Now What: 10 Steps to Protect Yourself in the Wake of the National Public Data Breach

  • Blog
  • Now What: 10 Steps to Protect Yourself in the Wake of the National Public Data Breach
Contact Us
1
2
3
3 Oct, 2024
2 min
169
hands stretching from the dark close to the laptop

Save Yourself From The Social Security Number Data Breach. Learn What Happened and What to Do Next.

Social Security Numbers are in the hands of cybercriminals after the largest data breach in history at National Public Data. We advise on how to stay safe and fight back if your data gets exploited

In the wake of the recent National Public Data (“NPD”) breach, millions of Americans are grappling with the unsettling realization that their personal information—including Social Security numbers—may be in the hands of cybercriminals. This can be frightening and overwhelming. But you have more power than you realize to take control of the situation.

Though the litigation, scrutiny, finger-pointing, forensic audit, and criminal investigations related to this event will continue for years, people will, understandably, want to do something now. Since identity theft recovery is one of our thriving practice areas, we are well-versed in the financial, mental, reputational, and emotional damage that it can cause. Here's what we’ve learned about fighting it and what you can do to be proactive in protecting yourself.

First, understand that we’re not here to sugar-coat things. The scale of the breach is deeply concerning, as it opens the door to identity theft, financial fraud, and other forms of financial exploitation that could haunt victims for years. The ease with which hackers accessed this information is a stark reminder of the vulnerabilities in how companies like NPD handle records containing our most private details. While the road ahead is uncertain, taking the right steps now can help you safeguard your financial future and ensure that your identity remains secure. The consequences will be potentially devastating for those affected.

While this breach is one of the largest in history, the principles of protecting yourself against identity theft remain the same. Protecting yourself starts with thoroughly understanding your rights and then taking affirmative steps to secure those rights.

Request Copies of Your Credit Reports

The first step in protecting yourself after a data breach is to get a clear picture of where you stand. The best way to do this is by requesting copies of your credit reports from the three major consumer reporting agencies (CRAs), also known as the credit bureaus: Equifax, Experian, and TransUnion. The Fair Credit Reporting Act (FCRA) lays out the legal obligations of CRAs and the companies that give them information. The Fair and Accurate Credit Transactions Act of 2003 (FACTA) amendment further supports consumers by giving them access to one free credit report per year. This has since evolved so that consumers can get a free weekly credit report. You can safely get reports from all three credit bureaus through a central website- AnnualCreditReport.com.

These reports will provide detailed information about your credit history, including any accounts opened in your name, your payment history, and the amount of debt you owe. By carefully reviewing these reports, you can identify any unusual or unauthorized activity that may have resulted from the data breach.

Why This Matters: Your credit report is the foundation of your financial identity. It influences everything from your ability to get a home or auto loan, receive benefits, and secure insurance to the interest rates you pay. Any errors or fraudulent activity on your report can significantly impact your financial health. By obtaining your credit reports, you’re taking the first step in protecting yourself against potential identity theft.

Review Your Credit Report for Errors or Fraudulent Activity

Once you have your credit reports, the next step is to go through them with a fine-tooth comb. Look for any accounts you don’t recognize, unfamiliar charges, or any other irregularities that could indicate fraudulent activity. Pay close attention to:

  • New accounts or inquiries that you didn’t initiate or don’t recognize
  • Changes to your personal information, such as your name, address, or Social Security number
  • Unexpected balances or charges on your credit cards
  • Accounts you thought were closed but appear as open

If you spot anything suspicious, you must act quickly. Fraudulent accounts, charges, or credit inquiries can indicate that someone has stolen and is using your identity. The longer you wait to address the issue, the more damage can be done.

Why This Matters: Identifying errors or fraudulent activity early can prevent further harm to your credit and help you resolve issues more efficiently. The sooner you catch these problems, the easier it will be to rectify them and protect your financial future.

