Cryptocurrency Loss Recovery Demand Letter
DEMAND FOR RECOVERY OF DIGITAL ASSETS
[YOUR LAW FIRM NAME]
[Firm Address]
[City, State ZIP Code]
[Phone Number]
[Email Address]
[Current Date]
VIA CERTIFIED MAIL AND EMAIL
[Return Receipt Requested]
[Exchange/Custodian/Platform Legal Department Name]
[Exchange/Custodian Street Address]
[City, State ZIP Code]
CC:
- Compliance Officer, [Exchange Name]
- Financial Crimes Enforcement Network (FinCEN), U.S. Department of Treasury
- Federal Bureau of Investigation (FBI) Cyber Division
- U.S. Securities and Exchange Commission (SEC)
- U.S. Commodity Futures Trading Commission (CFTC)
- New York Department of Financial Services (NYDFS) [if applicable]
- [State] Attorney General Consumer Protection Division
RE: DEMAND FOR RECOVERY OF DIGITAL ASSETS—UNAUTHORIZED TRANSFER
Account Number: [________________________]
Claimant Name: [________________________________]
I. CLAIMANT IDENTIFICATION AND ACCOUNT DETAILS
The claimant, [________________________________], is a consumer who established and maintained a digital asset account with [Exchange Name] ("Platform") on or about [MM/DD/YYYY]. At the time of account creation, Claimant completed Platform's Know-Your-Customer (KYC) verification procedures, including:
- ☐ Government-issued photo identification
- ☐ Proof of residential address
- ☐ Beneficial ownership verification
- ☐ Source of funds documentation
- ☐ [Other relevant documentation: ________________________]
Account Registration: [________________________________]
Email Address on File: [________________________________]
Phone Number on File: [________________________]
KYC Status: Verified ☐ / Enhanced Verification ☐ / [Other: ________________________]
II. ACCOUNT HOLDINGS AND TRANSACTION HISTORY
At the time of the unauthorized transfer(s), Claimant's account contained the following digital assets:
| Digital Asset | Quantity | Wallet Address | Fair Market Value (Date) | Notes |
|---|---|---|---|---|
| [Bitcoin/ETH/Other] | [________] | [________________] | $[________] ([MM/DD/YYYY]) | [________________] |
| [Bitcoin/ETH/Other] | [________] | [________________] | $[________] ([MM/DD/YYYY]) | [________________] |
Total Account Value at Time of Loss: $[________] (as of [MM/DD/YYYY])
Primary Funding History: [Describe how funds were deposited, including dates and amounts]
III. INCIDENT NARRATIVE
A. Discovery of Unauthorized Access and Loss
On [MM/DD/YYYY], Claimant discovered that unauthorized third parties had accessed [his/her] digital asset account and executed unauthorized transfers totaling [describe quantity] of [asset type] (approximate value: $[________] USD).
Date Loss Discovered: [MM/DD/YYYY]
Date Claimant Notified Platform: [MM/DD/YYYY] [via: ________________________]
B. Nature of Compromise
Claimant's account was compromised through one or more of the following vectors:
- ☐ Unauthorized login using stolen credentials (phishing, credential reuse, database breach)
- ☐ SIM swap attack (mobile number ported to attacker's device, bypassing SMS 2FA)
- ☐ Malware infection on Claimant's device (keylogger, info-stealer, clipboard hijacker)
- ☐ Compromised two-factor authentication (TOTP seed exposed, authenticator app compromised)
- ☐ Social engineering of Platform support staff
- ☐ Platform insider compromise (employee misconduct or negligence)
- ☐ Smart contract exploit or protocol vulnerability (if applicable)
- ☐ Withdrawal address whitelist bypass or modification
- ☐ Account recovery procedure exploitation
- ☐ Other: [________________________________]
Detailed Narrative:
[Describe the specific circumstances of the breach. Include timeline of events, steps Claimant took to protect account, when security controls failed, and what Claimant did upon discovering the compromise.]
