for Completing the Norwalk Department of Police Service ID Theft Affidavits Please complete the attached form and submit it to the Police Department so that a case can

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

Protecting Yourself When You're a Victim of Identity Theft, Forgery or Fraud

Protecting Yourself When You're a Victim of Identity Theft, Forgery or Fraud Protecting Yourself When You're a Victim of Identity Theft, Forgery or Fraud Credit Card Fraud If someone has stolen or is fraudulently using credit cards that are issued to you (including any ATM/Debit/Check

More information

tiled Kelly Avote Office of the Attorney General 33 Capitol St. Concord, NH 03301 603-271-3658 Dear Attorney General:

tiled Kelly Avote Office of the Attorney General 33 Capitol St. Concord, NH 03301 603-271-3658 Dear Attorney General: tiled Tyco Flow COn/rol 10 70 7 Clay Road SUire 200 Flow Control Houston, TX 7704 I Kelly Avote Office of the Attorney General 33 Capitol St. Concord, NH 03301 603-271-3658 Tele 773-986-4665 Fax 773-986-4667

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

Joint Plumbing Industry Board Plumbers Local Union No.1 Trust Funds

Joint Plumbing Industry Board Plumbers Local Union No.1 Trust Funds Joint Plumbing Industry Board Plumbers Local Union No.1 Trust Funds Welfare Fund Trade Education Fund Additional Security Benefit Fund 401(k) Savings Plan John J. Murphy, Co-Chairman - Labor Walter Saraceni,

More information

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc.

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc. Importance: High From: Anthem, Inc. Communications Sent: Thursday, February 26, 2015 4:40 PM Subject: Important message from Anthem, Inc. An important message from Anthem, Inc. To Members: On January 29,

More information

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>: , Dear : You are receiving this letter because computer thieves or hackers have gained access

More information

How to Freeze Your Credit Files Tips for Consumers

How to Freeze Your Credit Files Tips for Consumers How to Freeze Your Credit Files Tips for Consumers Consumer Information Sheet 10 May 2015 If you live in California, you have the right to put a security freeze on your credit file.1 A security freeze

More information

Identity Theft Packet

Identity Theft Packet Athol Police Department 280 Exchange St. * Athol, Massachusetts 01331 Tel. (978) 249-3232 * Fax (978) 249-7903 TIMOTHY C. ANDERSON Chief of Police Identity Theft Packet This packet will provide victims

More information

HSBC ID. 26525 North Riverwoods Boulevard, Suite 100, Mettawa, IL 60045. April 10, 2015. OVERNIGHT DELIVERY and EMAIL (IDTHEFT@OAG.STATE.MD.

HSBC ID. 26525 North Riverwoods Boulevard, Suite 100, Mettawa, IL 60045. April 10, 2015. OVERNIGHT DELIVERY and EMAIL (IDTHEFT@OAG.STATE.MD. HSBC ID 26525 North Riverwoods Boulevard, Suite 100, Mettawa, IL 60045 April 10, 2015 OVERNIGHT DELIVERY and EMAIL (IDTHEFT@OAG.STATE.MD.US) Mr. Brian E. Frosh Attorney General Office of the Attorney General

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

PENN STATE UNIVERSITY SENSITIVE DATA EXPOSURE INCIDENT KIT Created and Maintained by the Privacy Office

PENN STATE UNIVERSITY SENSITIVE DATA EXPOSURE INCIDENT KIT Created and Maintained by the Privacy Office PENN STATE UNIVERSITY SENSITIVE DATA EXPOSURE INCIDENT KIT Created and Maintained by the Privacy Office TABLE OF CONTENTS I. Overview II. III. IV. Role Assignment Steps for Notification Available Third

More information

SECURITY BREACH FACT SHEET FOR DEPARTMENT OF ADMINISTRATION CALL CENTER

SECURITY BREACH FACT SHEET FOR DEPARTMENT OF ADMINISTRATION CALL CENTER PRICE WATERHOUSE COOPERS SECURITY BREACH FACT SHEET FOR DEPARTMENT OF ADMINISTRATION CALL CENTER Who is affected by the breach? Participants in the Public Employees Retirement System and the Teachers Retirement

More information

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision YOU HAVE THE POWER TO STOP IDENTITY THEFT A message from the federal bank, credit union and thrift regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation

More information

How to Deal With Identity Theft

How to Deal With Identity Theft FREE YOUR MIND http://freeyourmindonline.net How To Recover From Identity Theft Download the Identity Theft Help Kit (http://freeyourmindonline.net/identity-theft-help.html) to go along with this article.

More information

OHIO S IDENTITY THEFT VICTIM ASSISTANCE KIT A guide for victims of identity theft, detailing what to do and who to contact.

OHIO S IDENTITY THEFT VICTIM ASSISTANCE KIT A guide for victims of identity theft, detailing what to do and who to contact. OHIO S IDENTITY THEFT VICTIM ASSISTANCE KIT A guide for victims of identity theft, detailing what to do and who to contact. Identity theft has become one of the fastest growing crimes in the United States.

More information

KCSO IDENTITY THEFT KIT

KCSO IDENTITY THEFT KIT KCSO IDENTITY THEFT KIT This Kit will provide information to assist you in filing an Identity Theft report. If you have access to a computer with internet connection and a valid email address: Go to the

More information

What should I do if I become a victim of identity theft?

