DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Access Group notifies borrowers of data security incident

Posted on April 25, 2018 by Dissent

It’s not just edtech vendors students need to watch out for when it comes to privacy and data security.  Vendors that help process student loans may also put you at risk, as this notification from AccessLex Institute  (dba Access Group) reminds us.  The nonprofit organization, which provides financial education resources and services, writes:

Dear [Name]:

[Date]

Notice of Data Breach

We are writing to inform you of an incident that may have affected your personal information. We take the privacy andsecurity of our borrowers’ information very seriously and are writing to provide details regarding the incident and information about steps you may take to help protect yourself.

What Happened:

On March 28, 2018 we learned that on March 23, 2018 a vendor we use to help provide student loan processing services inadvertently sent a copy of certain loan files, including your file, to another business that was not authorized to receive them. Shortly after we learned of the inadvertent file transfer, we contacted managers of the second business that received the files. The second business confirmed it had deleted the transferred files and agreed that the appropriate manager would sign a sworn statement confirming it had deleted the files and retained no copies.

What Information Was Involved:

The information involved included your name, driver’s license number, and Social Security number.

What We Are Doing:

We are committed to protecting your information and regret any concern this incident causes you. To try to prevent a similar incident from happening in the future, AccessLex Institute d/b/a Access Group will continue to communicate to its vendors that they must have written data transfer protocols in place and must train their employees to verify the identity of planned recipients of data transfers before the vendors transfer data.

What You Can Do:

We are committed to protecting your information and regret any concern this incident causes you. We encourage you to remain vigilant by reviewing your financial account statements for any unauthorized activity. You should also review the additional information on the following pages regarding ways to protect yourself. In an abundance of caution, we have arranged for you to receive a complimentary one-year membership of Experian’s® IdentityWorksSM Credit 3B. This product helps detect possible misuse of your personal information and provides you with identity protection services focused on immediate identification and resolution of identity theft. IdentityWorks Credit 3B is completely free to you and enrolling in this program will not hurt your credit score. For more information on identity theft prevention and IdentityWorks Credit 3B, including instructions on how to activate your complimentary one-year membership, please see the additional information provided in this letter.

For More Information:
If you have questions about this incident, you may call [insert call center phone number], Monday through Friday, from[insert times].

Sincerely,

Charles Albano EVP and COO

Category: Breach IncidentsBusiness SectorExposureSubcontractorU.S.

Post navigation

← Altaba, Formerly Known as Yahoo!, Charged With Failing to Disclose Massive Cybersecurity Breach; Agrees To Pay $35 Million
Hackers built a ‘master key’ for millions of hotel rooms →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.