Privacy Rights Clearinghouse
- This guide lists steps you can take to reduce your risk of identity theft. If you are already a victim of identity theft, please read our Fact Sheet 17a, "Identity Theft: What to Do if It Happens to You ".
- If your wallet or your Social Security number has been lost or stolen, be sure to place fraud alerts on your three credit reports right away. Instructions for establishing fraud alerts are provided in step one of Fact Sheet 17a .
1. The crime of identity theft
For the 15th consecutive year, identity theft has topped the Federal Trade Commission’s (FTC) national ranking of consumer complaints. Identity theft represented 13% of all complaints in 2014 according to the FTC's 2014 Consumer Sentinel Network Data Book . Identity theft has held the FTC’s No. 1 spot for 15 years.
Using a variety of methods, criminals steal Social Security numbers (SSNs), driver's licenses, credit and debit card numbers, and other pieces of individuals' identities such as date of birth. They use this information to impersonate their victims, spending as much money as they can in as short a time as possible before moving on to someone else's name and identifying information.
There are two types of identity theft:
- "Existing account fraud" or "account takeover fraud" occurs when a thief acquires your credit or debit card information and purchases products and services using either the actual card or the account number and expiration date. Victims may not learn of account takeover until they receive their monthly account statement.
- "New account fraud" or "application fraud" occurs when a thief uses your SSN and other identifying information to open new accounts in your name. Victims are not likely to learn of application fraud for some time, because the monthly account statements are mailed to an address used by the imposter.
This guide discusses strategies for reducing the risk of both types of fraud.
Generally, victims of credit card fraud are liable for no more than the first $50 of the loss. In most cases, the victim will not be required to pay any part of the loss. But debit card users have less protection against fraud. Not only are individuals' checking accounts wiped out, debit card users could be liable for the total amount of the loss depending on how quickly they report the loss to the financial institution.
Even though victims are usually not saddled with paying their imposters' bills, they are often left with a bad credit report and must spend months and even years regaining their financial health. In the meantime, they have difficulty getting credit, obtaining loans, renting apartments, and even getting hired. Victims of identity theft find little help from the authorities as they attempt to untangle the web of deception that has allowed another person to impersonate them.
Identity thieves obtain SSNs, driver's licenses, credit card numbers and other pieces of identification through a variety of means:
- "Dumpster diving" in trash bins for unshredded credit card and loan applications and documents containing SSNs.
- Stealing wallets and purses.
- Stealing mail from unlocked mailboxes to obtain newly issued credit cards, bank and credit card statements, pre-approved credit offers, investment reports, insurance statements, benefits documents, or tax information.
- Accessing your credit report fraudulently, for example, by posing as an employer, loan officer, or landlord.
- Obtaining names and SSNs from personnel or customer files in the workplace.
- "Shoulder surfing" at ATM machines in order to capture PIN numbers.
- "Skimming" your credit or debit card information at a point of sale terminal or ATM machine.
- Finding identifying information on Internet sources, via public records sites and fee-based data broker sites.
- Sending email messages that look like they are from your bank, asking you to visit a web site that looks like the bank's in order to confirm account information. This is called "phishing."
- Hacking into unsecured and unencrypted data files of financial institutions, retailers, and credit card transaction processing companies.
- Accessing unsecured web sites that contain sensitive personal information such as Social Security numbers and financial account numbers.
You cannot prevent identity theft. But you can reduce your risk of fraud by following the tips in this guide.
1. Reduce the number of credit and debit cards you carry in your wallet. We recommend that you do not use debit cards because of the potential for losses to your checking account. Instead, carry one or two credit cards and your ATM card in your wallet. Nonetheless, debit cards are popular. If you do use them, take advantage of online access to your bank account to monitor account activity frequently. Report evidence of fraud to your financial institution immediately. Read more about the danger of debit cards at https://www.privacyrights.org/merchant-retail-payment-methods-credit-card-vs-debit-card#2 
2. When using your credit and debit cards at restaurants and stores, pay close attention to how the magnetic stripe information is swiped by the waiter or clerk. Dishonest employees have been known to use small hand-held devices called skimmers to quickly swipe the card and then later download the account number data onto a personal computer. The thief uses the account data for Internet shopping and/or the creation of counterfeit cards. Likewise, examine point of sale devices and ATM machines for tampering.