C. Unauthorized Transactions
Transaction 1:
| Field | Detail |
|---|---|
| Date/Time of Transfer | [MM/DD/YYYY HH:MM UTC] |
| Asset Transferred | [Bitcoin/ETH/Stablecoin/Token] |
| Quantity | [________] |
| Source Wallet (Within Platform) | [________________________] |
| Destination Wallet Address | [0x_____...] |
| Transaction Hash | [0x_____...] |
| Fair Market Value at Time of Transfer | $[________] USD |
| Current Fair Market Value | $[________] USD ([MM/DD/YYYY]) |
Transaction 2: [Repeat as needed]
D. Off-Chain Movement and Recovery Intelligence
Following the unauthorized withdrawal(s) from Platform, the stolen digital assets were transferred to the following addresses:
| Withdrawal Address | Date | Asset | Quantity | Status | Notes |
|---|---|---|---|---|---|
| [0x_____] | [Date] | [Asset] | [Qty] | Still Held / Partially Moved / Fully Liquidated | [Source exchange / mixer / LP] |
Chain Analytics Findings:
Claimant has retained [Chainalysis / TRM Labs / Elliptic / other service] to trace the stolen assets. The attached chain analytics report (see Attachments) identifies:
- Destination exchange(s) where assets were deposited for liquidation
- Wallet clusters indicating likely attacker infrastructure
- Mixing/tumbling service participation (if applicable)
- Fiat off-ramp activity and timing
- [Other relevant tracing information]
IV. PLATFORM'S CONTRACTUAL DUTIES TO CLAIMANT
By accepting Claimant's account registration and deposits, Platform undertook the following contractual obligations under its Terms of Service, Privacy Policy, and Security Policies:
A. Duty of Care in Asset Custody
Platform represents on its website that it:
- Maintains [cold storage / multi-signature wallets / other security measures] to safeguard customer digital assets
- Employs [industry-standard encryption / zero-knowledge proofs / other security technology]
- Implements [X-day security review cycles / continuous monitoring / threat detection]
- Maintains cyber liability insurance coverage of $[________] [if disclosed]
B. Authentication and Access Control Policies
Platform's stated security policies require:
- Multi-factor authentication (MFA) for all high-value account activities
- Email confirmation for new withdrawal addresses or whitelist modifications
- Rate limiting on failed login attempts
- Anomalous activity detection and account lockdown procedures
- [Other relevant policies: ________________________]
C. Withdrawal Authorization and Whitelist Management
Platform's Terms of Service provide that:
- All withdrawals must be to verified, whitelisted wallet addresses
- New whitelist entries require [X-day cooling off period / email re-confirmation / other control]
- High-value or rapid-succession withdrawals trigger additional verification
- Customers can enable withdrawal restrictions or [other limiting feature]
D. Account Recovery and Dispute Resolution
Platform contractually commits to:
- Investigating unauthorized transaction reports within [X business days]
- Freezing accounts and transactions pending investigation
- Providing transaction logs and IP access information upon request
- Considering restoration of stolen assets or customer restitution
V. PLATFORM'S STATUTORY DUTIES TO CLAIMANT
A. Bank Secrecy Act and AML/KYC Obligations (31 U.S.C. § 5318)
As a licensed money transmitter or virtual asset service provider, Platform is required by federal law to:
-
Know-Your-Customer (KYC): Conduct thorough identity verification of all customers and beneficial owners before opening accounts or executing transactions.
-
Suspicious Activity Reporting (SAR): File a Suspicious Activity Report with FinCEN within 30 days of detecting a transaction reasonably suspected to involve money laundering, theft, or other illegal activity—and without tipping off the suspect.
-
OFAC Sanctions Screening: Screen all customers and transactions against Office of Foreign Assets Control (OFAC) and other sanctions lists.
-
Customer Due Diligence (CDD): Understand the nature and purpose of customer relationships and the source of funds.
-
Beneficial Ownership Verification: For certain high-risk customers or transactions, identify and verify beneficial owners.
When Claimant reported the unauthorized transfer(s), Platform should have immediately:
- Initiated investigation and preservation of evidence
- Filed a SAR identifying the theft and providing transaction details
- Notified law enforcement (FBI, Secret Service)
- Attempted to identify the destination exchange and coordinate asset freeze
Has Platform provided proof of SAR filing? [YES / NO] If no, demand production of SAR or explanation of why SAR obligations were not triggered.
