SlideShare a Scribd company logo
Each year, millions of U.S. consumers become
victims of identity theft. ID theft is a growing crime
in which thieves use stolen personal information,
such as a Social Security number, to open new
credit accounts in someone else’s name. When their
crime is discovered, the crooks move on, leaving
their victims to deal with the fraudulent debts.
To avoid ID theft, you must take steps to protect
yourself. One way is to “freeze” your credit file. This
means that new credit cannot be established in
your name until you lift the “security freeze.”

Who should consider a security
freeze?

landlords, employers who need to do a background
check, cell phone companies, and utilities, for
example. You have the right to lift the freeze before
applying or giving permission to check your credit.
This is easily done with the personal identification
number (PIN) or password that the credit reporting
agency gives you.
A security freeze will not keep out anyone with
whom you already have an account or other business
relationship.

What is a security freeze?

Should I put my credit on ice?

A security freeze prevents anyone from opening new
credit accounts in your name by making your credit
file off-limits to prospective creditors—and crooks.
In the typical credit application process, a creditor
will request the applicant’s credit report or credit
score from one of the nation’s three major credit
reporting agencies: Equifax, Experian and TransUnion.
(These businesses compile information about
your credit accounts and payment history from
businesses that have lent you money.) The creditor
uses this information to determine if the applicant
is creditworthy. If you are creditworthy, it means you
are someone the business wants to lend money to.
Creditors and lenders who are denied access to an
applicant’s credit file can’t evaluate the borrower’s
credit history. This usually means the credit request
will be denied. That’s a good thing if a crook is trying
to access your credit.
Under a security freeze, your credit report is off limits
to prospective creditors and others who use it in their
decision-making process—insurance companies,

Consider both the benefits and drawbacks of
locking your credit file before you decide whether
or not to place a security freeze.
PROS:
• A security freeze can stop imposters from opening
new accounts in your name.
• In most cases, placing a security freeze—and
lifting it—is free for victims of ID theft.
• A freeze does not stop you from getting new credit
or other services.
• The freeze does not expire—it remains in effect
until you remove it.
• Freezing provides much greater protection and
typically costs much less than a monthly credit
monitoring service.
• A freeze does not affect your credit score.

A security freeze is not always the best choice for
everyone. But, if you are a victim of identity theft or
believe you are at increased risk, a security freeze
can provide protection and peace of mind.

CONS:
• A security freeze is only effective if you activate it
(by mail, in most states) at all three credit reporting
agencies.
• Depending where you live, non-victims may pay
up to $60 to place the freeze with all three agencies.
(In most states, however, it will cost non-victims no
more than $30 to freeze all three files, and freezes
for non-victims are free in Colorado, Indiana, New
Jersey and New York.)
• In most states, non-victims must pay a fee
whenever they ask to temporarily lift the freeze and
when they permanently remove it. While free in a
few states, a temporary lift can cost non-victims in
other states up to $12.
• A security freeze can take up to three business days
to be lifted, delaying your credit application or other
transaction and making “instant credit” unavailable
to you. (A number of states have passed laws that
require the freeze be lifted within 15 minutes of the
request beginning around September 2008.)
• A freeze does not prevent fraud involving your
existing bank or credit accounts.

Stolen personal information can be sold or exchanged
among identity thieves, which means that all victims
should consider a security freeze. Placing, lifting and
removing the freeze is free for identity theft victims,
in most cases.
Consumers whose Social Security number has been
revealed unintentionally—through a company
“security breach” or a lost wallet, for example—can
freeze their credit files as a precaution.
A security freeze can be inconvenient, particularly
if you’re actively seeking new credit or doing other
things (like applying to rent a home) that require
your credit file to be accessible. That’s why consumers
considering a freeze should take into account their
particular circumstances.
Before making a decision, consider the likelihood
you will become a fraud victim, the extent to which
the freeze would delay important transactions, and
whether the extra peace of mind is worth the cost
and extra effort.
Freezing your credit file
Freeze fees, required materials and procedures vary from
state to state and among the three credit reporting
agencies. Contact each of these credit reporting agencies
to get state-specific instructions for placing a security
freeze on your credit file.