3. Do not use debit cards at all when shopping online. Use a credit card because you are better protected in case of fraud. See our online shopping guide, https://www.privacyrights.org/online-shopping-tips-e-commerce-and-you 
4. Keep a list or photocopy of all your credit cards, debit cards, bank accounts, and investments -- the account numbers, expiration dates and telephone numbers of the customer service and fraud departments -- in a secure place (not your wallet or purse) so you can quickly contact these companies in case your credit cards have been stolen or accounts are being used fraudulently.
5. Never give out your SSN, credit or debit card number or other personal information over the phone, by mail, or on the Internet unless you have a trusted business relationship with the company and you have initiated the call.
6. Always take credit card receipts with you. Never toss them in a public trash container. When shopping, put receipts in your wallet rather than in the shopping bag.
7. Never permit your credit card number to be written onto your checks. It's a violation of California law (Civil Code sec. 1725) and laws in many other states, and puts you at risk for fraud.
8. Watch the mail when you expect a new or reissued credit card to arrive. Contact the issuer if the card does not arrive.
9. Order your credit report at least once a year. Federal law gives you the right to one free credit report each year from the three credit bureaus: Equifax, Experian, and TransUnion. If you are a victim of identity theft, your credit report will contain the tell-tale signs – inquiries that were not generated by you, as well as credit accounts that you did not open. The earlier you detect fraud, the easier and quicker it will be to clean up your credit files and regain your financial health.
We recommend that you stagger your requests and obtain one report each four months. That way, you can monitor your credit reports on an ongoing basis. But if you are in the market for credit or are a victim of identity theft, order all three at one time. For more information on your free credit reports, visit the Federal Trade Commission web site at http://www.ftc.gov/bcp/edu/microsites/freereports/index.shtml  .
How to order your free annual credit report:
- By telephone: (877) 322-8228
- Online: www.annualcreditreport.com 
- By mail. Print out the order form here:
10. Residents of seven states can obtain additional free annual credit reports under state law. These states are: Colorado, Maine, Massachusetts, Maryland, New Jersey, Vermont, and Georgia (two free reports per year in Georgia). If you live in one of these states, be sure to order both your free reports under federal law as well as state law each year – enabling you to even more effectively monitor your credit files on an ongoing basis.
11. Individuals nationwide are able to "freeze" their credit reports with Equifax, Experian, and TransUnion. By freezing your credit reports, you can prevent credit issuers from accessing your credit files except when you give permission. This effectively prevents thieves from opening up new credit card and loan accounts. In most states, security freezes are available at no charge to identity theft victims and for a relatively small fee for non-victims.
- The California Department of Justice’s Privacy Enforcement and Protection Unit provides a guide on security freezes for Californians, http://www.oag.ca.gov/idtheft/facts/freeze-your-credit 
- For other states, see http://www.consumer-action.org/english/articles/freeze_your_credit_file#Topic_04 
- Brian Krebs' post How I Learned to Stop Worrying and Embrace the Security Freeze  is a primer on what you can do to avoid becoming a victim of identity theft
While a security freeze may be the best available deterrent to new account fraud, it may not be the best solution for everyone. It can be cumbersome for individuals who frequently apply for credit, are contemplating a new mortgage, or who plan to change jobs. On the other hand, a security freeze is particularly well-suited for seniors who are no longer in the market for new credit. For a more complete discussion of the pros and cons of security freezes, see www.consumersunion.org/pdf/SecurityFreeze-Consider.pdf  and http://www.consumerreports.org/cro/news/2014/02/should-you-put-a-security-freeze-on-the-credit-file/index.htm 
12. Many companies, including the three credit bureaus, offer credit monitoring services for an annual or monthly fee. They will notify you when there is any activity on your credit report, thus alerting you to possible fraud.
