How To Report

As of July 1, 2013 Indiana Code has been amended. IC 32-34-1-26-(h) requires ALL reports to be submitted electronically via the IndianaUnclaimed upload.



Holders are required to report unclaimed property annually by November 1st. The reporting deadline for life insurance companies is May 1st.


Report property electronically in five easy steps:

  1. Download the User Guide for Indiana Unclaimed Reporting Software
  2. Register to access reporting software
  3. Create your NAUPA formatted report
  4. Submit your report via the website
  5. Print remittance detail sheet, attach to physical check, send to:
Office of the Indiana Attorney General 
Unclaimed Property Division
35 South Park Blvd
Greenwood, IN 46143

Due diligence prior to remittance is mandatory.

Negative (zero) reports are expected for those with nothing to report. Click here to submit a zero report

Dissolved companies do not need to report. Please file proper Articles of Dissolution paperwork with the Indiana Secretary of State and provide/forward a copy of the same to our office via first class mail.

Tangible property held in a safe deposit box or other safekeeping depository shall be delivered to the attorney general not later than thirty (30) days after the date the report describing the property is filed. Click Here.

Extensions may be considered but must be requested in writing no later than thirty (30) days prior to the reporting deadline.

Interest & Penalties will be charged for failing to file a report. A holder who intentionally fails to pay or deliver property is also subject to an additional civil penalty of 10% of the value of the property that must be paid or delivered. A holder that willfully refuses to pay after receipt of written notice commits a Class B misdemeanor. (IC 32-34-1-45)

For more information, please visit the Reporting FAQs or Reporting Resources.

Online Reporting Site Security Guarantee:  Online reporting with the State of Indiana guarantees secure access through the use of reCaptcha. All passwords are generated and encrypted using industry-standard best practices and non-reversible encryption algorithms, and managed in different tiers within the application infrastructure. No staff member or external user is able to access a user's password. All system traffic is encrypted using an industry standard 128-bit SSL.