Equifax
Phone: 888-298-0045 (you will be placed on hold and

then connected with a representative)
Web site: Go to www.equifax.com, enter “security
freeze” in the “Search” box in the upper right-hand part
of the screen. Choose the first result in the list.

Experian
Phone: 888-397-3742 (follow the prompts for

recordings about placing a security freeze)
Web site: www.experian.com/consumer/security_
freeze.html

TransUnion
Phone: 888-909-8872 (follow the prompts for

recordings about placing a security freeze)
Web site: Go to www.transunion.com and click on
“security freeze” under the “Identity Theft” heading in
the lower portion of the page.
In most (but not all) cases, there is no charge for identity
theft victims to place, lift or remove a freeze. You will,
however, need to provide a copy of an identity theft
report you have filed with law enforcement. Fees vary
for non-victims.
If you’re married, both you and your spouse must freeze
your separate credit files to fully protect your household.
In most states it will cost you no more than $60 ($10
each). However, in certain states a couple’s cost could be

as high as $120 (six reports at $20 each) if you are not
eligible for a no-cost freeze.
After processing your request, each agency will mail you
a confirmation letter and a PIN or password that you will
use whenever you temporarily lift the freeze, and if you
permanently remove it.
In many states, you can choose to lift the freeze for a
specific period of time or for a particular creditor or
other credit report user. If you temporarily lift the freeze
for a particular third party, you will provide a unique
access code (TransUnion and Equifax) or your PIN
(Experian) to that person or business so that they can
access your credit report.

Consumer Action
www.consumer-action.org
221 Main Street, Suite 480
San Francisco, CA 94105
415-777-9635 / TTY: 415-777-9456
hotline@consumer-action.org
523 W. Sixth Street, Suite 1105
Los Angeles, CA 90014
213-624-8327
Chinese, English and Spanish spoken

Assistance and Information
Consumers Union provides an online state-by-state

list of security freeze laws, maximum allowable fees, and
agency instructions.
Web site: www.consumersunion.org
Enter “state credit freeze” in the search box to find the
page titled State Security Freeze Laws.
Get a free credit report from each credit reporting
agency once every 12 months.
Phone: 877-322-8228
Web site: www.annualcreditreport.com
Opt out of receiving certain types of marketing mail,
including pre-approved credit offers that an ID thief
could intercept.
Phone: 888-5OPTOUT (888-567-8688)
Web site: www.optoutprescreen.com
The Identity Theft Clearinghouse of the
Federal Trade Commission offers more about consumer
protection.
Phone: 877-IDTHEFT (877-438-4338)
Web site: www.ftc.gov/idtheft

This publication was created by Consumer Action’s
Privacy Information Project. © Consumer Action 2008

F reeze Y our
C redit F ile
Leave ID Thieves Out in the Cold

A Consumer Action Publication

More Related Content

Viewers also liked

Culture and Society
Culture and SocietyCulture and Society
Culture and SocietyJTS91
 
Excellent Overseas-API 5L X52 PSL2
Excellent Overseas-API 5L X52 PSL2Excellent Overseas-API 5L X52 PSL2
Excellent Overseas-API 5L X52 PSL2
aniketex
 
1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure
1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure
1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure
Barış Akay
 
Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...
Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...
Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...Ma Erica Victoria Sacdalan
 
How do children use social networking sites?
How do children use social networking sites?How do children use social networking sites?
How do children use social networking sites?
- Mark - Fullbright
 
Excellent Overseas-API 5L X52 PSL1 LSAW Pipe
Excellent Overseas-API 5L X52 PSL1 LSAW PipeExcellent Overseas-API 5L X52 PSL1 LSAW Pipe
Excellent Overseas-API 5L X52 PSL1 LSAW Pipe
aniketex
 
Identity Theft & Account Fraud
Identity Theft & Account FraudIdentity Theft & Account Fraud
Identity Theft & Account Fraud
- Mark - Fullbright
 
Have a complaint about your bank
Have a complaint about your bankHave a complaint about your bank
Have a complaint about your bank
- Mark - Fullbright
 
14 04 surtunmeli_kavramalar
14 04 surtunmeli_kavramalar14 04 surtunmeli_kavramalar
14 04 surtunmeli_kavramalar
Barış Akay
 