B. EFTA (Electronic Fund Transfer Act) & Regulation E—Limited Application (Contested)
While the applicability of the Electronic Fund Transfer Act (15 U.S.C. § 1693) to cryptocurrency remains unsettled and varies by court and jurisdiction, recent developments suggest broader application in appropriate circumstances:
- Rider v. Uphold HQ Inc., 2023 WL 2018207 (S.D.N.Y. Feb. 22, 2023): Court held that cryptocurrency constitutes "funds" under EFTA.
- CFPB Proposed Interpretive Rule (January 2025): The Consumer Financial Protection Bureau has proposed an interpretive rule extending EFTA protections to digital asset transfers through consumer accounts.
If Claimant's account qualifies as an account "established primarily for personal, family, or household purposes" and the unauthorized transfer qualifies as an "electronic fund transfer," Claimant may have rights under Regulation E, including:
- Right to report errors (including unauthorized transfers) within [60 days]
- Platform's duty to investigate within [10 business days]
- Provisional credit while investigation is pending
- Liability limitations (consumer liability capped)
- Right to damages and attorney fees upon violation
Claimant hereby asserts EFTA/Regulation E rights as an alternative basis for recovery, while acknowledging the unsettled nature of crypto-EFTA applicability.
C. State Money Transmitter Laws and Consumer Protection
Depending on the state(s) where Platform is licensed or operates:
- Licensing Requirements: Many states require money transmitter or virtual asset service provider licenses.
- Customer Protection Standards: Licensees must maintain prescribed cybersecurity standards, financial reserves, and customer segregation.
- Consumer Dispute Resolution: Some states mandate specific timelines for investigating customer loss complaints.
- Restitution and Remedies: Violations may expose Platform to regulatory action, penalties, and customer restitution.
Platform is licensed or operating in the following state(s): [________________________]
Applicable state money transmitter and consumer protection statutes: [________________]
VI. LEGAL THEORIES OF LIABILITY
A. Breach of Contract
Platform breached its contractual obligations by:
-
Failure to maintain promised security measures: Despite representing that it maintains [cold storage / multi-sig / etc.], Platform failed to prevent unauthorized access.
-
Breach of confidentiality: Platform failed to keep Claimant's authentication credentials, security keys, or account information confidential.
-
Failure to enforce withdrawal controls: Platform did not enforce stated whitelist procedures, cooldown periods, or MFA requirements for the unauthorized withdrawal(s).
-
Failure to provide timely notice and investigation: Platform failed to respond to Claimant's loss report within contractually promised timeframes or to conduct promised investigation.
Applicable Provisions:
- Terms of Service, Section(s): [________________________]
- Security Policy: [Link or reference]
- Privacy Policy, Section(s): [________________________]
B. Negligence and Gross Negligence
Platform breached its duty of ordinary care by:
-
Inadequate cybersecurity: Platform's security measures fell below industry standards for digital asset custodians. Industry best practices include [cold storage, multi-sig, continuous threat monitoring, etc.], which Platform failed to implement or maintain.
-
Negligent oversight of access controls: Platform's [authentication system / alert system / API management] was negligently configured or monitored, allowing unauthorized account access.
-
Negligent response to breach: Upon learning of the loss, Platform negligently failed to freeze the account, coordinate with destination exchanges, or preserve evidence for law enforcement.
-
Negligent hiring/training of employees: Platform failed to vet employees with access to security infrastructure or to provide adequate training in cybersecurity protocols, resulting in insider compromise [if applicable].
Gross Negligence: The facts support gross negligence (reckless disregard for security) because:
- [Describe any particularly egregious security gaps or failures]
C. Conversion Under Common Law and UCC
Conversion is the wrongful exercise of dominion over another's property. Platform either:
- Directly converted the assets by failing to prevent the theft when it owed a duty to do so, or
- Is liable for conversion as a custodian that failed to safeguard entrusted property.
UCC Article 12 (If Adopted in Relevant State):
Many states have adopted UCC Article 12 (2022 Amendments), which governs "controllable electronic records" including cryptocurrency. Under Article 12:
- Digital assets are recognized as a distinct category of personal property.
- A party with "control" (exclusive power to benefit from and transfer the asset) has superior rights.
