SlideShare a Scribd company logo
Statement of Rights for
Identity Theft Victims
ftc.gov/idtheft

Several federal laws protect victims of identity theft.
These laws relate to:

•	 documenting the theft
•	 working with credit reporting companies
•	 communicating with creditors and debt
collectors

•	 limiting financial losses that may result
from identity theft

Documenting the Theft
You have the right to create an identity theft report.
An identity theft report will help you take advantage
of many of your rights. The report consists of your
complaint, an affidavit, and a report to law enforcement. To prepare for filing a report with local law
enforcement, complete the FTC’s complaint form
and affidavit (ftc.gov/complaint) and print a copy.
Give it to your local law enforcement agency when
you file a report there. Your complaint and affidavit
provide the details that allow credit reporting companies and the businesses involved to verify that you
are a victim and to know which of your accounts or
information have been affected so far.

You have the right to:

•	 Create an identity theft
report.

•	 Place a 90-day initial fraud
alert on your credit report.

•	 Place a seven-year

extended fraud alert on
your credit report.

•	 Get free copies of your
credit report.

•	 Have fraudulent

information blocked from
your credit report.

•	 Dispute fraudulent or

inaccurate information on
your credit report.

•	 Stop creditors and debt

collectors from reporting
fraudulent accounts.

•	 Get copies of documents

related to the theft of your
identity.

•	 Stop a debt collector from
contacting you.
Working with Credit Reporting Companies
You have the right to:

•	 Place a 90-day initial fraud alert on your credit report. The alert tells anyone who

uses your credit report that they must take reasonable steps to verify who is applying for credit in your name. To place this alert, contact one of the three nationwide
credit reporting companies. The one you contact must notify the others.

•	 Place a seven-year extended fraud alert on your credit report. To do this, provide

an identity theft report to each credit reporting company and explain how potential creditors can contact you. The credit reporting companies will put your contact
information on the extended fraud alert to tell potential creditors they must contact
you before issuing credit in your name.

•	 Get one free copy of your credit report and a summary of your rights from each

credit reporting company when you place a 90-day initial fraud alert. If you place
an extended fraud alert with a credit reporting company, you have the right to two
copies of that company’s credit report about you in a 12-month period. These are in
addition to the free credit report everyone is entitled to each year from each credit
reporting company.

•	 Have credit reporting companies block fraudulent information from appearing on

your credit report. You must send them a copy of a valid identity theft report, proof
of your identity, and a letter stating which information is fraudulent. Then the credit
reporting companies must tell any creditors who gave them fraudulent information
that it resulted from identity theft. Creditors may not turn fraudulent debts over to
debt collectors.

•	 Dispute information on your credit report — if you think it’s fraudulent or inaccu-

rate — with a credit reporting company. The credit reporting company must investigate your dispute and amend your report if you are right.

•	 In many states, you have the right to place a freeze on your credit report. A credit

freeze makes it less likely that an identity thief could open a new account in your name.
The 3 nationwide credit reporting companies are:
Equifax
800-685-1111
www.equifax.com

Experian
888-397-3742
www.experian.com

TransUnion
800-916-8800
www.transunion.com
Communicating with Creditors and Debt Collectors
You have the right to:

•	 Stop creditors and debt collectors from reporting fraudulent accounts. After you give
them a copy of a valid identity theft report, they may not report fraudulent accounts
to the credit reporting companies.

•	 Get copies of documents related to the theft of your identity, like transaction records
or applications for new accounts. You must include a copy of your police report
and an identity theft affidavit with your written request to the company that has the
documents. You can tell the company to give the documents to a specific law enforcement agency.

•	 Stop a debt collector from contacting you. In most cases, debt collectors must stop
contacting you after you send them a letter telling them to stop.

•	 Get written information from a debt collector about a debt, including the name of
the creditor and the amount you supposedly owe.

Limits on Financial Losses from Identity Theft
You have limited liability for fraudulent debts caused by identity theft. For example:

•	 Under most state laws you are not liable for any debt incurred on fraudulent new
accounts opened in your name and without your permission.

•	 Your liability for fraudulent purchases made with your credit card is up to $50, if you
tell the credit card company about the fraudulent charges within 60 days of when the
company sends you the statement showing the fraudulent charges. Some credit card
companies say cardholders who are victims of fraudulent charges have no liability
for those charges at all.

•	 If your ATM or debit card is lost or stolen, your liability for the misuse of your card

is up to $50, as long as you notify the bank or credit union within two business days
after you realize the card is missing. Your liability may increase if you don’t report
the loss promptly.

•	 If fraudulent electronic withdrawals are made from your bank or credit union

account but your ATM or debit card is not lost or stolen, you are not liable if you
write to let the bank or credit union know about the error within 60 days of when
they send you the account statement showing the fraudulent withdrawals.

•	 Most state laws limit your liability for fraudulent checks issued on your bank or
credit union account if you notify the bank or credit union promptly.
Other Federal Rights
Under the Justice for All Act, you have additional rights when the identity thief is being
prosecuted in federal court. You have the right to:

•	 Reasonable protection from the accused.
•	 Reasonable, accurate, and timely notice about any public court proceeding; parole
proceeding involving the crime; or release or escape of the accused.

