Identity Theft and Breach Notification

Services include drafting communications, full-service mailing, alternate notifications.
Contact Us

Activate Your Monitoring Account. Sign Up Here.

Kroll's data breach notification services – which range from drafting compliant letters to full-service mailing and alternate notifications for large breaches – are designed alleviate the burdens of clients who are already dealing with a data breach.

With Kroll's data breach notification team, companies have the support they need to get the right information to the right people at the right time. Kroll works closely with our clients to optimise speed and delivery while also avoiding any unnecessary notification costs.

Our breach notification team has helped clients in Singapore, Hong Kong, Asia and the world across a wide range of industries fulfil their notification responsibilities. We understand that some industries – particularly those that are highly regulated – have strict obligations and varying levels of risk when it comes to breach notification. Our team works with an organisation’s legal counsel to draft and deliver data breach notification messages that are timely, cost-effective, and appropriately tailored to the target audience and the sensitivity of the data.

Kroll provides templates and direct assistance to simplify the process of drafting a company’s notification letter. The templates serve as starting points for any customisation that is necessary to meet all standard requirements and the unique needs of each affected party.

Our clients rely on Kroll's reputation for delivering positive messaging to explain a data breach event in manner that is tailored for the target audience while maintaining brand integrity. We also let those who are impacted by a breach know that, if identity theft or fraud occurs, our licensed identity theft investigators will be available to help deal with the situation promptly and effectively. In each case, Kroll’s primary objective is to leave impacted individuals feeling confident and protected in the wake of a data breach.

If sending notification letters is not feasible under the circumstances, Kroll provides alternative notification methods. Working closely with an organisation’s legal counsel, PR/communications staff, or other response team members, Kroll can help with the distribution of email or public notifications in those cases where contact information is unknown or the impacted population is too large for print notifications. Kroll can also set up a website to facilitate public notice and monitor services enrollment.

In the continuously evolving cybersecurity landscape, preparation for a data breach is crucial. Kroll’s clients can be confident that experts are ready to work with their company's leadership to put them in the best defensive position when a data breach occurs.

Talk to a Cyber Expert

Kroll is ready to help, 24x7. Use the links on this page to explore our services further or speak to a Kroll expert today via our 24x7 cyber hotlines or our contact page.

Kroll Responder MDR

Stop cyberattacks. Kroll’s managed detection and response services are powered by an elite team of seasoned cyber risk experts and frontline threat intelligence to deliver unrivaled response. 

Incident Response Plan Development

Today, you learn your company is experiencing a serious cyber incident. It could be a ransomware attack, a hacked O365 email account, the theft of PII or PHI, data exposure from misconfigured network settings. What is the first step you should take?

Incident Response Tabletop Exercises

Kroll’s field-proven incident response tabletop exercises provide a customised test of every aspect of an organisation’s cyber response plan.


Optimised Third-Party Cyber Risk Management Programmes

Manage risk, not spreadsheets. Identify and address cyber threats in third-party relationships to ensure compliance with regulations such as NYDFS, FARS, GDPR, etc.

Third Party Cyber Audits and Reviews

Kroll’s cyber audits and reviews ensure third parties handle sensitive data according to regulatory guidelines and industry standards.

FAST Attack Simulation

Safely perform attacks on your production environment to test your security technology and processes.