Beta Site

Subject to frequent updates

For free live help: 888-400-5530

Breach:

Art.com (2019) We Calculated the Art.com Breach Clarity Score using our patent-pending algorithm. The results are based on an analysis of 1,000+ data points. Each Breach Clarity Score is packaged with a set of most-likely risks and action steps based on the specific data breach searched. Each data breach is different in terms of the amount and type of data compromised, which means each carries a unique risk profile. Breach Clarity recommends the most important actions you should take for this particular data breach.

New financial credit account New financial deposit account Up to 9 more fraud or privacy risks
Breach Clarity Score: Breach Clarity's algorithms dynamically compute a high-level simplified estimated risk rating for all publicly-reported US data breaches. (We currently have the last 29 months of breaches in the database maintained by the ITRC, with more being added daily). Estimated risk scores are based on how impactful the 'likely exposed ID records' are projected to be on 11 possible categories of identity crimes (such as the top two risks calculated and displayed for this breach below). Breach Clarity's algorithm design and values are based on our ongoing research of fraud mitigation professionals and practices.
6
out of 10
Top Risks:
New financial credit account ID criminals use information such as SSNs to open new financial accounts at banks, payments, investment, or lenders , and then 'cash out' with fraudulent payments.These crimes can go undetected for significant time, extending losses.
New financial deposit account ID criminals use information such as Social Security numbers to open new financial deposit accounts (such as checking, savings, share draft, or money market), then build the balance with fraudulent transfers before they finally ‘cash out’. These crimes can go undetected for a significant time, extending losses.
Up to 9 more fraud or privacy risks Breach Clarity is capable of computing up to 10 total identity risks, including New financial credit account, New financial deposit account, Medical ID theft, Tax refund identity theft, Existing financial acct. (not credit card), Government documents/benefits, Existing credit card account, Employment or wage-related, Phone or utilities, Evading the law, and Other existing account misuse
  • Tax ID #
  • Name
  • Email address personal
  • Non-card payment routing #
  • Health insurance # or login
  • Home address current
  • Social Security #, full
  • Phone account #
8 of 8 likely exposed records listed

Prioritize These Actions:

Get free credit reports You’re entitled to one free credit report from each of the three top bureaus per year–and possibly more depending on what financial provider(s) you use. Monitoring these regularly can spot potential fraudulent opening of new accounts or even misuse of an account that you haven’t used in awhile.
Set fraud alerts/freeze credit Both fraud alerts and credit freezes are now free, but they work differently. A fraud alert keeps your credit information open while advising those making an inquiry to be more cautious when using it (both for existing and new account activity). A credit freeze prevents your credit information from being used, which stops all inquiries related to new financial *credit* or even employment and housing activity. With fraud alerts, notification to one credit agency is supposed to result in the other two being automatically notified as well, but to be certain contact all three directly. Credit freezes always must be set (and removed) at each of the three bureaus, and may prevent some desired last-minute activity on your part. Check with the FTC for the latest information , including how to set fraud alerts and credit freezes.
File your taxes ASAP If you’ve the first person to file for a tax refund in your name, identity criminals can’t successfully file one in your name first. If a breach of records such as your SSN or income information exposed you to IRS, get your taxes in earlier than you normally would.
  • 10+ additional action steps
  • 2-9 additional risks
  • Integrate multiple breaches
  • Integrate breach-finding and dark web monitoring
  • More financial tools and service integrations
  • Recommended commercial protection service features