We do not endorse credit monitoring services because we believe that individuals should not have to pay a fee to track their credit. If you decide to subscribe, be sure to choose a service that monitors all three credit reports on an ongoing basis. You can create your own credit monitoring strategy at no cost by ordering one of your free credit reports each four months, as explained above. For more information about monitoring services, see https://www.privacyrights.org/identity-theft-monitoring-services 
13. There are many identity theft insurance products available to consumers. We do not recommend them unless they are available as a free or low-cost rider on an existing insurance policy. For more information on such insurance products, visit www.iii.org/individuals/other/insurance/identitytheft  (no endorsements implied).
14. When creating passwords and PINs (personal identification numbers), do not use the last four digits of your Social Security number, mother's mother's maiden name, your birthdate, middle name, pet's name, consecutive numbers or anything else that could easily be discovered by thieves. It's It's best to create passwords that combine upeer and lower case letters, special characters and numbers.
Here's a tip to create a password that is strong and easy to remember. Think of a favorite line of poetry, like "Mary had a little lamb." Use the first or last letters to create a password. Use numbers to make it stronger. Use both upper and lower case. For example, MhALL, or better yet MhA2L!. The longer the string, the harder it is to crack. Read our Alert on "10 Rules for Creating a Hacker-Resistant Password" at https://www.privacyrights.org/ar/alertstrongpasswords.htm 
15. Ask your financial institutions to add extra security protection to your account. Many will allow you to use an additional code or password (a number or word) when accessing your account. Do not use your mother's maiden name, SSN, or date or birth, as these are easily obtained by identity thieves. If asked to create a reminder question, do not use one that is easily answered by others.
16. Memorize all your passwords. Don't record them on anything in your wallet.
17. Shield your hand when using a bank ATM machine or reatil point of sale terminal. "Shoulder surfers" may be nearby or a pinhole video camera could be recoding your keystrokes.
18. Protect your Social Security number (SSN). Release it only when absolutely necessary (like tax forms, employment records, most banking, stock and property transactions). The SSN is the key to your credit and banking accounts and is the prime target of criminals.
If a business requests your SSN, ask if it has an alternative number that can be used instead. Speak to a manager or supervisor if your request is not honored. Ask to see the company's written policy on SSNs. If necessary, take your business elsewhere. If the SSN is requested by a government agency, look for the Privacy Act notice. This will tell you if your SSN is required, what will be done with it, and what happens if you refuse to provide it. If your state uses your SSN as your driver's license number, ask to substitute another number.
If possible, do not provide the SSN on job applications. Offer to provide it when you are interviewed or when a background check is conducted. Read PRC Fact Sheet 10  on SSNs and Fact Sheet 25  on online job seeking tips.
19. Do not have your SSN or driver's license number printed on your checks. Don't let merchants write your SSN onto your checks because of the risk of fraud.
20. Do not say your SSN out loud when you are in a public place. And do not let merchants, health care providers, or others say your SSN out loud. Whisper or write it down on a piece of paper instead. Be sure to retrieve and shred that paper.
21. Do not carry your SSN card in your wallet except for situations when it is required, the first day on the job, for example. If possible, do not carry wallet cards that display the SSN, such as insurance cards, except when needed to receive healthcare services. A California law places restrictions on the display and transmission of SSNs by companies. For more information, read the California Department of Justice’s Privacy Enforcement and Protection Unit guide on SSN "recommended practices," at http://www.oag.ca.gov/sites/all/files/pdfs/privacy/protecting_ssns.pdf? 
If you feel you must carry your health insurance or Medicare card with you at all times, try this. Photocopy the card and cut it down to wallet size. Then remove or cut out the last four digits of the SSN. Carry that with you rather than the actual card. But be sure to carry your original Medicare card with you the first time you visit your healthcare provider. They are likely to want to make a photocopy of it for their files.
22. It is a violation of federal law for state motor vehicles departments to use the Social Security number as the driver’s license (DL) number. (Intelligence Reform and Terrorism Prevention Act of 2004, implemented December 17, 2005) If you are carrying an older driver’s license containing your SSN that is not yet ready for renewal, contact the motor vehicles agency in your state and request to have your DL replaced before the actual renewal date. This way, you are not carrying a document in your wallet that contains your SSN.
