Intake Consent Terms
The concise consent bundle users see before submitting a breach-related intake form.
- Updated
- May 7, 2026
- Footer
- Optional
- Intake
- Required
What you are asking Breached to do
By submitting an intake form, you ask Breached to receive your information, keep a consent record, and use your submission for the specific breach matter. If no attorney or law firm is currently investigating through Breached, you are asking to be notified if that changes and may separately select named participating firms that may receive the submission only if they later evaluate this same matter through Breached. If an attorney or law firm is already listed for the case, you ask Breached to share your submission with that case team for evaluation when you consent.
No attorney-client relationship
Submitting a form does not make Breached your lawyer and does not create an attorney-client relationship with any attorney or firm. Representation starts only if a law firm accepts you as a client in writing.
Permission to contact you
- You authorize Breached, and any attorney, law firm, or staff member disclosed in the intake workflow, to contact you about the matter you submitted.
- If no attorney is currently investigating through Breached, attorney follow-up will wait unless a law firm you selected later begins evaluating the matter through Breached, or you give fresh sharing consent after a different case team is identified.
- Contact may happen by email, phone, or text if you provide those details and applicable law allows it.
- You can opt out of marketing or automated messages. Transactional messages about your submission may still be sent where allowed.
Information accuracy
You confirm that the information you provide is accurate to the best of your knowledge and that you are submitting your own information or are authorized to submit it.
Sensitive information
Do not include Social Security numbers, passwords, payment card numbers, full dates of birth, government IDs, medical details, biometric details, genetic details, reproductive-health details, or raw breach files in the public intake notes unless a secure attorney workflow specifically asks for them later.