The Hidden Dangers of Email Apps on Shared Family Devices: Privacy Risks You Can't Ignore
Sharing family devices with logged-in email apps creates serious privacy vulnerabilities most families overlook. With account takeovers rising 24% and affecting nearly 29% of U.S. adults in 2024, shared device access exponentially increases risks to banking, medical records, and personal information requiring immediate protective action.
When your teenager borrows the family iPad to check something quickly, or your partner uses the shared laptop to print a document, you probably don't think twice about it. But if your email app is logged in on that device, you've just exposed yourself to privacy vulnerabilities that could compromise everything from your banking information to your medical records. The convenience of accessing email on shared family devices comes with hidden security risks that most families never consider until it's too late.
Every day, millions of families share tablets, computers, and smartphones among multiple household members. These shared devices have become essential for managing modern family life—coordinating schedules, handling school communications, and staying connected. Yet this convenience creates a dangerous privacy paradox: the same email applications that help families stay organized can become gateways for unauthorized access, identity theft, and surveillance that violates both trust and law.
The reality is sobering. Security experts at CM Alliance warn that shared devices may retain tracking software and maintain access permissions long after a relationship or household arrangement changes, creating invisible security risks that compound over time. Meanwhile, account takeover attacks increased 24 percent year-over-year in 2024, with nearly 29 percent of U.S. adults experiencing account takeover in that year alone—and shared device access makes these attacks exponentially easier.
This comprehensive guide examines the specific privacy vulnerabilities created when email apps run on shared family devices, explores the legal implications that could expose you to criminal liability, and provides practical solutions for protecting your family's digital communications without sacrificing convenience.
Why Shared Device Email Access Creates Invisible Vulnerabilities

The fundamental problem with email apps on shared devices isn't just about someone reading your messages—it's about the architectural collapse of privacy protections that occurs when multiple people access the same device. Understanding these technical vulnerabilities helps explain why even well-intentioned families face serious security risks.
The Persistent Login Problem: When Logging Out Isn't Automatic
Most family members don't realize that email applications maintain persistent authentication states that remain active long after you've closed the app. When you check your email on the family tablet and simply close the application without explicitly logging out, your account remains accessible to anyone who opens that app next.
Security professionals at KCB Power emphasize that logging out after email access represents the single most important daily behavior for protecting shared device privacy, yet it's the step most people skip. The convenience of staying logged in becomes a security nightmare when other family members—or guests, repair technicians, or anyone else with temporary device access—can simply open your email and browse your entire communication history.
This vulnerability extends beyond just reading current messages. Email applications store extensive historical communications, attachments, and cached credentials. Every attachment you've downloaded, every password your email client has saved, and every forwarding rule you've created becomes accessible to anyone who gains access to that logged-in session.
The Synchronization Nightmare: Your Email on Devices You've Forgotten
Modern email systems automatically synchronize messages across all devices where your account is logged in. This creates a particularly insidious vulnerability: your email continues syncing to devices long after you think you've disconnected them.
Research examining device synchronization vulnerabilities found a particularly concerning pattern: users who explicitly disabled synchronization settings on their devices continued receiving synchronized messages despite their settings indicating synchronization was disabled. This means a former family member who previously used the shared device might continue receiving your emails on that old device without anyone realizing it.
The technical mechanisms behind this involve authentication tokens that remain valid even after settings changes. When a device connects to an email server, it receives credentials that persist in the background, silently downloading new messages to devices that should be disconnected. For families managing shared devices, this creates a scenario where privacy erosion occurs entirely behind the scenes, with no visible indication that synchronization continues on forgotten or obsolete devices.
Cached Credentials and Password Persistence
Email applications don't just store your messages—they cache your login credentials to provide convenient access. On shared devices, these cached credentials become a treasure trove for anyone seeking unauthorized access. Even if you've logged out of your email session, the application may have saved your username and password in the device's credential store, making it trivial for someone else to access your account.
Browser-based email access creates additional vulnerabilities through saved passwords and auto-fill features. If your browser is configured to remember passwords, anyone using that browser can access your email simply by selecting your username from the auto-fill dropdown—no password required.
The Weak Password Trap: Why Shared Access Means Compromised Security

When multiple family members need to access the same email account or device, an inevitable pressure develops toward weaker, more memorable passwords. This creates a security vulnerability that extends far beyond the shared device itself.