- Conversion and secured creditor claims operate with reference to control and priority rules.
Where Platform failed to maintain Claimant's exclusive control over the digital assets and allowed a third party to gain control and transfer them, Platform may be liable for conversion of those controllable electronic records.
D. Bailment and Fiduciary Duties
When Claimant deposited digital assets into Platform's custody, a bailment relationship was created. Platform, as bailee, owed Claimant:
- Duty to safeguard the assets using reasonable care
- Duty to return the assets upon request or in the condition received
- Duty to not use or disclose the assets
- Duty to investigate and respond to claims of loss
Platform breached these duties by [describe specific breaches].
Enhanced Fiduciary Duty: Some jurisdictions recognize that custodians of high-value digital assets owe heightened, quasi-fiduciary duties to prevent loss through theft or negligence.
E. Violations of State Consumer Protection and Unfair Practices Acts
Most states have enacted "Unfair and Deceptive Acts or Practices" (UDAP) or "Consumer Protection Act" statutes that prohibit:
- Misrepresentations about the safety or security of consumer funds
- Unfair methods, acts, or practices in commerce
- Inadequate or deceptive disclosures
- Failure to honor contractual promises
Platform's misrepresentations include:
- [Specific claims about security made in marketing materials, website, or Terms of Service that were not fulfilled]
Applicable Statutes:
- [State name] Consumer Protection Act, § [________]
- Unfair or Deceptive Acts or Practices (UDAP): § [________]
Violations of these statutes may entitle Claimant to treble damages, civil penalties, and attorney fees.
F. RICO (Racketeering Influenced and Corrupt Organizations Act) (if applicable)
If Platform's negligent security practices were part of a pattern of enabling thefts (i.e., if Platform had notice of similar security breaches and failed to remediate), a RICO claim may be viable under 18 U.S.C. § 1962(c):
- Predicate Acts: Wire fraud (enabling thefts), money laundering
- Enterprise: Platform's operations
- Pattern of Racketeering Activity: Multiple similar thefts enabled by Platform's negligence
Note: RICO claims against custodians are fact-intensive and require evidence of a pattern; consult with counsel before asserting.
G. Breach of Implied Covenant of Good Faith and Fair Dealing
Every contract includes an implied covenant that neither party will do anything to deprive the other of the benefits of the agreement. Platform breached this covenant by:
- Failing to act in good faith to prevent loss of Claimant's digital assets
- Delaying investigation or refusing to cooperate with law enforcement
- Refusing to provide transaction logs or account information
- Dismissing loss claims without adequate review
VII. DAMAGES
Claimant demands full recovery of the stolen digital assets or their equivalent value in USD, calculated as follows:
A. Primary Damages: Restoration of Digital Assets
Amount Demanded: [________] of [Bitcoin/ETH/Stablecoin] (or equivalent current value: $[________] as of [MM/DD/YYYY])
Calculation:
- Quantity stolen: [________]
- Fair market value per unit on date of loss ([MM/DD/YYYY]): $[________]
- Total loss on date of discovery: $[________]
- Fair market value per unit as of demand date ([MM/DD/YYYY]): $[________]
- Total loss as of demand date: $[________]
Greater of: Loss value on date of theft or date of demand (whichever is higher)
Claimant demands restoration in kind (direct return of [________] units of the original digital asset). Alternatively, if in-kind restoration is impossible, Claimant demands full monetary value at the greater of the above valuations.
B. Lost Opportunity and Time-Value Damages
Claimant would have retained and benefited from the stolen digital assets. Claimant therefore demands recovery of:
- Foregone appreciation (if relevant): [Describe if Claimant had specific reason to believe assets would appreciate]
- Foregone staking rewards or other yield-generating opportunities: $[________]
- Cost of alternative investments made to replace lost portfolio: $[________]
Total Opportunity Damages: $[________]
C. Costs of Investigation and Mitigation
Claimant incurred reasonable costs to investigate the theft and mitigate further losses, including:
- Chain analytics service (Chainalysis / TRM / Elliptic): $[________]
- Credit monitoring and identity theft protection: $[________]
- Loss of time investigating and coordinating response: [hours] × $[hourly rate] = $[________]
- Law enforcement victim assistance and FBI reporting: $[________]
Total Mitigation Costs: $[________]
D. Attorney Fees and Costs
Under [state UDAP statute / EFTA Regulation E / other applicable law], prevailing consumers are entitled to recover reasonable attorney fees and litigation costs.