Consider a Credit Freeze or Credit Lock

If you’re concerned that your personal information may be used to open new accounts in your name, consider placing a credit freeze or credit lock on your credit. Both options can help prevent unauthorized access to your credit, but there are some key differences between the two:

  • Credit Freeze: A credit freeze is a free tool that restricts access to your credit report, making it difficult for identity thieves to open new accounts in your name. You can freeze and unfreeze your credit as needed, but it typically requires a PIN or password. You do this individually through each of the credit bureaus.
  • Credit Lock: A credit lock is similar to a freeze but is typically offered as part of a credit monitoring service, so it is a paid service. Though it provides the same level of protection, it can be locked and unlocked more easily through an app or online portal, without needing a PIN.

A credit freeze and a credit lock can effectively prevent identity thieves from doing further damage. However, it’s important to remember that while these tools can stop new accounts from being opened, they won’t protect you from fraudulent activity on existing accounts.

Why This Matters: Taking proactive steps to lock down your credit can give you peace of mind and make it significantly harder for criminals to exploit your personal information. It’s a simple but powerful way to protect yourself from further harm.

Review all of Your Financial Account Statements

Review your bank, credit card, and retail account statements, line by line, for unauthorized activity. If you don’t recognize a transaction, purchase, transfer, etc., follow up on it immediately. Don’t ignore an unknown purchase just because it’s “only a few dollars.”

Report Any Fraudulent Activity to Law Enforcement

If you discover that your information has been used fraudulently, you must report the crime to law enforcement. Filing a police report helps document the incident and provides you with important records that you may need when disputing fraudulent charges or correcting your credit report.

In addition to contacting your local police department, you should also file a report with the Federal Trade Commission (FTC) through their website, IdentityTheft.gov. The FTC provides resources and guidance on recovering from identity theft, including creating a personalized recovery plan.

Why This Matters: Reporting identity theft to law enforcement is essential in protecting your rights. A police report can serve as valuable evidence if you need to dispute fraudulent activity or take legal action against those responsible for the crime.

Even with your most vigorous efforts to prevent being victimized, identity theft can (and does) happen to anyone. Yes, you’re still better off being diligent and proactive, but if your information does end up being exploited by criminals, a consumer protection attorney can help clean up the mess. They can help you navigate the complicated and overwhelming aftermath of identity theft by helping you understand your rights, dispute fraudulent charges, and take legal action if necessary.

Notably, many of the laws regulating the dispute of financial transactions are subject to time limitations. For instance, in some instances, you may only have sixty days to dispute fraudulent transactions reported on a bank statement.

Why This Matters: Having a knowledgeable legal advocate on your side can make all the difference in recovering from identity theft. Consumer protection attorneys can help you protect your rights, fight back against fraud, and regain control of your financial life.

Consider Identity Theft Protection Services

In addition to the steps mentioned above, you may consider enrolling in an identity theft protection service. These services offer a range of tools to help monitor your personal information, alert you to potential threats, and provide assistance in recovering from identity theft.

Many identity theft protection services include features such as:

  • Credit monitoring. Alerts you to changes in your credit report
  • Identity monitoring. Scans the dark web and other sources for your personal information
  • Fraud resolution. Assists in recovering from identity theft
  • Insurance coverage. Offers financial protection against losses due to identity theft

These services come at a cost. In some circumstances, the company liable for the breach must pay for your credit monitoring for one year. Check the National Public Data website periodically for any news in this regard.

Why This Matters: Identity theft protection services can offer comprehensive support and monitoring, helping you avoid potential threats and recover more quickly if your information is misused.

Be Cautious About Sharing Personal Information

In today’s digital age, being mindful of how and where you share your personal information is more important than ever. While it’s impossible to eliminate all risks, taking steps to protect your data can reduce your chances of becoming a victim of identity theft.

Some tips for safeguarding your personal information include:

  • Use strong, unique passwords for each of your accounts
  • Enable two-factor authentication on your accounts whenever possible
  • Be wary of phishing scams and avoid clicking on links or downloading attachments from unknown sources
  • Limit the personal information you share on social media and other public platforms

Why This Matters: Protecting your personal information can help reduce your risk of identity theft and keep your data out of the wrong hands.