The Memorability Versus Security Dilemma
Security experts at DMARC Report reveal that weak passwords remain one of the most common reasons for email account break-ins, with tools readily available to hackers for cracking simple passwords. When a family implements a shared email password, the pressure toward weak credentials intensifies because everyone must be able to remember it without writing it down.
This pushes families toward passwords like "Family2025!" or "House123" rather than genuinely random character strings that would provide actual security. The more people who need to remember a password, the simpler and more predictable it becomes.
The Password Change Coordination Problem
Best practices recommend changing passwords every ninety days, but this becomes nearly impossible when passwords are shared among family members. A password shared with four family members becomes exponentially harder to change—everyone must be notified, everyone must update their devices and applications, and coordination typically fails.
Over time, this creates situations where individuals who should no longer have access—adult children who have moved out, extended family members who no longer visit, or former household residents—continue possessing valid credentials because nobody bothered to implement a password change after they departed.
The Password Reuse Cascade
The risks multiply when family members reuse the shared household email password across their personal accounts. If the shared family email password is compromised through a data breach at any website where someone reused it, attackers gain access not just to the family email but potentially to multiple accounts across different platforms. A single credential compromise creates cascading vulnerabilities across the entire digital household.
Password managers that might otherwise secure this information become problematic when multiple family members need access—the password manager itself becomes a shared vulnerability requiring a single master password that everyone knows, defeating the security benefits of password management.
Account Takeover: The Gateway to Identity Theft

Email account takeover represents one of the most severe risks created by shared device access, particularly because email accounts serve as the master key to an individual's entire digital identity. When attackers compromise an email account, they can request password reset links for every other service the account holder uses—banking, social media, cloud storage, shopping accounts, healthcare portals.
The Scale of the Threat
Industry research from Mitek Systems indicates that 83 percent of organizations surveyed experienced at least one account takeover attack, with some experiencing over 25 such attacks. The average financial loss per individual account takeover reached $180, though losses can extend to $85,000 or more depending on account value.
For families with shared device email access, this risk multiplies because attackers don't need to compromise the email account through external means—they simply need physical access to the shared device to directly access the email account. The threat isn't just from sophisticated hackers halfway around the world; it's from anyone who picks up your family tablet.
The Detection Lag Problem
Security research from DeepStrike reveals that when an account takeover occurs, the typical detection lag extends 292 days—nearly ten months during which unauthorized users maintain access to communications, financial information, and personal data.
This extended dwell time allows attackers to study patterns, understand family financial arrangements, identify vulnerabilities in other accounts, and position themselves for comprehensive identity theft. During this period, the attacker typically monitors outgoing communications to learn which services the victim uses, what account recovery procedures exist, and how to impersonate the victim to customer service representatives.
The Cascading Compromise Effect
Once attackers control your email account, they can systematically take over your entire digital life:
- Banking and Financial Accounts: Request password resets for banks, investment accounts, and payment services
- Social Media: Take control of Facebook, LinkedIn, Instagram, and Twitter accounts
- Cloud Storage: Access Google Drive, Dropbox, or iCloud containing sensitive documents
- Shopping Accounts: Make fraudulent purchases using saved payment methods
- Healthcare Portals: Access medical records and insurance information
- Government Services: Compromise tax accounts, Social Security portals, and benefits systems
The compromised email account becomes the pathway to systematic account takeover across the victim's entire digital life.
Legal Implications: When Family Access Becomes Criminal

Many families operate under the misconception that sharing devices means sharing access rights to everything on those devices. The legal reality is starkly different and could expose family members to criminal prosecution.
Federal Criminal Penalties for Unauthorized Email Access
The Electronic Communications Privacy Act (ECPA) and the Computer Fraud and Abuse Act (CFAA) provide federal criminal penalties for unauthorized email access. Accessing someone's email without permission constitutes a federal offense, with potential penalties ranging from substantial fines to imprisonment depending on the severity of the violation.
Simply reading someone's email without changing anything still constitutes unauthorized access—the crime is accessing the information without authorization, not modifying it. This means a parent who reads their adult child's email on a shared device, or a spouse who accesses their partner's account, could face federal criminal charges.
The Stored Communications Act and Civil Liability
The Stored Communications Act (18 U.S.C. Section 2701) specifically establishes civil liability for unauthorized email account access, allowing victims to sue violators and seek significant monetary damages. Family law contexts have produced particularly troubling incidents where individuals accessed spouses' or partners' email accounts, with courts consistently ruling that shared device access does not constitute implicit permission to view the other party's accounts.
