The U.S. Federal Trade Commission (FTC) has begun mailing claim forms to more than 1,400 identity-theft victims who spent money to clear up identity-theft problems due to a security breach at data broker ChoicePoint in early 2005.The FTC began mailing claim forms to victims, identified with the help of law enforcement agencies, on Wednesday. The FTC has also created a website where consumers who do not receive a claim form can download one and obtain information about the claim process.In January, the FTC and ChoicePoint reached a settlement requiring the company to pay US$5 million to be used to reimburse consumers for expenses caused by the data breach. ChoicePoint also agreed to pay a $10 million fine.In February 2005, ChoicePoint announced that scammers had set up bogus businesses and contracted with the company to gain access to the personal information of 145,000 U.S. residents. The company, which found out about the breach in September 2004, later said the number of people whose information was lost in the breach was 163,000. Consumers who receive a letter and have out-of-pocket expenses due to identity theft caused by the ChoicePoint security breach should submit claims promptly; the FTC needs claims to be postmarked by Feb. 4, 2007, for them to be considered. Consumers who do not receive a letter, but believe they have identity theft-related expenses due to this incident, may submit a claim by completing the form available on the FTC’s website or by calling 1-888-884-8772. The amount applicants receive will depend on a number of factors, including the total number and amount of claims that the agency receives, the FTC said. ChoicePoint issued a short notice about the FTC reimbursement program. “Even though ChoicePoint agreed to create a $5 million fund to assist potentially affected consumers, ChoicePoint has no role in deciding who will receive the money or the criteria used by the FTC to distribute the money,” the company said.-Grant Gross, IDG News ServiceKeep checking our Security Feed page for updated news coverage. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe