DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VALIC notifying customers of breach in 2007 (updated)

Posted on February 27, 2014 by Dissent

The Variable Annuity Life Insurance Company (VALIC) is notifying customers of what appears to be an old security lapse. In a letter template submitted yesterday to the California Attorney General, the firm writes:

It recently came to our attention that a financial advisor formerly associated with VALIC was in possession of information relating to some of our customers including you. This included customer names and either partial or complete Social Security numbers. There is no indication that your information has been misused.

Given that the financial advisor left VALIC in October of 2007, I’m curious as to how this first came to their attention now. Did the financial advisor suddenly discover it on their hard drive, or if not, how did VALIC learn of it? (see below for update)

Those notified were offered a year of free credit monitoring services.

Update: The breach was also reported to Maryland with a cover letter to the state’s Attorney General that provides additional details. In their submission to that state, they reported that 774,723 were affected nationwide and that on October 29, 2013, law enforcement gave them a thumb drive with their customer data obtained during an execution of a search warrant on the former financial advisor.

In digging into this more, it seems that VALIC first reported this breach to Maryland’s Attorney General in February 2013. According to their report, they first became aware of  a problem back in September 2012, when they were contacted by a customer who had been contacted by the former advisor, who was still in possession of their Social Security numbers and information.  On January 14, they learned that the former advisor was likely the one trying to gain access to client account information by creating userids and profiles to access accounts. As a result, VALIC notified some clients when they found evidence that someone had created a userid and profile to view the client’s account on valic.com – or had tried unsuccessfully to do so.  Those notification letters did not happen to mention that the unauthorized individual was likely a former financial advisor.

The former financial advisor was arrested in September, 2013.  VALIC reports it took them from October 29 until November 12 to complete their preliminary investigation and then a few more weeks to identify individuals who needed to be notified and their current contact information. There is no explanation as to why it took from the beginning of December 2013 until the end of February 2014 to actually send the notification letters.


Related:

  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • UK: Woman charged after NHS patients' records accessed in data breach
  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
Category: Financial SectorInsiderU.S.

Post navigation

← L.A. Care Health Plan replacing some members' cards after unintended exposure
MN: Privacy and civil liberties at stake in trial over filming of paramedics in Little Canada →

1 thought on “VALIC notifying customers of breach in 2007 (updated)”

  1. jo chambers says:
    March 23, 2014 at 7:39 am

    the only people in our corporation I have found that even recieved a letter of security breach was another colleague who retired. As far a I know, no one currently employed has been notified. I am sure they don’t want their current clients to panic, but everyone invested in this corrupt company should be notified…

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.