(جلد دوم) SPSS 19 راهنمای آموزش
(جلد دوم) SPSS 19 راهنمای آموزش(جلد دوم) SPSS 19 راهنمای آموزش
(جلد دوم) SPSS 19 راهنمای آموزش
Hamed Zarei
 
How to make people feel comfortable around you
How to make people feel comfortable around youHow to make people feel comfortable around you
How to make people feel comfortable around you
Ethan Musolini
 
Plano de Ação Educacional 2009-2010
Plano de Ação Educacional 2009-2010Plano de Ação Educacional 2009-2010
Plano de Ação Educacional 2009-2010
Renato Sabbatini
 
Cheiro De Feijao, Estrelas E Sonhos
Cheiro De Feijao, Estrelas E SonhosCheiro De Feijao, Estrelas E Sonhos
Cheiro De Feijao, Estrelas E Sonhos
VVCX
 
Programa Especiais Inesp
Programa Especiais InespPrograma Especiais Inesp
Programa Especiais Inesp
Gil Antunes
 
Diaporama Parlamento dos Jovens 2010/2011
Diaporama Parlamento dos Jovens 2010/2011Diaporama Parlamento dos Jovens 2010/2011
Diaporama Parlamento dos Jovens 2010/2011
ESCM
 
Prehistoria
PrehistoriaPrehistoria
Prehistoriamarta453
 
Trabajo de la lata de conservas ; i.
Trabajo de la lata de conservas ; i.Trabajo de la lata de conservas ; i.
Trabajo de la lata de conservas ; i.
Isabel Lozano
 

Viewers also liked (20)

Culture and Society
Culture and SocietyCulture and Society
Culture and Society
 
Excellent Overseas-API 5L X52 PSL2
Excellent Overseas-API 5L X52 PSL2Excellent Overseas-API 5L X52 PSL2
Excellent Overseas-API 5L X52 PSL2
 
1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure
1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure
1.semtech ds-gaseous portableemissionsmeasurementsystem–brochure
 
Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...
Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...
Ready for occupancy houses in cavite rush for sale in cavite/clean titled hou...
 
Bayede Van Loveren BDay 21 April
Bayede Van Loveren BDay 21 AprilBayede Van Loveren BDay 21 April
Bayede Van Loveren BDay 21 April
 
How do children use social networking sites?
How do children use social networking sites?How do children use social networking sites?
How do children use social networking sites?
 
Excellent Overseas-API 5L X52 PSL1 LSAW Pipe
Excellent Overseas-API 5L X52 PSL1 LSAW PipeExcellent Overseas-API 5L X52 PSL1 LSAW Pipe
Excellent Overseas-API 5L X52 PSL1 LSAW Pipe
 
Identity Theft & Account Fraud
Identity Theft & Account FraudIdentity Theft & Account Fraud
Identity Theft & Account Fraud
 
Have a complaint about your bank
Have a complaint about your bankHave a complaint about your bank
Have a complaint about your bank
 
14 04 surtunmeli_kavramalar
14 04 surtunmeli_kavramalar14 04 surtunmeli_kavramalar
14 04 surtunmeli_kavramalar
 
(جلد دوم) SPSS 19 راهنمای آموزش
(جلد دوم) SPSS 19 راهنمای آموزش(جلد دوم) SPSS 19 راهنمای آموزش
(جلد دوم) SPSS 19 راهنمای آموزش
 
How to make people feel comfortable around you
How to make people feel comfortable around youHow to make people feel comfortable around you
How to make people feel comfortable around you
 
Monopoly
Monopoly Monopoly
Monopoly
 
Plano de Ação Educacional 2009-2010
Plano de Ação Educacional 2009-2010Plano de Ação Educacional 2009-2010
Plano de Ação Educacional 2009-2010
 
Cheiro De Feijao, Estrelas E Sonhos
Cheiro De Feijao, Estrelas E SonhosCheiro De Feijao, Estrelas E Sonhos
Cheiro De Feijao, Estrelas E Sonhos
 
[Garoto] 04 06 13
[Garoto] 04 06 13[Garoto] 04 06 13
[Garoto] 04 06 13
 
Programa Especiais Inesp
Programa Especiais InespPrograma Especiais Inesp
Programa Especiais Inesp
 
Diaporama Parlamento dos Jovens 2010/2011
Diaporama Parlamento dos Jovens 2010/2011Diaporama Parlamento dos Jovens 2010/2011
Diaporama Parlamento dos Jovens 2010/2011
 
Prehistoria
PrehistoriaPrehistoria
Prehistoria
 
Trabajo de la lata de conservas ; i.
Trabajo de la lata de conservas ; i.Trabajo de la lata de conservas ; i.
Trabajo de la lata de conservas ; i.
 

