The art of crafting a notification letter is one that can sometimes be taken for granted – and yet it is your primary communication with stakeholders regarding your data security incident, making it of great significance in controlling your message and quelling breach population fears. There are many nuances, but any good letter will include some basic information:
Your Kroll team will work with you and your legal counsel to draft a personalized, plain-language communication that provides information about your data breach event, as well as the solutions being offered. We’ll segment your letters by state to address unique regulatory stipulations and will optimize delivery routes to help you meet required deadlines.
Once the letter has been drafted, Kroll will also be on hand to assist with the logistics of mailing, and preparing for responses from your affected population. We will work closely with your team to optimize speed and deliverability, while also reducing unnecessary notification costs. Kroll’s team can work with you to:
Once this is completed, we can review your mailing list and separate the groups that require special handling, such as: children, adults, expatriates or decedents. We can separate these categories, identifying which individuals might have special considerations for consumer services, or groups that are at a higher risk based on information lost.
Services include drafting communications, full-service mailing, alternate notifications.
Kroll provides your breach population with direct access to investigative experts for live support and best practice advice, as well as identity restoration should they become victims of identity theft.
Kroll's expertise handling large-scale notifications for highly regulated industries helps you increase efficiencies and meet regulatory requirements.
Credit monitoring can be a powerful tool to offer in the wake of a data breach. Kroll provides a monitoring alert system that’s backed by the expertise of our licensed investigator team.
Kroll’s unique combination of identity monitoring services can detect more types of identity theft than credit monitoring alone, providing practical help to combat identity theft and fraud.
by Laurie Iacono, Keith Wojcieszek, George Glass
by Andrew Rathbun, Eric Zimmerman
by David White