What should I do if I become a victim of identity theft? What should I do if I become a victim of identity theft? If you believe you are a victim of identity theft, there are a number of important steps you should follow. Be prepared to document all unauthorized

More information

FTC FACTS for Consumers

FTC FACTS for Consumers ftc.gov FOR THE CONSUMER FTC FACTS for Consumers FEDERAL TRADE COMMISSION 1-877-FTC-HELP Medical Identity Theft C ould identity thieves be using your personal and health insurance information to get medical

More information

When Your Child s Identity Is Stolen

When Your Child s Identity Is Stolen When Your Child s Identity Is Stolen Consumer Information Sheet 3B May 2015 What Is Child Identity Theft? Adults are not the only targets of identity theft. In fact, children under the age of 18 can also

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide Pasco County Sheriff's Office Economic Crime Unit Identity Theft Guide This kit was designed to assist you in working through the process of resolving the theft of your personal information and to clear

More information

BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION

BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION BREACH NOTIFICATION FOR UNSECURED PROTECTED HEALTH INFORMATION Summary November 2009 On August 24, 2009, the Department of Health and Human Services (HHS) published an interim final rule (the Rule ) that

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

Identity Theft Victim Packet

Identity Theft Victim Packet Chelsea Police Department ED TOTH JR. CHIEF OF POLICE 311 S. MAIN STREET Chelsea, Michigan 48118 OFFICE (734) 475-9122 FAX (734) 475-1996 EMAIL etoth@city-chelsea.org Identity Theft Victim Packet The purpose

More information

FORMER CMSP AND PATH2HEALTH MEMBERS YOU MAY BE AFFECTED BY ANTHEM DATA BREACH

FORMER CMSP AND PATH2HEALTH MEMBERS YOU MAY BE AFFECTED BY ANTHEM DATA BREACH What happened? FORMER CMSP AND PATH2HEALTH MEMBERS YOU MAY BE AFFECTED BY ANTHEM DATA BREACH On January 29, 2015, Anthem Blue Cross (Anthem) learned a cyber-attack to its electronic information systems

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

Privacy at Staples and Coastwide Laboratories. Customer Personal Information Privacy Policy (Effective Date: October 20, 2009)

Privacy at Staples and Coastwide Laboratories. Customer Personal Information Privacy Policy (Effective Date: October 20, 2009) Privacy at Staples and Coastwide Laboratories Customer Personal Information Privacy Policy (Effective Date: October 20, 2009) At Staples your privacy is as important to us as it is to you. Our Customer

More information

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

How To Get A Credit Card From A Credit Union

How To Get A Credit Card From A Credit Union Refuse to be a target of identity crime. Protecting the Real You and Only You. The International Association of Chiefs of Police 515 N. Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227

More information

Instructions for Completing

Instructions for Completing Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

First Steps for Victims of Identity Theft

First Steps for Victims of Identity Theft First Steps for Victims of Identity Theft Colorado Bureau of Investigation Identity Theft/Fraud Investigation Unit Colorado Bureau of Investigation ID Theft/Fraud Unit 710 Kipling Street Suite 200 Denver

More information

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE? 1. WHAT HAPPENED (2015 UPDATE)? Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 2. WHAT IS THE ARCHDIOCESE DOING ABOUT THIS? 3. WHAT WERE THE RESULTS OF THE INVESTIGATIONS?

More information

Responding to New Identity Theft Laws

Responding to New Identity Theft Laws Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination

More information

Remedying the Effects of Identity Theft

Remedying the Effects of Identity Theft Remedying the Effects of Identity Theft Identity theft occurs when someone uses your name, Social Security number, date of birth, or other identifying information, without authority, to commit fraud. For

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Identity Theft/Credit Fraud Kit

Identity Theft/Credit Fraud Kit Provided by: Your source for information on Credit Reports and Credit Scores, where you can also safely order your own 3 Bureau Credit Report online that includes your credit information from Equifax,

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

INDEX. Cover Page Page 1. Index and Our Contact Info Page 2. Introduction and Instructions Page 3. Other Relevant Agency Contact Information Page 4

INDEX. Cover Page Page 1. Index and Our Contact Info Page 2. Introduction and Instructions Page 3. Other Relevant Agency Contact Information Page 4 I DENTI TYTHEFT INDEX Cover Page Page 1 Index and Our Contact Info Page 2 Introduction and Instructions Page 3 Other Relevant Agency Contact Information Page 4 Sample Letter to Credit Reporting Agency

More information

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within

More information

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail U.S. Postal Inspection Service Ensuring Confidence in the U.S. Mail Identity theft involves acquiring key pieces of someone s identifying information, such as name, address, date of birth, social security

More information

Identity Theft Solutions

Identity Theft Solutions Identity Theft Solutions Your wallet is missing. Thousands of dollars have been charged to your credit cards, your checking account is empty, and loans you never took out appear on your credit report.

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

General Q&A Northland Pioneer Personal Data Security Incident

General Q&A Northland Pioneer Personal Data Security Incident General Q&A Northland Pioneer Personal Data Security Incident 1. What happened? On May 2, 2016, W-2 information for 2015 was forwarded to a fraudulent email address by a college employee. Current and former

More information

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466 FRAUD PACKET Instructions and Useful Information Please read entire packet and follow instructions to complete this packet properly. **This packet should ONLY be completed if you are a victim of Identity

More information

Florida's Identity Theft Victim Kit

Florida's Identity Theft Victim Kit Florida's Identity Theft Victim Kit A guide for victims of identity theft, detailing what to do and who to contact. This kit is designed to help you work through the process of resolving your identity

More information