DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VALIC notifying customers of breach in 2007 (updated)

Posted on February 27, 2014 by Dissent

The Variable Annuity Life Insurance Company (VALIC) is notifying customers of what appears to be an old security lapse. In a letter template submitted yesterday to the California Attorney General, the firm writes:

It recently came to our attention that a financial advisor formerly associated with VALIC was in possession of information relating to some of our customers including you. This included customer names and either partial or complete Social Security numbers. There is no indication that your information has been misused.

Given that the financial advisor left VALIC in October of 2007, I’m curious as to how this first came to their attention now. Did the financial advisor suddenly discover it on their hard drive, or if not, how did VALIC learn of it? (see below for update)

Those notified were offered a year of free credit monitoring services.

Update: The breach was also reported to Maryland with a cover letter to the state’s Attorney General that provides additional details. In their submission to that state, they reported that 774,723 were affected nationwide and that on October 29, 2013, law enforcement gave them a thumb drive with their customer data obtained during an execution of a search warrant on the former financial advisor.

In digging into this more, it seems that VALIC first reported this breach to Maryland’s Attorney General in February 2013. According to their report, they first became aware of  a problem back in September 2012, when they were contacted by a customer who had been contacted by the former advisor, who was still in possession of their Social Security numbers and information.  On January 14, they learned that the former advisor was likely the one trying to gain access to client account information by creating userids and profiles to access accounts. As a result, VALIC notified some clients when they found evidence that someone had created a userid and profile to view the client’s account on valic.com – or had tried unsuccessfully to do so.  Those notification letters did not happen to mention that the unauthorized individual was likely a former financial advisor.

The former financial advisor was arrested in September, 2013.  VALIC reports it took them from October 29 until November 12 to complete their preliminary investigation and then a few more weeks to identify individuals who needed to be notified and their current contact information. There is no explanation as to why it took from the beginning of December 2013 until the end of February 2014 to actually send the notification letters.

No related posts.

Category: Financial SectorInsiderU.S.

Post navigation

← L.A. Care Health Plan replacing some members' cards after unintended exposure
MN: Privacy and civil liberties at stake in trial over filming of paramedics in Little Canada →

1 thought on “VALIC notifying customers of breach in 2007 (updated)”

  1. jo chambers says:
    March 23, 2014 at 7:39 am

    the only people in our corporation I have found that even recieved a letter of security breach was another colleague who retired. As far a I know, no one currently employed has been notified. I am sure they don’t want their current clients to panic, but everyone invested in this corrupt company should be notified…

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.