Breach Readiness & Response

  1. Services for Businesses:
    1. Pre-Data Breach Services - The following Services are available to Plan Members at any time during the Benefit Period, regardless of whether the Plan Member has declared a Data Breach event.
      1. Cyber Security Risk Assessment Questionnaire with recommendations to reduce risks identified by the assessment available for viewing and download.
      2. Template Information Governance Policy and Action Plan available for viewing and download.
      3. Various educational materials are available for viewing or download.
      4. Quarterly cybersecurity webinar training sessions.
      5. Quarterly email newsletters focused on issues including information privacy legislative issues and emerging cyber threats.
      6. Monthly cybersecurity event summary email.
      7. Flash email alerts concerning immediate cyber threats.
      8. Business Internet Credential Monitoring for up to 50 sensitive business credentials such as bank or credit card account information.
      9. Additional, optional live and/or onsite information governance and cybersecurity consulting and training at preferred rates available only to Plan Members.
      10. Live consultation with an information governance and cyber risk expert. The length of this consultation period is stated in each executed SOW.
    2. Data Breach Response Planning and Notification Services - The following Services are available in response to a Data Breach event declared by Plan Member:
      1. Services are limited to the number of Data Breach events stated in each executed SOW. Services for additional Data Breach events are available for an additional fee.
      2. Services are limited to Data Breach Events which involve sensitive, personally identifiable information or data relating to employees, customers, clients or other Consumers which is gathered, and stored on local servers. Services are not available where this information or data originates from offices, branches or locations that are not Plan Member’s but are connected to the Plan Member by a remote system.
      3. Live response 24/7/365 to answer questions, receive reports of a suspected Data Breach event and recommend critical first steps.
      4. Dedicated point of contact from defend-id to respond to calls, deliver critical documents and address ongoing concerns.
      5. Comprehensive information gathering and assessment process to determine the nature and extent of the Data Breach event and applicable federal and state notification requirements.
      6. Live consultation with an information governance and cyber risk expert. The length of this consultation period is stated in each executed SOW.
      7. Creation of a detailed plan and timeline to provide a response to the Data Breach event.
        1. Recommend notification letter content to governmental agencies and Affected Consumers based on the circumstances and compliance requirements of the Data Breach event.
        2. Recommendations and preferred pricing for additional services to Affected Consumers that may be required or beneficial including credit or non-credit monitoring and identity theft recovery services.
        3. Recommendations and preferred pricing for address management, mailing and call center services that may be required or desirable to incorporate into the response plan.
        4. Recommendations concerning public relations communications and frequently asked questions to employees, the press, the general public, and others.
        5. Recommendations concerning communication and interaction with law enforcement agencies.
    3. Provide preferred pricing for optional, additional services as elected by the Plan Member to support the specific needs of the response plan:
      1. Optional live and/or onsite post-event consultation, investigation and forensic analysis services for an additional fee.
      2. Internet Monitoring - A form of identity monitoring with daily alerts to identify inappropriate instances of the Affected Consumer’s personal information on the internet, including black market sites and selected social networking sites (Facebook, Twitter, and LinkedIn). Credential Vault provides a means for the Affected Consumer to securely register up to 50 bank accounts, credit cards and other sensitive information and credentials to be monitored together with their personally identifying information provided by the Affected Consumer during registration.
      3. Public Records/Database Monitoring - a form of identity monitoring which analyzes very large quantities of public and purchased data to provide daily alerts when changes are found in the Affected Consumer’s personal information, including name, address, date of birth and SSN, that may indicate possible identity fraud.
      4. One Bureau Credit Report with Score.
      5. Three Bureau Merged Credit Report with Scores - from Experian, Transunion and Equifax.
      6. One Bureau Credit Monitoring of the Affected Consumer’s credit file with email and optional text alerts to changes in their credit profile.
      7. Three Bureau Credit Monitoring of the Affected Consumer’s Experian, Transunion and Equifax credit files with daily or weekly email and optional text alerts to changes in their credit file with any of the three credit bureaus.
  2. Fully Managed Recovery Services for Individual Affected Consumers Who Are Victims of ID Theft
    1. Services, equal to the Services described in item 1 above, are available at any time during the Term subject to the terms and conditions of this Agreement.
    2. Services for Fully Managed Recovery are limited to the number of Affected Consumers per Data Breach event stated in each executed SOW. Additional Services for Fully Managed Recovery for Affected Consumers are available for an additional fee.
    3. Affected Consumers must be clearly identified to defend-id by name and address in an electronic format approved by defend-id.
  3. Additional, Optional Services Available as Elected by CLIENT.
    1. Fully Managed Recovery Services for Employees of the Plan Member and Their Eligible Family Members.
    2. Services, equal to the Services described in item 1 above, are available at any time during the Term subject to the terms and conditions of this Agreement.
    3. Eligibility for Services to the employee or their eligible family member is based on identity theft events that are discovered or first known to the employee or their eligible family member and reported to defend-id during the benefit period. Identity theft events that are discovered or first known to the employee or their eligible family member prior to their benefit period are not eligible for Services under this Agreement.
    4. Identity Fraud Recovery Services for Business Plan Members
    5. If business identity theft occurs a professionally trained Identity Theft Recovery Advocate, who is an employee of defend-id, will be assigned to provide the following services as needed:
      1. Business identity fraud recovery services may not be combined in the same product bundle with any other business service.
      2. Services are limited to two (2) Business Identity Theft events in any twelve (12) month period.
      3. The initial response by defend-id within one business day.
      4. Advice for the Company Representative on any immediate actions that would be prudent to stop the damage from continuing.
      5. Notification to the three major business credit bureaus, Better Business Bureau and the business Plan Member’s affected creditors, financial institutions, and other agencies as appropriate.
      6. Assistance with filing a police report, as necessary.
      7. Collect information regarding the misuse of the Business Plan Member’s accounts.
      8. Create and maintain a case file to document the identity fraud.
      9. Provide an initial review, and follow up reviews as needed, of the Business Plan Member’s Dun & Bradstreet (“D&B”) business credit report with the Company Representative to determine potential areas of fraud.
      10. Provide monitoring of the Business Plan Member’s D & B business credit report to identify potentially fraudulent activity. Monitoring will continue for a period of one year including the recovery period.
      11. Provide information to the Secretary of State, State Corporation Commission, FTC, and to other government agencies as appropriate.
      12. Research and investigate potential damage to the Business Plan Member’s identity and diligently strive to restore the business Plan Member’s identity to pre-event status.
      13. Other assistance as defend-id might reasonably be able to offer to the Business Plan Member as determined at defend-id’s sole and absolute discretion.
      14. Such other assistance as may be agreed upon by defend-id and the Business Plan Member.