Recovering from Identity Theft
Is someone using your personal information to open accounts, file taxes, or make purchases? Visit IdentityTheft.gov, the federal government’s one-stop resource to help you report and recover from identity theft.
Is someone using your personal information to open accounts, file taxes, or make purchases? Visit IdentityTheft.gov, the federal government’s one-stop resource to help you report and recover from identity theft.
Did you get a notice that says a company lost your personal information in a data breach? Did you lose your wallet? Or learn that an online account was hacked? Here are steps you can take to help protect yourself from identity theft.
What can you do to keep your personal info secure? Are identity protection services worth the cost? What about credit freezes? Check out the FTC’s identity theft articles to find out.
You can help people learn about identity theft — whether you’re chatting with friends and family, sharing info on a social networking site, or taking resources to a religious group or PTA meeting. It’s easy to use and share these free resources from the FTC.
5 Ways to Help Protect Your Identity
Share this video using the links in the player above or use the YouTube version.
IdentityTheft.gov Helps You Report and Recover from Identity Theft
Share this video using the links in the player above or use the YouTube version.
Local police can help identity theft victims by:
The FTC’s IdentityTheft.gov can assist attorneys who counsel identity theft victims. The site provides victims with a personal recovery plan, walking through each step to take. It also provides pre-filed letters and forms to send to credit bureaus, businesses, and debt collectors.
Many companies keep sensitive information about customers or employees in their files or on their network. The FTC has free data security resources to help businesses of any size protect their customers and meet their legal obligations, and free resources especially designed to help small businesses protect against cyber attacks.