RELATED INFO
* News release link
* Protecting your identity

Data Incident - Month xx 2007

Who was affected, and what personal information was compromised?

Details of the security incident here.
If you did not receive a letter but think you may be in that group, you may call toll free at xxx-xxx-xxxx to check.

 

Do you know whether the information was stolen?

While the investigation clearly indicates that a computer was compromised, we do not know if any data were stolen. The possibility exists that records may have been accessed, so we are alerting everyone who may have been affected because this information could be used to commit identity theft.

 

How do I guard against identify theft?

Watch your financial statements and credit reports to check for entries that you don't recognize or any new accounts opened in your name. Even if you do not find any suspicious activity on your initial credit reports, the Federal Trade Commission recommends that you check your credit reports periodically. Identify theft information sometimes is held for use later or shared among a group of thieves for use at different times. You can request a free copy of your credit report no more than one time per year from each of the three major nationwide credit bureaus; however, you need to do so by contacting the central agency at https://www.annualcreditreport.com. You can also request a free initial fraud alert to be placed on your credit files by calling any one of the three major nationwide credit bureaus.

 

What do I do if I see evidence of fraud or identity theft on my credit report, credit card statements, or other financial accounts?

If you find suspicious activity on your credit reports or have reason to believe your information is being misused, file a complaint with the FTC at http://www.consumer.gov/idtheft or at 1-877-ID-THEFT (438-4338). Your complaint will be added to the FTC's Identity Theft Data Clearinghouse, where it will be accessible to law enforcement agencies for their investigations. The FTC also will advise you on further steps to take in the event your information is being used illegally.

 

Why does the Federal Trade Commission (FTC) recommend waiting one month after an incident before requesting a copy of your credit report?

The FTC advises that suspicious activity probably will not show up immediately. In instances when personal information is stolen, it's best to wait about a month to order a copy of a credit report, according to the FTC's Web page, http://www.ftc.gov/bcp/conline/pubs/alerts/infocompalrt.htm. However, because it takes some time to fill out the forms you will receive, you can initiate the process at any time.

 

What action is Purdue taking to prevent illegal access of confidential information in the future?

Purdue has directed all units on all campuses to discontinue the use of Social Security numbers (SSNs) in all records except those that are absolutely necessary or required by law. Purdue also has a large-scale program to improve its security underway called SecurePurdue. It was because of the system testing conducted through this program that this potential exposure was detected and corrected.

 

What steps is Purdue taking to prevent illegal access of confidential information in the future?

Purdue is centralizing records that must contain SSNs as well as conforming to a high level of computer authentication, authorization and encryption for access to these records.