Similar to Freeze Your Credit File

Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
tommy2tone44
 
How to freeze your credit files: CA Attorney General's office
How to freeze your credit files: CA Attorney General's officeHow to freeze your credit files: CA Attorney General's office
How to freeze your credit files: CA Attorney General's office
Rishi Kumar
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Blinsink
 
Idt
IdtIdt
Memberguide ppt
Memberguide pptMemberguide ppt
Memberguide pptEmilyKPope
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevisedEmilyKPope
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
Daniel Michels
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
Springboard
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
IT-oLogy
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
Oregon Law Practice Management
 
Identity theft
Identity theftIdentity theft
Identity theft
Muncie_Library
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
Naval OPSEC
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 
Employee law module
Employee law moduleEmployee law module
Employee law module
Muncie_Library
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
amason04
 

Similar to Freeze Your Credit File (20)

Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
How to freeze your credit files: CA Attorney General's office
How to freeze your credit files: CA Attorney General's officeHow to freeze your credit files: CA Attorney General's office
How to freeze your credit files: CA Attorney General's office
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Idt
IdtIdt
Idt
 
Memberguide ppt
Memberguide pptMemberguide ppt
Memberguide ppt
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Memberguid erevised
Memberguid erevisedMemberguid erevised
Memberguid erevised
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
LS IDT 2014
LS IDT 2014LS IDT 2014
LS IDT 2014
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
- Mark - Fullbright
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
- Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Freeze Your Credit File