Form New Credit and Financial Monitoring Habits

In the months following a data breach, monitoring your financial accounts and credit reports is important. Check your bank accounts, credit card statements, and other financial accounts on an ongoing basis for any signs of unauthorized activity.

You may also want to consider signing up for a credit monitoring service. These services can alert you to changes in your credit report, such as opening new accounts or inquiries, giving you a heads-up if something suspicious occurs.

Why This Matters: Ongoing monitoring is key to catching fraudulent activity early. By monitoring your financial accounts and credit reports, you can respond quickly to any issues and minimize potential damage.

Going Forward

If your credit has been damaged by identity theft, it’s important to take proactive steps to rebuild it. Start by disputing any fraudulent accounts with the consumer reporting agencies to have them removed from your credit report. Focus on paying down outstanding debt and consistently making on-time payments, which are key to improving your credit score. If your credit is severely damaged, consider using a secured credit card to make small purchases and pay them off each month, gradually restoring your credit.

Stay informed about data breaches and identity theft trends by signing up for alerts from the Federal Trade Commission (FTC) and other consumer protection agencies. These alerts can inform you of potential threats and help you take action before it's too late. Lastly, remember that dealing with identity theft can be incredibly stressful—don’t hesitate to reach out for support from friends, family, or a mental health professional to help you navigate this challenging time.

Why This Matters:
Rebuilding your credit after identity theft is essential to regaining control of your financial future. By staying informed and taking care of your mental health, you can recover from the damage, protect yourself from future threats, and move forward with confidence and resilience.

Final Thoughts

The National Public Data breach has left millions of Americans feeling vulnerable and uncertain about the safety of their personal information, which is understandable. However, by taking the right steps now, you can protect yourself and minimize the potential impact of this breach on your life.

Above all, know that it’s possible to regain control of your financial future. You can protect your identity and confidently move forward by staying informed, vigilant, and proactive. Then, take a deep breath. Data breaches and identity theft are part of everyday life in our current consumer economy, so there’s no sense living with chronic anxiety about the possibility of being victimized. Do your best, be aware of what to do to prevent it, know what to do if it does happen, and know where to turn for help with recovery. Everything will be okay.

imageDaniel Cohen is the Founding Partner of Consumer Attorneys
About the lawyer
Daniel Cohen
See more post

Daniel Cohen is the Founder of Consumer Attorneys. Daniel manages the firm’s branding, marketing, client intake and business development efforts. Since 2017, he is a member of the National Association of Consumer Advocates and the National Consumer Law Center. Mr. Cohen is a nationally-recognized practitioner of consumer protection law. He has a we... Read more

Contact Us
INVESTIGATIVE ENGAGEMENT AGREEMENT

You, (“Client,” “you”), and Consumer Attorneys PLC (“CA” or “we”), located at 8095 N. 85th Way, Scottsdale, AZ 85258 (“CA”) , hereby enter into this limited scope retainer agreement whereby you agree to grant CA the exclusive authority to investigate your potential consumer law claim(s), including but not limited to potential violations of the Fair Credit Reporting Act (“FCRA”), Fair Debt Collection Practices Act (“FDCPA”), Equal Credit Opportunity Act (“ECOA”), Electronic Funds Transfer Act “EFTA”), Fair Credit Billing Act (“FCPA”), and/or the Telephone Consumer Protection Act (TCPA”) (collectively referenced as “consumer protection statutes”). 1Please read carefully before signing:

Authorization

You authorize CA to investigate your potential consumer law claim(s) under state and federal consumer protection statutes. You authorize CA to contact third parties on your behalf for the limited purpose of investigating your potential consumer law claims. “Third parties” include but are not limited to consumer reporting agencies, creditors, lenders, debt collectors, rental agencies, employers, courts, and law enforcement agencies.