23. Install a firewall on your home computer to prevent hackers from obtaining personal identifying and financial data from your hard drive. Read more about this at https://www.privacyrights.org/fs/fs36-securing-computer-privacy.htm#firewall .
24. Install and update virus and malware protection software to prevent a worm or virus from causing your computer to send out files or other stored information. Read more about this at https://www.privacyrights.org/fs/fs36-securing-computer-privacy.htm#firewall .
25. Password-protect files that contain sensitive personal data, such as financial account information. Create passwords that combine numbers, special characters and letters, upper and lower case. In addition, encrypt sensitive files. Read our Alert on "10 Rules for Creating a Hacker-Resistant Password" at https://www.privacyrights.org/ar/alertstrongpasswords.htm 
26. When shopping online, do business with companies that provide transaction security protection, and that have strong privacy and security policies. For more online shopping tips, read PRC Fact Sheet 23, www.privacyrights.org/fs/fs23-shopping.htm .
27. Before disposing of your computer, remove data by using a strong "wipe" utility program. Do not rely on the "delete" function to remove files containing sensitive information. Read more about this at https://www.privacyrights.org/fs/fs36-securing-computer-privacy.htm#disposal .
28. Never respond to "phishing" email messages. These may appear to be from your bank, eBay, or PayPal. They instruct you to visit their web site, which looks just like the real thing. There, you are told to confirm your account information, provide your SSN, date of birth and other personal information. Legitimate financial companies never email their customers with such requests. These messages are the work of fraudsters attempting to obtain personal information in order to commit identity theft. Visit www.antiphishing.org .
29. Be aware that file-sharing and file-swapping programs expose your computer to illegitimate access by hackers and fraudsters. If you use such programs, make sure you comply with the law and know what you are doing. Install and update strong firewall and virus protection.
Many file-sharing programs are downloaded by youngsters without the knowledge of their parents. There are software programs available that identify file sharing software and locate shared files on home computers. For more information on safe surfing for families, visit www.getnetwise.org .
Reducing access to your personal data:
30. To minimize the amount of information a thief can steal, do not carry extra credit cards, debit cards, your Social Security card, birth certificate or passport in your wallet or purse, except when needed. At work, store your wallet in a safe place.
31. If possible, do not carry other cards in your wallet that contain the Social Security number (SSN), including your Medicare card, except on days when you need them.
32. To reduce the amount of personal information that is "out there," take these steps:
- Remove your name from the marketing lists of the three credit reporting bureaus -- Equifax, Experian, and TransUnion. Call 888-5OPTOUT or go online to www.optoutprescreen.com . This will limit the number of pre-approved offers of credit that you receive. These, when tossed into the garbage, are a potential target of identity thieves who use them to order credit cards in your name. (See PRC Fact Sheet 6 for more information, www.privacyrights.org/fs/fs6-crdt.htm .)
- Sign up for the Federal Trade Commission's National Do Not Call Registry. Your name is added to name deletion lists used by nationwide marketers. You may also need to register for your state's "do not call" list, if it has one.
- Sign up for the Direct Marketing Association's Mail Preference Service. Your name is added to name deletion lists used by nationwide marketers.
- Mail Preference Service, PO Box 643, Carmel, NY 10512 (Include $1 check or money order.)
- Or opt-out online: https://www.dmachoice.org/register.php  . There is no fee for opting out online.
- Have your name and address removed from the phone book and reverse directories. (See PRC Fact Sheet 4 on tips for reducing junk mail, https://www.privacyrights.org/junk-mail-how-did-they-all-get-my-addres s)
Opt-out of the sale or sharing of your financial information when given the opportunity by your bank, credit card companies, insurance companies, and investment firms. (Read PRC Fact Sheet 24, www.privacyrights.org/fs/fs24-finpriv.htm .)
33. Install a locked mailbox at your residence to deter mail theft. Or use a post office box or a commercial mailbox service. When you are away from home for an extended time, have your mail held at the Post Office, or ask a trusted neighbor to pick it up.