The Device Password Does Not Equal Account Authorization
Courts have established a clear distinction between having technological access and having legal authorization. Even when someone has a password to a shared device, accessing another family member's account on that device without their permission violates federal law.
A California court case illustrates these legal principles starkly: The defendant accessed her son's email account using his password (which she possessed), but the court ruled that parental access to a shared device does not establish "apparent authority" to read the son's email. Parents possessing device passwords cannot legally justify accessing their adult children's email accounts.
The Parental Monitoring Dilemma: When Protection Becomes Surveillance

The intersection between legitimate parental monitoring and invasive surveillance technology presents particularly acute privacy challenges on shared family devices. Parents face genuine concerns about protecting their children online, but some monitoring solutions create more problems than they solve.
The Stalkerware Problem Disguised as Parental Controls
Research examining parental control applications found that "unofficial" sideloaded apps demonstrate concerning patterns of excessive data access and hidden operation. Among sideloaded parental control apps studied, many intentionally hid their presence from the device user—a practice prohibited for legitimate applications but employed by apps marketed as "parental controls" that function similarly to stalkerware.
Eight out of twenty examined sideloaded parental control apps displayed potential indicators of compromise consistent with stalkerware functionality. These problematic applications accessed "dangerous" permissions allowing real-time location tracking, complete access to personal data, and the ability to intercept messages from dating applications.
The Transparency Versus Surveillance Distinction
The technical architecture of problematic monitoring apps mirrors spy software more closely than legitimate parental supervision tools—multiple apps included functionality to take screenshots remotely, view call logs, read messages, and listen to live calls. Some apps enabled interception of communications from specific applications like Tinder, suggesting repurposing of spousal surveillance tools rebranded as child safety applications.
If a parent has an open, transparent relationship with their child, they shouldn't need to hide monitoring apps on their child's phone or have access to so much private information. The practice of hiding app presence contradicts any legitimate parental authority framework and suggests surveillance rather than transparent parenting.
The Data Breach Consequences
The extensive data collection by problematic parental control apps creates mass surveillance risks when those services experience breaches. A 2015 incident demonstrated the consequences when the mSpy app was hacked, exposing tens of thousands of customer records including children's personal data. Similar customer service data leaks occurred again in 2024, revealing customers used the apps to spy on suspected cheating partners rather than for legitimate child protection.
A single compromised parental monitoring app can expose location data, communications, and personal information for thousands of children simultaneously.
Mobile Device Vulnerabilities in Family Settings
Mobile devices present unique security challenges when used for family email access, particularly when work email intersects with personal or shared family devices.
The BYOD (Bring Your Own Device) Security Nightmare
When family members check work email on shared devices—perhaps a parent allowing their child to use a shared tablet to occasionally check work messages—they introduce workplace security vulnerabilities into the shared device threat model. This creates liability not just for the individual but potentially for their employer as well.
Compromised Home Networks and Credential Interception
Mobile devices accessing work email through consumer networks, often on shared home Wi-Fi, lack the continuous security monitoring that corporate networks provide. A compromised home Wi-Fi router can position an attacker to monitor all network traffic, potentially intercepting login credentials as they traverse the network.
Additionally, mobile devices commonly have weak authentication compared to corporate-managed computers—they might lack biometric authentication, encryption, or multi-factor authentication implementations, creating entry points for attackers.
Mobile Malware and Sideloaded Applications
Malware threats on shared mobile devices accessing email prove particularly severe because mobile malware detection remains inconsistent and users rarely understand malware risks in mobile environments. Attackers can install spyware applications that monitor screenshots, capturing credentials as email logins occur, and establishing persistent access without the user's knowledge.
A family member installing entertainment apps or productivity tools from unofficial sources might inadvertently introduce malware that monitors email access and transmits credentials to attacker-controlled servers.
Practical Solutions: Protecting Family Email Privacy Without Sacrificing Convenience
Given these comprehensive risks, families need practical strategies that balance security with the legitimate need for convenient communication. The following recommendations provide actionable steps for protecting email privacy on shared devices.