Claimant reserves the right to claim attorney fees upon filing suit or at the conclusion of negotiations, estimated at $[________] (based on complexity and counsel's hourly rate of $[________]).
E. Exemplary or Punitive Damages
If Platform's conduct constitutes gross negligence, recklessness, or intentional misconduct (e.g., insider theft, systematic failure to maintain security despite known vulnerabilities), Claimant demands punitive damages to deter similar future conduct.
Total Damages Demanded: $[________]
VIII. IMMEDIATE PRESERVATION AND RELIEF REQUESTED
Claimant requests that Platform immediately take the following actions:
A. Account Preservation and Freeze
- Freeze the compromised account and all associated accounts to prevent further unauthorized activity.
-
Preserve all account records, including:
- Complete login history (IP addresses, timestamps, devices, locations)
- 2FA logs (SMS delivery records, TOTP failure logs, backup code usage)
- Withdrawal address whitelist history with dates of addition/modification
- API key creation and revocation logs
- Email change history and password reset logs
- All alert and notification logs
- Customer service notes and correspondence -
Preserve metadata for at least [2 years], including database backups, server logs, and firewall records.
B. Regulatory Coordination and Notification
- Confirm filing of Suspicious Activity Report (SAR) with FinCEN within 30 days of loss discovery (as required by 31 U.S.C. § 5318).
- Provide copy of SAR to Claimant's counsel (or statement explaining why SAR was not filed).
- Notify law enforcement of the theft in writing and provide case reference numbers to Claimant.
- Coordinate with destination exchange(s) identified in chain analytics report to:
- Freeze or recoverable assets at the destination
- Provide KYC information on the wallet owner/recipient
- Conduct joint investigation
- Facilitate asset recovery if possible
C. Chain Analytics and Tracing Cooperation
-
Provide Platform's internal investigation findings related to the theft, including:
- Security incident timeline
- Root cause analysis of the compromise
- Identification of any security gaps or negligent practices
- Any third-party security assessments or penetration test results -
Cooperate fully with Claimant's retained chain analytics firm (Chainalysis / TRM Labs / Elliptic), providing:
- Exact withdrawal wallet address and timestamp
- Complete transaction hash and blockchain confirmation details
- Any internal records of destination exchange deposits or wallets
- [Any other relevant technical data] -
Provide Platform's own chain analytics, if conducted, identifying current location and status of stolen assets.
D. Exchange Coordination and Asset Freeze
- Identify the destination exchange(s) where stolen assets were deposited for conversion.
- Submit freeze request to destination exchange(s) in Claimant's name, with documentation of the theft.
- Request destination exchange provide:
- KYC information on the account owner who received the assets
- Account status (if frozen or under investigation)
- Withdrawal history after the deposit
- Any identification or IP information linking the recipient to known criminal activity
E. Incident Investigation Report
Platform shall provide a comprehensive written investigation report within 30 days, including:
- Executive Summary: Nature and extent of the breach
- Timeline: Exact dates and times of all suspicious activities
- Root Cause Analysis: How the account was compromised (technical analysis of the security failure)
- Security Control Failures: Which stated security measures failed and why
- Comparison to Industry Standards: How Platform's security fell short of industry best practices
- Corrective Actions: Specific measures Platform has implemented to prevent recurrence
- Recommendations: Steps Claimant should take to protect remaining assets and prevent identity theft
F. Account Access and Information Disclosure
Claimant requests that Platform provide, within [10 business days]:
- Complete account statements from account creation through present
- Transaction history with full details (wallet addresses, transaction hashes, timestamps)
- All customer service communications related to this account
- All communications from Claimant, including loss reports, dispute claims, and follow-up correspondence
- IP address logs for [X months] showing all access to the account
- Device fingerprints or device IDs used to access the account
- Mobile number and phone carrier information on file (to assess SIM swap risk)
- Email forwarding rules or aliases added to the account
IX. RESPONSE DEADLINE AND TOLLING AGREEMENT
A. Deadline for Response
Platform shall respond to this demand letter in writing within [30 days] of receipt. Platform's response shall include:
- Whether Platform accepts liability in whole or in part
- An offer of settlement or restitution (if any)
- Production of the requested preservation and investigation materials
- Explanation of any refusals to comply with requests above
Failure to respond by this deadline will result in Claimant immediately pursuing all available legal remedies, including:
- Filing a civil lawsuit in [proposed venue/jurisdiction]
- Demand for treble damages under applicable consumer protection statutes
- Request for emergency asset freezes and injunctive relief
- Referral to appropriate state and federal regulators
- Public disclosure of Platform's security failures
B. Tolling Agreement Proposal
Claimant proposes a tolling agreement whereby:
- The statute of limitations on all claims against Platform is tolled (suspended) during good-faith settlement negotiations
- Negotiations shall proceed for a period of [60–90 days] from the date of Platform's response
- Either party may terminate tolling with [10 days] written notice if negotiations stall
- Upon termination, all claims are preserved and fully available
Claimant will sign a mutual tolling agreement prepared by Platform's counsel, provided it complies with the terms above.
