Data Breaches

Data Breaches
Data Breaches
Contact Us

+1 877-615-1725

What action should you take in response to a data breach?

A credit reporting agency may be affected by a data breach that affects millions of consumers. The data might include names, addresses, Social Security numbers, dates of birth, driver's license numbers, military ID numbers, and passport numbers. The agency may have failed to implement adequate security measures to safeguard consumers’ personal data and ignored weaknesses in its data security. It’s terrible for this information to be released.

What should you do if you are one of the affected consumers?

  • Confirm that a breach occurred

Don’t trust emails about a breach, as scammers may write false alerts to catch consumers. Instead go to the offending company’s website and confirm that the scam occurred and that information about you was disclosed.

  • Strengthen your password

Immediately change your password and your answers to security questions.

  • Determine the type of data stolen

Assess the type of data stolen. You can replace credit cards, but a social security number is more difficult to change.

  • What damage has been done?

Find out if the scammers are using your data for illicit acts. Committing identity fraud may be at the top of their agenda.

  • Seek assistance

Consult a qualified attorney. State laws often help consumers seek damages for data breaches.

Who should you contact to advise you on the breach?

Consumer Attorneys are here to work for individuals whose personal information may have become compromised through a data breach. Please fill out the “Contact Us” form to the left and we will get back in touch with you.




Daniel C. Cohen

Data Breaches

Daniel C. Cohen
Daniel Cohen is the founding partner of Consumer Attorneys and co-chairs the firm’s Consumer Finance practice. Daniel also manages the firm’s client intake and development efforts.
Get in touch

Related Articles





How to Prevent Data Breach and What to Do After a Data Breach

Which of the following steps should a data breach victim take?

View all articles