Establish Clear Device and Account Separation Policies
The most fundamental practice involves establishing clear policies regarding which applications access which devices, with particular restrictions on shared device email access. Important personal accounts—banking, healthcare, government services, financial institutions—should never use shared device email access, instead maintaining separate authentication mechanisms on personal devices controlled exclusively by the account holder.
For essential shared household communications that genuinely require multiple family members' access, families should utilize specialized group email systems rather than shared personal accounts. Microsoft Office 365 provides "shared mailboxes" designed specifically for this purpose, allowing multiple users to access a unified inbox without sharing credentials.
Shared mailboxes enable role-based access control, meaning different users can be granted appropriate permission levels—some users might have full access to read, send, and delete messages, while others have read-only access. Critically, shared mailboxes track individual user activity, creating audit logs that identify which user took which action, addressing the accountability problems inherent in traditional shared account approaches.
Implement Mandatory Logout Protocols
Logging out after email access represents the single most important daily behavior for protecting shared device privacy. Users must develop the habit of explicitly logging out from email applications after each use, rather than leaving them in logged-in states that provide access to anyone who subsequently uses the device.
This extends to clearing browser caches and cookies after email access through web interfaces, removing stored authentication information that could provide persistent access. For particularly sensitive email access, private or incognito browsing modes should be used, ensuring that session data is deleted when the browser closes.
Maintain Separate Email Addresses for Different Purposes
This segmentation ensures that compromise of one email account due to shared device vulnerabilities doesn't cascade to compromise of the individual's entire digital life. Family members should maintain separate personal email addresses for sensitive communications, never using family email addresses for financial services, healthcare communications, or other sensitive matters.
Enable Two-Factor Authentication on All Accounts
Two-factor authentication should be mandatory on all email accounts, creating an additional barrier even if credentials are compromised. The ideal approach involves enabling two-factor authentication through authenticator apps rather than SMS, as SMS-based 2FA remains vulnerable to SIM swap attacks where attackers convince mobile carriers to transfer a phone number to a different device they control, intercepting SMS-based verification codes.
When two-factor authentication is enabled, even attackers with valid passwords cannot access the account without the physical authentication device.
Use Privacy-Focused Email Solutions with Local Storage
For families serious about email privacy, using email clients that prioritize local storage over cloud synchronization provides significant architectural advantages. Email clients that download messages to the local device and do not synchronize to company servers eliminate the centralized storage vulnerability where a single breach affects millions of users simultaneously.
Mailbird represents an ideal solution for families seeking this protection. As a desktop email client with local storage architecture, Mailbird downloads your emails to your computer rather than maintaining them exclusively in cloud servers. This means your email data remains under your direct control on your personal device, rather than being distributed across multiple cloud synchronization points that could be accessed from forgotten or compromised devices.
Mailbird's unified inbox capability allows you to manage multiple email accounts—personal, work, financial, and family—from a single interface while maintaining complete separation between accounts. This makes it easy to implement the recommended email segmentation strategy without the complexity of managing multiple separate email applications.
Additionally, Mailbird's local storage approach means that when you're not actively using the application, your emails aren't accessible through web browsers or synchronized to other devices without your explicit configuration. This provides inherent protection against the persistent login and synchronization vulnerabilities that plague cloud-based email services.
Configure Automatic Logout Timers and Disable Credential Saving
When email clients are used on shared devices, they should be configured with automatic logout timers that log out accounts after a specified period of inactivity, preventing unauthorized access through devices left unattended. Email applications should not be configured to "remember passwords" or save authentication tokens that persist across browser sessions, instead requiring re-authentication for each session.
For browsers accessing email through web interfaces, auto-save features must be disabled to prevent password managers or browsers from automatically populating credentials when the next user opens the email application.
Incident Response: What to Do If Compromise Occurs
Even with protective measures in place, email compromise can still occur. Knowing how to respond quickly can limit damage and prevent cascading account takeovers.
Immediate Actions Within the First Hour
Compromise victims should review account security settings specifically looking for unauthorized changes to recovery phone numbers, recovery email addresses, or security questions that attackers might have modified. Email forwarding rules should be examined carefully, as attackers frequently create forwarding rules that silently send copies of all incoming messages to attacker-controlled accounts without the owner's knowledge.
Device Cleanup and Malware Scanning
All connected devices should be logged out completely, preventing attackers who have compromised account credentials from maintaining persistent access across multiple devices. Two-factor authentication should be enabled on all accounts if not previously configured, and any unrecognized devices should be removed from account access lists.
