Brian Lapidus
Practice Leader, Identity Theft and Breach Notification Practice
Nashville
Brian LapidusData breach notification can present various layers of complexity for your organization. Not only do you have to ensure affected individuals receive critical information about your data breach event, you also have to notify within the required deadlines and in accordance with applicable laws and regulations.
The art of crafting a notification letter is one that can sometimes be taken for granted – and yet it is your primary communication with stakeholders regarding your data security incident, making it of great significance in controlling your message and quelling breach population fears. There are many nuances, but any good letter will include some basic information:
Your Kroll team will work with you and your legal counsel to draft a personalized, plain-language communication that provides information about your data breach event, as well as the solutions being offered. We’ll segment your letters by state to address unique regulatory stipulations and will optimize delivery routes to help you meet required deadlines.
Once the letter has been drafted, Kroll will also be on hand to assist with the logistics of mailing, and preparing for responses from your affected population. We will work closely with your team to optimize speed and deliverability, while also reducing unnecessary notification costs. Kroll’s team can work with you to:
Once this is completed, we can review your mailing list and separate the groups that require special handling, such as: children, adults, expatriates or decedents. We can separate these categories, identifying which individuals might have special considerations for consumer services, or groups that are at a higher risk based on information lost.
Holistic solution for data loss events, including facilitating access to credit reports and credit monitoring.
Credit MonitoringCall center services provided for breached populations by skilled representatives.
Data Breach Call Center ServicesAccess to investigative experts for live support, best practice advice, and identity restoration.
Identity Theft RestorationWe use cookies to give you the best possible user experience. View our privacy policy to find out more.