X. PRESERVATION NOTICE AND LITIGATION HOLD
This letter constitutes formal notice to Platform of Claimant's intent to pursue litigation regarding this matter. Platform has a duty to preserve all evidence and must:
- Implement litigation hold on all documents, electronically stored information (ESI), and communications relating to this account and the theft
- Cease any routine deletion or data destruction of logs, backups, or metadata
- Notify all relevant departments (Security, Compliance, IT, Legal, Management) of this hold
- Conduct reasonable search for responsive materials
- Retain third parties (data centers, cloud providers, security consultants) and instruct them to preserve data
Failure to preserve evidence may result in sanctions, spoliation inferences (unfavorable assumptions about destroyed evidence), or enhanced damages.
XI. RESERVATION OF RIGHTS AND REGULATORY REFERRAL
Claimant expressly reserves all rights and remedies available under law, including but not limited to:
- ☐ Claims under the Electronic Fund Transfer Act (EFTA) and Regulation E
- ☐ Claims under UCC Article 12 (if adopted in relevant state)
- ☐ Breach of contract claims
- ☐ Negligence and gross negligence claims
- ☐ Conversion claims
- ☐ Bailment and fiduciary duty claims
- ☐ State consumer protection and UDAP claims
- ☐ RICO claims (if pattern of negligence is established)
- ☐ Restitution under state criminal statutes (if criminal prosecution occurs)
- ☐ Regulatory remedies (cease-and-desist orders, license revocation, fines)
- ☐ Contribution and indemnification claims against third parties
Claimant intends to refer this matter to relevant regulators for investigation and enforcement action, including:
- FinCEN (Financial Crimes Enforcement Network): For potential BSA/AML/KYC violations and SAR non-filing
- FBI Cyber Division and Secret Service: For investigation of the underlying theft
- State Attorney General (Consumer Protection Division): For violations of state consumer protection and money transmitter laws
- State Financial Services Regulator (e.g., NYDFS, DFPI): For licensing and security violations
- SEC and CFTC: If Platform is operating as unregistered securities or derivatives platform
Claimant will simultaneously file a complaint with the Consumer Financial Protection Bureau (CFPB) to create an official record and trigger regulatory monitoring.
XII. PRIVILEGED COMMUNICATIONS
This letter is sent in settlement negotiations and is protected by settlement privilege and work-product doctrine. Statements, offers, and admissions contained herein shall not be admissible in evidence, discoverable, or used against Claimant in any litigation, except as otherwise provided by law. By responding to this letter, Platform is not waiving any privilege or admitting any fact.
CONCLUSION
Claimant has suffered a quantifiable loss as a direct result of Platform's breach of contractual and statutory duties. Prompt resolution of this claim will benefit both parties and avoid costly litigation.
Claimant expects a substantive response within the timeline above and is prepared to discuss resolution. However, if Platform denies liability or fails to engage, Claimant will pursue all available remedies without further notice.