Scanning for malware on shared devices proves essential because malware often persists on devices and continues transmitting credentials to attacker-controlled servers even after password changes. Complete device scans with updated antivirus software should be conducted, and consideration should be given to resetting the device to factory default settings and reinstalling the operating system to ensure complete malware removal.
Ongoing Monitoring and Credit Protection
After an email compromise, victims should monitor their financial accounts closely for unauthorized transactions and consider placing fraud alerts with credit bureaus. The extended detection lag that characterizes many account takeover incidents means that monitoring should continue for several months after the initial compromise is discovered.
Building a Family Privacy Culture: Beyond Technical Solutions
While technical controls provide essential protection, lasting email security on shared family devices requires building a household culture that values privacy and practices good digital hygiene.
Establishing Family Digital Agreements
Families should establish clear, written agreements about device usage, account access, and privacy expectations. These agreements should explicitly state that having access to a shared device does not grant permission to access other family members' personal accounts, and that unauthorized access violates both family trust and federal law.
For children, these agreements should balance appropriate parental oversight with age-appropriate privacy, using transparent monitoring approaches rather than hidden surveillance that erodes trust.
Regular Security Audits and Device Reviews
Families should conduct quarterly security audits that review which devices have access to which accounts, identify forgotten or obsolete device connections, and ensure that former household members no longer possess valid credentials. These audits should specifically examine email synchronization settings to identify devices that continue receiving email updates despite being disconnected.
Education and Awareness Training
All family members should receive basic training on email security, including understanding phishing attacks, recognizing suspicious communications, and following logout protocols. This education should be age-appropriate and reinforced regularly, particularly as children gain increasing independence with digital devices.
Conclusion: Protecting Family Privacy in the Digital Age
Email applications on shared family devices create multifaceted privacy vulnerabilities that extend far beyond simple password sharing concerns. The technical architecture of modern email systems, with distributed synchronization across multiple devices and persistent data storage, means that privacy erosion occurs largely invisibly to users who believe they are following reasonable security practices.
The risks are real and consequential: weak passwords chosen for memorability, cached credentials that remain accessible long after family members believe they have logged out, and automatic synchronization that continues despite explicit disable settings create an environment where unauthorized access persists silently in the background. The legal framework surrounding email access provides strong criminal and civil protections against unauthorized access, creating potential liability for family members who attempt to access each other's accounts even on shared devices.
Practical solutions exist for protecting family email privacy while maintaining necessary household communication channels. Dedicated shared mailbox systems designed specifically for group access provide better security than shared personal accounts. Strict email segmentation—maintaining separate accounts for personal, financial, work, and household purposes—ensures that compromise of one account type doesn't cascade across the family's entire digital ecosystem.
Privacy-focused email solutions like Mailbird offer architectural protection through local storage that prevents both device-level compromise and provider-level breaches from exposing communications. By downloading emails to your local device rather than maintaining them in perpetually synchronized cloud servers, Mailbird eliminates many of the persistent access vulnerabilities that plague cloud-based email services.
Ultimately, family email privacy depends on both technical controls and behavioral discipline. Technology can create protective barriers—two-factor authentication, local storage, encryption, automatic logout timers—but these protections fail if family members don't actively maintain them. Developing household norms around email logout discipline, maintaining separate devices for sensitive communications, and establishing clear boundaries regarding which email accounts appear on which devices represents the human component of effective privacy protection.
As digital communications become increasingly central to family life, establishing and maintaining these privacy boundaries becomes increasingly critical to protecting not just individual privacy but family relationships themselves. The convenience of shared device email access simply isn't worth the privacy risks, legal liability, and potential for identity theft that comes with it. By implementing the strategies outlined in this guide, families can maintain the communication efficiency they need while protecting the privacy and security they deserve.
Frequently Asked Questions
Is it illegal for a parent to access their child's email on a shared family device?
The legal answer depends on the child's age and jurisdiction, but it's more restrictive than most parents realize. Courts have established that having access to a shared device does not automatically grant legal authority to access another person's email account—even for parents accessing their children's accounts. A California court specifically ruled that parental possession of device passwords does not establish "apparent authority" to read email accounts. For adult children, accessing their email without explicit permission violates federal law under the Electronic Communications Privacy Act (ECPA) and Computer Fraud and Abuse Act (CFAA), potentially exposing parents to criminal prosecution and civil liability. For minor children, while some jurisdictions permit parental monitoring without consent (children under 16 in the EU, under 13 in the UK under GDPR), the monitoring should be transparent rather than hidden. If you need to monitor your child's communications for safety reasons, use legitimate, transparent parental control solutions rather than secretly accessing their email accounts.
