Employer's Employee Listing Facilitated Identity Theft

July 1, 2004

The company I work for recently was in the market for another company to buy part of the service business. They provided an employee list with names, addresses and phone numbers without our consent.

How to Deal with a Security Breach

Fact Sheet 17bHow to Deal with a Security Breach

Have you received a letter or an e-mail informing you that your personal information may have gotten into the wrong hands?   Or perhaps a media report alerted you to a security breach at a company you do business with.

It is increasingly common for companies, educational institutions, and government agencies -- whether or not their state has a breach notice law -- to notify individuals when computer files containing personal information have been hacked, stolen, or lost. If the file includes Social Security numbers, financial account numbers, driver's license numbers -- in short, data that would be useful to identity thieves -- there are steps you can take to reduce your risk of fraud. So, what should you do  if you suspect that your personal information has been compromised? First, don't panic. A security breach does not necessarily mean that you will become a victim of identity theft.

This guide provides instructions on ways to reduce your risk of identity theft. And if the worst happens and you do become a victim of fraud, this guide points you to other sources of information about identity theft.

Is Your Client Prepared To Comply with the Data Security Breach Notification Laws? (Mansfield)

California adopted the first data security breach notification law, codified at Cal. Civ. Code Section 1798.80 et seq., effective July 1, 2003. nearly 40 other states have since adopted similar laws modeled after, but not the same as, the California law. Presently pending in Congress are several bills that would adopt a variant of the California model on a nationwide basis, including the Notification of Risk to Personal Data Act of 2007, S.239 (introduced January 10, 2007).

The VA's Data Breach - Tips for Veterans and Action You Can Take under Federal Law

(May 23, 2006) Sensitive personal information of 26.5 million veterans was stolen recently when the home of a VA employee was robbed. The individual had brought a computer and disk home containing names, Social Security numbers (SSNs), dates of birth, and other information of anyone who served in the military and has been discharged since 1976. The theft apparently occurred May 3, 2006.

Federal Agencies' Guidelines regarding Notification by Financial Companies when a Security Breach Compromises Customer Data and Exposes Individuals to Identity Theft

The Agencies' current proposal establishes guidance for financial institutions' response programs for unauthorized access to customer information. The proposal also includes guidance on when notice to customers is necessary.

Recent studies have confirmed that the crime of identity theft claims millions of victims each year, costing both victims and financial institutions billions of dollars in losses.3 Financial institutions that collect and maintain personal customer information as part of business operations have a legal obligation to establish security procedures to maintain the confidentiality and integrity of that data.

Identity Theft Precautions for California State Employees

The Teale Data Center for the State of California has reported a security breach in the data base that holds payroll deduction information for all state government employees. According to news reports, officials for the Data Center are quite certain that data was not removed, although they are not entirely certain. One of the data elements in the data base is employee Social Security number (SSN). The incident apparently occurred in April 2002.

California Security Breach Notification Law Goes into Effect July 1, 2003

Beginning on July 1, state government agencies as well as companies and nonprofit organizations regardless of geographic location must notify California customers if personal information maintained in computerized data files have been compromised by unauthorized access.

Showing 8 results
Syndicate content


Sign In!