NITVAN Frequently Asked Questions 

1) How do I start a coalition?

A coalition is started by a leader organization, who is competitively selected as a sub-grantee under the NITVAN grant. Prospective sub-grantees will submit a Request for Proposal (RFP) to be considered for selection. The submission and review process will occur in 2017 from March 3rd to June 9th, with the award recipients announced in June. The same process will occur in 2018, with a specific time frame to be announced at a later date.

2) What NITVAN coalitions already exist?

There are currently three active coalitions:

  1. Finger Lakes Elder Abuse and Identity Theft Coalition

Region Served: Monroe County (Rochester, NY) and surrounding counties

  1. Identity Theft Advocacy Network (ITAN) of Colorado/Colorado Identity Theft Victim Assistance Program

Region Served: State of Colorado

  1. South Carolina Identity Theft Network

Region Served: State of South Carolina

3) How do I join an existing coalition?

To become a member of an existing coalition you would contact the leader organization of the coalition to verify the membership criteria and process. A current listing of active coalitions and their leader organizations is available under Join a Coalition. 

4) I am a victim, how can I get help?

You can reach out to the coalition that services your area for assistance. The list of active coalitions can be accessed under Join a Coalition. You may also find helpful information under the Resources section. If there is not an active coalition for your region or state, you can contact the Identity Theft Resource Center for assistance.

5) How do I submit my RFP?

Each interested applicant will contact ITRC via email, This email address is being protected from spambots. You need JavaScript enabled to view it., to verify that a submission will be entered. The written confirmation must include the contact information for the applicant entity and the authorized representative that will be submitting the RFP. Once this is received, a DropBox file request link will be sent via email. This is the only method by which applicants can provide submissions. No exceptions will be made. The deadline to submit your RFP has been extended to June 9th.

6) How do I use DropBox?

Dropbox is a secure file sharing and storage platform. You are not required to have this program already installed on your computer to submit your application. If you would like to create your own account you are able to do so for free using the following link: https://www.dropbox.com/register.

When you click on the file request link it will give you the option to upload a document directly from your computer or from your own Dropbox account. ITRC is the only party that can view your submission. Once documents are uploaded you will not have the ability to make any changes. If any portion of the RFP needs to be resubmitted, please contact the project administrator before the submission deadline via email: This email address is being protected from spambots. You need JavaScript enabled to view it..

There will be a deadline attached to the file request sent to each applicant, June 9th. Once this deadline is past, you will not be able to upload any documentation. If a submission is incomplete it will not move forward past the initial review stage.

 

This information was produced by the Identity Theft Resource Center, under award # 2016-XV-GX-K004, awarded by the Office for Victims of Crime, Office of Justice Programs,
U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this document are those of the contributors and do not necessarily represent
the official position or policies of the U.S. Department of Justice.

 

ITRC Sponsors and Supporters 

 

 

 

 

Go to top

 

The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.