34. When ordering new checks, pick them up at the bank. Don't have them mailed to your home.
35. When you pay bills by mail, do not leave the envelopes containing your checks at your mailbox for the postal carrier to pick up, or in open boxes at the receptionist's desk in your workplace. If stolen, your checks can be altered and then cashed by the imposter. It is best to mail bills and other sensitive items at the drop boxes inside the post office rather than neighborhood drop boxes. If you use a neighborhood drop box, always deposit the mail before the last pick-up of the day.
36. Each month, carefully review your credit card, bank and phone statements, including cellular phone bills, for unauthorized use. (For more information on cell phone fraud, see PRC Fact Sheet 2, www.privacyrights.org/fs/fs2-wire.htm .)
37. Convert as much bill-paying as you can to electronic payments by using the Internet for banking and paying bills. With fewer account statements and bills mailed to your home, you will reduce the risk of mail theft and identity theft.
38. Do not toss pre-approved credit offers in your trash or recycling bin without first tearing them into very small pieces or shredding them with a cross-cut shredder. They can be used by "dumpster divers" to order credit cards in your name and mail them to their address. Do the same with other sensitive information like credit card receipts, phone bills, bank account statements, investment account reports, and so on.
39. Use a gel pen for writing checks. Experts say that gel ink contains tiny particles of color that are trapped in the paper, making check washing more difficult .
40. Demand that financial institutions adequately safeguard your data. Discourage your bank from using the last four digits of the SSN as the PIN number they assign to customers. If you have been given the last four SSN digits as a default PIN, change it to something else.
41. When you fill out loan or credit applications, find out how the company disposes of them. If you are not convinced that they store them in locked files and/or shred them, take your business elsewhere. Some auto dealerships, department stores, car rental agencies, and video stores have been known to be careless with customer applications.
42. Store checks in a safe place. In the wrong hands, they could reveal a lot of information about you, including the account number, your phone number and driver's license number.
43. Store personal information securely in your home, especially if you have roommates, employ outside help, or have service work done in your home. Use a locking file cabinet or safe.
44. Any entity that handles personal information should train all its employees, from top to bottom, on responsible information-handling practices. Persuade the companies, government agencies, and nonprofit agencies with which you are associated to adopt privacy policies and conduct privacy training. (Read Fact Sheet 12 on responsible information-handling, www.privacyrights.org/fs/fs12-ih2.htm  and our workplace identity theft prevention tips, www.privacyrights.org/ar/PreventITWorkplace.htm )
45. Remember, if you are a victim of identity theft, or if your wallet or SSN has been lost or stolen, read our Fact Sheet 17a, "Identity Theft: What to Do if It Happens to You," on our website at https://www.privacyrights.org/content/identity-theft-what-do-if-it-happens-you  . If your wallet or your Social Security number has been lost or stolen, place fraud alerts on your three credit reports right away. Instructions are provided in step one of Fact Sheet 17a .
Credit Reporting Agencies (see also PRC Fact Sheet 6, www.privacyrights.org/fs/fs6-crdt.htm )
Federal Trade Commission
- Phone: (877) IDTHEFT (877-438-4338)
- Web: http://www.ftc.gov/bcp/edu/microsites/idtheft/ 
- FTC's comprehensive identity theft guide "Taking Charge: What To Do if Your Identity is Stolen" http://www.consumer.ftc.gov/articles/pdf-0009-taking-charge.pdf 
- FTC's interactive identity theft guide: https://www.identitytheft.gov/ 
Identity Theft Resource Center
- Phone: (888) 400-5530
- Web: www.idtheftcenter.org 
- FBI Internet Fraud Complaint Center. Report cases involving online fraud and phishing. www.ic3.gov 
- For tips on online safety, visit www.onguardonline.gov 
- The President's Identity Theft Task Force, www.idtheft.gov/ 
- CalPIRG"s report Still @ Risk: New Technology & Identity Theft Trends in California  (June 2012) discusses the crime of identity theft, prevention techniques, and ways to recover from identity theft.
- U.S. PIRG, Why You Should Get Security Freezes Before Your Information Is Stolen  (October 2015)