CA’s Exclusive Investigative Period

CA agrees to investigate your potential consumer law claims in good faith. By signing this agreement, you agree to give CA the exclusive right to investigate your potential consumer law claim(s) for the next 180 days (“Exclusive Investigative Period”). For the duration of the Exclusive Investigative Period, you agree that you will not communicate with any other law firm or legal representative about your potential consumer law claim(s). You agree to forgo any previously scheduled consultation or case review until CA’s Exclusive Investigative Period concludes.

Termination of Exclusive Investigation Period

CA agrees that the Exclusive Investigative Period may not extend beyond 180 days without your prior written consent.

At any time between the date of this agreement and the expiration of CA’s Exclusive Investigative Period, CA may inform you of the outcome of its investigation. If CA’s investigation reveals that you have an actional consumer law claim, CA may ask you to sign a formal retainer agreement. If CA’s investigation does not reveal an actionable consumer law claim, you will receive an e-mail that states CA will not represent you in any further pursuit of your potential claim(s).

The relationship between you and CA automatically terminates at 5pm on the 180th day of the Exclusive Investigative Period or your receipt of CA’s written notice to decline representation, whichever comes sooner. At the conclusion of the Exclusive Investigative Period or upon receipt of CA’s written declination of representation, you are permitted to seek alternative legal counsel without penalty.

Nothing in this agreement should be construed as a promise or guarantee that CA will represent you in a consumer lawsuit at any point in time. CA reserves the right to decline to represent you for any reason permitted by relevant laws and ethical rules.

Your Involvement and Promises to us

You agree to meaningfully participate and cooperate in CA’s investigation of your potential consumer law claim(s). You agree to immediately inform CA if your mailing address, e-mail address, or phone number changes at any point during the Exclusive Investigative Period.
You agree to provide all relevant information, communications, documents, materials, and all other similar instruments to CA and its representatives during the Exclusive Investigative Period. You understand that your failure to provide all relevant information, communications, documents, and materials to CA during the Exclusive Investigative Period may hinder, delay or otherwise frustrate CA’s investigation of your potential consumer law claim(s).

You agree, under penalty of perjury, to provide complete, accurate, and truthful information to CA. All documents and communications, oral or written, past or future, provided to CA during the Exclusive Investigative Period and anytime thereafter are presumed by CA to be true, complete, and accurate.

Fees and Costs Incurred During Exclusive Investigative Period

CA agrees that you will not incur any out-of-pocket fees or costs during CA’s Exclusive Investigative Period. However, if CA agrees to represent you in a consumer lawsuit, CA may recover the fees and costs incurred during the Exclusive Investigative Period from the Defendant pursuant to a future settlement or judgment.

You agree that CA has a right to place a lien on any future monetary recovery obtained by client related to the claims identified during CA’s Exclusive Investigative Period or as a result of CA’s investigative efforts. If you refuse to cooperate with CA in the formal pursuit of the consumer law claim(s) it identifies during or after the Exclusive Investigative Period, you agree that CA has the right to recover the fees and costs it incurred while investigating your potential consumer law claim(s).

Authorization to Use Your Electronic Signature

CA will send you any and all documents that require your signature. You authorize CA to affix your electronic signature to requests, disclosures, or other forms that CA deems reasonably necessary to the investigation of your potential consumer law claim(s) upon receipt of your approval or after the 7th day after the document was sent to you, whichever comes first. Your electronic signature will be used on any and all other subsequent documents that will need signature, affirmation, acknowledgment, or any other forms of authentication in reference to this matter under the above referenced procedure.

1You also agree to give CA the exclusive authority to investigate potential violations of state-specific consumer protection statutes.

All Rights Reserved. Without Prejudice. CONSUMER ATTORNEYS

FORM # INV2024CA119

I have read and agree to the Privacy Policy, Investigative Retainer
Supported file formats:

Attorney Advertising, Prior Results Do Not Guarantee A Similar Outcome. This website is for informational purposes only and does not contain legal advice. Results may vary depending on your particular facts and legal circumstances.

© 2024 Consumer Attorneys PLC. All Rights Reserved.