  • 1. Each year, millions of U.S. consumers become victims of identity theft. ID theft is a growing crime in which thieves use stolen personal information, such as a Social Security number, to open new credit accounts in someone else’s name. When their crime is discovered, the crooks move on, leaving their victims to deal with the fraudulent debts. To avoid ID theft, you must take steps to protect yourself. One way is to “freeze” your credit file. This means that new credit cannot be established in your name until you lift the “security freeze.” Who should consider a security freeze? landlords, employers who need to do a background check, cell phone companies, and utilities, for example. You have the right to lift the freeze before applying or giving permission to check your credit. This is easily done with the personal identification number (PIN) or password that the credit reporting agency gives you. A security freeze will not keep out anyone with whom you already have an account or other business relationship. What is a security freeze? Should I put my credit on ice? A security freeze prevents anyone from opening new credit accounts in your name by making your credit file off-limits to prospective creditors—and crooks. In the typical credit application process, a creditor will request the applicant’s credit report or credit score from one of the nation’s three major credit reporting agencies: Equifax, Experian and TransUnion. (These businesses compile information about your credit accounts and payment history from businesses that have lent you money.) The creditor uses this information to determine if the applicant is creditworthy. If you are creditworthy, it means you are someone the business wants to lend money to. Creditors and lenders who are denied access to an applicant’s credit file can’t evaluate the borrower’s credit history. This usually means the credit request will be denied. That’s a good thing if a crook is trying to access your credit. Under a security freeze, your credit report is off limits to prospective creditors and others who use it in their decision-making process—insurance companies, Consider both the benefits and drawbacks of locking your credit file before you decide whether or not to place a security freeze. PROS: • A security freeze can stop imposters from opening new accounts in your name. • In most cases, placing a security freeze—and lifting it—is free for victims of ID theft. • A freeze does not stop you from getting new credit or other services. • The freeze does not expire—it remains in effect until you remove it. • Freezing provides much greater protection and typically costs much less than a monthly credit monitoring service. • A freeze does not affect your credit score. A security freeze is not always the best choice for everyone. But, if you are a victim of identity theft or believe you are at increased risk, a security freeze can provide protection and peace of mind. CONS: • A security freeze is only effective if you activate it (by mail, in most states) at all three credit reporting agencies. • Depending where you live, non-victims may pay up to $60 to place the freeze with all three agencies. (In most states, however, it will cost non-victims no more than $30 to freeze all three files, and freezes for non-victims are free in Colorado, Indiana, New Jersey and New York.) • In most states, non-victims must pay a fee whenever they ask to temporarily lift the freeze and when they permanently remove it. While free in a few states, a temporary lift can cost non-victims in other states up to $12. • A security freeze can take up to three business days to be lifted, delaying your credit application or other transaction and making “instant credit” unavailable to you. (A number of states have passed laws that require the freeze be lifted within 15 minutes of the request beginning around September 2008.) • A freeze does not prevent fraud involving your existing bank or credit accounts. Stolen personal information can be sold or exchanged among identity thieves, which means that all victims should consider a security freeze. Placing, lifting and removing the freeze is free for identity theft victims, in most cases. Consumers whose Social Security number has been revealed unintentionally—through a company “security breach” or a lost wallet, for example—can freeze their credit files as a precaution. A security freeze can be inconvenient, particularly if you’re actively seeking new credit or doing other things (like applying to rent a home) that require your credit file to be accessible. That’s why consumers considering a freeze should take into account their particular circumstances. Before making a decision, consider the likelihood you will become a fraud victim, the extent to which the freeze would delay important transactions, and whether the extra peace of mind is worth the cost and extra effort.
  • 2. Freezing your credit file Freeze fees, required materials and procedures vary from state to state and among the three credit reporting agencies. Contact each of these credit reporting agencies to get state-specific instructions for placing a security freeze on your credit file. Equifax Phone: 888-298-0045 (you will be placed on hold and then connected with a representative) Web site: Go to www.equifax.com, enter “security freeze” in the “Search” box in the upper right-hand part of the screen. Choose the first result in the list. Experian Phone: 888-397-3742 (follow the prompts for recordings about placing a security freeze) Web site: www.experian.com/consumer/security_ freeze.html TransUnion Phone: 888-909-8872 (follow the prompts for recordings about placing a security freeze) Web site: Go to www.transunion.com and click on “security freeze” under the “Identity Theft” heading in the lower portion of the page. In most (but not all) cases, there is no charge for identity theft victims to place, lift or remove a freeze. You will, however, need to provide a copy of an identity theft report you have filed with law enforcement. Fees vary for non-victims. If you’re married, both you and your spouse must freeze your separate credit files to fully protect your household. In most states it will cost you no more than $60 ($10 each). However, in certain states a couple’s cost could be as high as $120 (six reports at $20 each) if you are not eligible for a no-cost freeze. After processing your request, each agency will mail you a confirmation letter and a PIN or password that you will use whenever you temporarily lift the freeze, and if you permanently remove it. In many states, you can choose to lift the freeze for a specific period of time or for a particular creditor or other credit report user. If you temporarily lift the freeze for a particular third party, you will provide a unique access code (TransUnion and Equifax) or your PIN (Experian) to that person or business so that they can access your credit report. Consumer Action www.consumer-action.org 221 Main Street, Suite 480 San Francisco, CA 94105 415-777-9635 / TTY: 415-777-9456 hotline@consumer-action.org 523 W. Sixth Street, Suite 1105 Los Angeles, CA 90014 213-624-8327 Chinese, English and Spanish spoken Assistance and Information Consumers Union provides an online state-by-state list of security freeze laws, maximum allowable fees, and agency instructions. Web site: www.consumersunion.org Enter “state credit freeze” in the search box to find the page titled State Security Freeze Laws. Get a free credit report from each credit reporting agency once every 12 months. Phone: 877-322-8228 Web site: www.annualcreditreport.com Opt out of receiving certain types of marketing mail, including pre-approved credit offers that an ID thief could intercept. Phone: 888-5OPTOUT (888-567-8688) Web site: www.optoutprescreen.com The Identity Theft Clearinghouse of the Federal Trade Commission offers more about consumer protection. Phone: 877-IDTHEFT (877-438-4338) Web site: www.ftc.gov/idtheft This publication was created by Consumer Action’s Privacy Information Project. © Consumer Action 2008 F reeze Y our C redit F ile Leave ID Thieves Out in the Cold A Consumer Action Publication