How can I tell if someone else has been accessing my email on our shared family device?
Several indicators can reveal unauthorized email access on shared devices. Check your email account's "recent activity" or "security" settings, which typically show login times, locations, and devices used to access your account. Look for login times when you weren't using the device, or access from unexpected locations. Review your "sent" folder for messages you didn't send—attackers often use compromised accounts to send spam or phishing emails. Examine your email forwarding rules and filters; unauthorized users frequently create forwarding rules to silently receive copies of your emails. Check for changes to your recovery email address or phone number, as these modifications indicate someone is positioning themselves to take over your account. Review deleted messages in your trash folder—if emails you never saw appear there, someone may be reading and deleting your messages. Finally, if you notice unexplained password reset emails for other accounts (banking, social media, etc.), it suggests someone with access to your email is attempting to compromise your other accounts using password recovery links.
What's the safest way for families to share household-related emails without compromising individual privacy?
The safest approach involves using dedicated shared mailbox systems rather than sharing personal email accounts. Microsoft Office 365 shared mailboxes provide the ideal solution—they allow multiple family members to access a unified inbox for household communications without anyone sharing personal credentials. Shared mailboxes support role-based access control, meaning you can grant different family members appropriate permission levels (some with full access, others with read-only access), and they maintain audit logs showing which user performed which action, providing accountability. For families not using Office 365, create a separate email address specifically for household matters (family scheduling, school communications, household service providers) that's distinct from anyone's personal email. Use a strong, unique password for this household account and enable two-factor authentication. Establish clear family protocols that this household email should only be accessed for legitimate family business, never for reading other family members' personal communications. Most importantly, never access this shared household email from the same email client or browser session where you access personal accounts—keep them completely separate to prevent credential mixing and unauthorized access.
Should I use a desktop email client like Mailbird instead of webmail for better privacy on shared devices?
Yes, desktop email clients like Mailbird offer significant privacy advantages over webmail when managing email on devices that might be shared or accessed by multiple family members. Mailbird's local storage architecture downloads your emails to your computer rather than keeping them exclusively in cloud servers, which means your email data remains under your direct control on your personal device. This eliminates the synchronization vulnerabilities where emails continue appearing on forgotten devices long after you think you've disconnected them. When you close Mailbird, your emails aren't accessible through web browsers or automatically synchronized to other devices without your explicit configuration. Mailbird's unified inbox lets you manage multiple email accounts—personal, work, financial, and family—from a single interface while maintaining complete separation between accounts, making it easier to implement the recommended email segmentation strategy. Additionally, desktop clients like Mailbird don't leave persistent browser cookies or cached credentials that could provide access to anyone else using the same web browser. For families serious about email privacy, combining a desktop client with proper logout discipline and two-factor authentication provides substantially better protection than relying solely on webmail accessed through shared browsers.
What should I do immediately if I discover someone has been accessing my email without permission?
Take immediate action within the first hour of discovering unauthorized access. First, change your email password immediately from a device you know is secure—not the shared device where the compromise occurred. Use a strong, unique password you've never used before. Next, enable two-factor authentication on your email account if it isn't already active, preferably using an authenticator app rather than SMS. Review your account security settings thoroughly, looking for unauthorized changes to recovery phone numbers, recovery email addresses, security questions, or email forwarding rules—attackers frequently modify these to maintain access even after password changes. Log out all connected devices from your account settings to terminate any active sessions the unauthorized user might have. Change passwords for all other accounts where you used the same or similar passwords, particularly banking, financial services, and any accounts where password reset emails would arrive at the compromised email address. Scan the shared device for malware using updated antivirus software, as unauthorized access sometimes involves installed spyware. Review your sent folder and trash for messages you didn't send or delete—this reveals what the unauthorized user did with your account. Consider whether the unauthorized access rises to the level requiring law enforcement notification, particularly if financial accounts were compromised or if the access involved identity theft. Finally, monitor your financial accounts and credit reports closely for the next several months, as the typical detection lag for account takeover extends nearly 300 days.