Respectfully submitted,
[Your Signature]
[Your Typed Name]
[Your Title]
[Your Law Firm Name]
[Law Firm Address]
[City, State ZIP]
[Phone]
[Email]
ATTACHMENTS
- ☐ Copy of account opening agreement and Terms of Service
- ☐ Screenshot of account details and KYC verification confirmation
- ☐ Account statements showing deposit history and balance at time of loss
- ☐ Email correspondence with Platform regarding account and loss report
- ☐ Chain analytics report from [Chainalysis / TRM Labs / Elliptic] tracing stolen assets
- ☐ Screenshots of the unauthorized withdrawal transaction(s) and blockchain confirmation
- ☐ Wallet address and transaction hash documentation
- ☐ FBI IC3 (Internet Crime Complaint Center) report number and filing confirmation
- ☐ State police or local law enforcement report (if filed)
- ☐ Screenshots of Platform's security policy and representations regarding custody and safety
- ☐ Mobile carrier documentation (if SIM swap involved)
- ☐ Email forwarding rule logs (if email compromise occurred)
- ☐ 2FA configuration and authentication attempt logs (if available from device)
- ☐ Copies of any communications with other custodians or exchanges regarding the theft
- ☐ Valuation evidence (CoinGecko / CoinMarketCap / other source) for lost assets at multiple dates
SOURCES AND REFERENCES
Federal Statutes & Regulations:
- Electronic Fund Transfer Act (EFTA), 15 U.S.C. § 1693 et seq.
- Regulation E (12 CFR § 1005): CFPB implementing regulations for EFTA
- Bank Secrecy Act (BSA), 31 U.S.C. § 5311 et seq.
- 31 U.S.C. § 5318: Customer Identification Program (CIP) and Know-Your-Customer (KYC) requirements
- 18 U.S.C. § 1962: RICO (Racketeering Influenced and Corrupt Organizations Act)
- Uniform Commercial Code (UCC) Article 12: Controllable Electronic Records (2022 Amendments)
Key Case Law:
- Rider v. Uphold HQ Inc., 2023 WL 2018207 (S.D.N.Y. Feb. 22, 2023): EFTA applies to cryptocurrency transfers.
- Yuille v. Uphold HQ Inc., 2023 WL 5356865 (S.D.N.Y. Aug. 11, 2023): EFTA does not apply to accounts established for investment purposes.
- McDonald v. Navy Federal Financial Group LLC, 2023 WL 8084850 (D. Nev. Nov. 21, 2023): EFTA provides private right of action for unauthorized transfers.
Regulatory Guidance:
- CFPB Proposed Interpretive Rule on Electronic Fund Transfers, 90 Fed. Reg. 3723 (Jan. 15, 2025): CFPB proposes to expand EFTA coverage to digital asset transfers.
- FinCEN Guidance on Virtual Asset Service Providers (VASP), 31 CFR § 1010.100(c): Definition and AML/KYC requirements for digital asset exchanges.
- National Money Laundering Risk Assessment (2022): Identifies cryptocurrency theft as a significant financial crime risk vector.
State Law References (Varies by Jurisdiction):
- Money Transmission Laws: Most states require licensing and maintain consumer protection standards. See [State] Money Transmitter Act, § [________].
- Unfair and Deceptive Acts or Practices (UDAP): Most states prohibit deceptive security representations. See [State] Consumer Protection Act, § [________].
- State-Adopted UCC Article 12: [34+ states] have adopted or are considering the 2022 UCC Amendments. See [State] UCC § [________].
Industry Standards & Best Practices:
- NIST Cybersecurity Framework (SP 800-53): Industry standard for digital asset custodian security controls.
- ISO 27001: International standard for information security management systems.
- Custody Standards for Institutional Digital Assets: Recommendations by major audit firms and institutional custodians (Fidelity, Coinbase, Kraken, etc.).
About This Template
Financial and banking documents govern loans, security interests, account agreements, and commercial transactions between lenders, borrowers, and financial institutions. Promissory notes, guaranties, security agreements, and UCC filings have precise legal requirements, and mistakes can leave a lender unsecured or a borrower on the hook for more than they agreed to. Well-drafted finance paperwork protects both sides and keeps the deal enforceable if something goes wrong later.
Important Notice
This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.
Last updated: May 2026