•	 Not be excluded from any public court proceeding unless the judge decides that
your testimony would change significantly if you heard other testimony.

•	 Be reasonably heard at any public proceeding
in the district court involving release, plea,
sentencing, or parole proceeding.

•	 Confer with the attorney for the government in
the case.

•	 Full and timely restitution as provided in the
law.

•	 Proceedings free from unreasonable delay.
•	 Be treated with fairness and respect for your
dignity and privacy.

Other Rights:
In many states, businesses
or organizations that lose
or misplace certain types
of personal information
must tell you if that has
happened. Ask your state
attorney general’s office
for more information.

Resources
•	 To file a complaint and get an affidavit: ftc.gov/complaint or call (877) FTC-HELP
•	 For more information about identity theft: ftc.gov/idtheft
•	 To learn about rights in your state and credit freeze laws: www.naag.org

Federal Trade Commission
www.ftc.gov/idtheft

More Related Content

What's hot

Idt
IdtIdt
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
IT-oLogy
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
Sandy Kleinhenz
 
Fair Credit Report Act
Fair Credit Report ActFair Credit Report Act
Fair Credit Report Act
Mark Clayborne
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
- Mark - Fullbright
 
A Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting ActA Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting Act
- Mark - Fullbright
 
Lisa hopkins credit report guide
Lisa hopkins credit report guideLisa hopkins credit report guide
Lisa hopkins credit report guide
Lisa Hopkins
 
Consumer and Credit Reporting Webinar Powerpoints
Consumer and Credit Reporting Webinar PowerpointsConsumer and Credit Reporting Webinar Powerpoints
Consumer and Credit Reporting Webinar Powerpoints
Community Legal Education Ontario (CLEO)
 
Divorce and Identity Theft
Divorce and Identity TheftDivorce and Identity Theft
Divorce and Identity Theft
- Mark - Fullbright
 
Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4Max Charles Alperstein
 
FCRA Supplemental Training Guide
FCRA Supplemental Training GuideFCRA Supplemental Training Guide
FCRA Supplemental Training Guide
ZachAttack9
 
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesLabor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Polsinelli PC
 
Debt Collections
Debt CollectionsDebt Collections
Debt Collections
- Mark - Fullbright
 
Fair Credit Reporting Act
Fair Credit Reporting Act Fair Credit Reporting Act
Fair Credit Reporting Act driverajmls
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
Improve My Credit USA
 
LHand PLI ppt 2015 final-edited-2
LHand PLI ppt 2015 final-edited-2LHand PLI ppt 2015 final-edited-2
LHand PLI ppt 2015 final-edited-2Lesley Hand
 
Are you aware of Medicare Fraud and Abuse?
Are you aware of Medicare Fraud and Abuse?Are you aware of Medicare Fraud and Abuse?
Are you aware of Medicare Fraud and Abuse?
Jessica Parker
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
Springboard
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
- Mark - Fullbright
 

What's hot (20)

Idt
IdtIdt
Idt
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Fair Credit Report Act
Fair Credit Report ActFair Credit Report Act
Fair Credit Report Act
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
A Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting ActA Summary of Your Rights Under the Fair Credit Reporting Act
A Summary of Your Rights Under the Fair Credit Reporting Act
 
Lisa hopkins credit report guide
Lisa hopkins credit report guideLisa hopkins credit report guide
Lisa hopkins credit report guide
 
Consumer and Credit Reporting Webinar Powerpoints
Consumer and Credit Reporting Webinar PowerpointsConsumer and Credit Reporting Webinar Powerpoints
Consumer and Credit Reporting Webinar Powerpoints
 
Divorce and Identity Theft
Divorce and Identity TheftDivorce and Identity Theft
Divorce and Identity Theft
 
Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4
 
FCRA Supplemental Training Guide
FCRA Supplemental Training GuideFCRA Supplemental Training Guide
FCRA Supplemental Training Guide
 
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding IssuesLabor and Employment Roundtable Privacy Rights and Other Onboarding Issues
Labor and Employment Roundtable Privacy Rights and Other Onboarding Issues
 
Debt Collections
Debt CollectionsDebt Collections
Debt Collections
 
Fair Credit Reporting Act
Fair Credit Reporting Act Fair Credit Reporting Act
Fair Credit Reporting Act
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
LHand PLI ppt 2015 final-edited-2
LHand PLI ppt 2015 final-edited-2LHand PLI ppt 2015 final-edited-2
LHand PLI ppt 2015 final-edited-2
 
Are you aware of Medicare Fraud and Abuse?
Are you aware of Medicare Fraud and Abuse?Are you aware of Medicare Fraud and Abuse?
Are you aware of Medicare Fraud and Abuse?
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 

Viewers also liked

Elder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior ScamsElder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior Scams
- Mark - Fullbright
 
Children and Parents Media Use
Children and Parents Media UseChildren and Parents Media Use
Children and Parents Media Use
- Mark - Fullbright
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
- Mark - Fullbright
 
Law Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer SecurityLaw Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer Security
- Mark - Fullbright
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
- Mark - Fullbright
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
- Mark - Fullbright
 
Mobile apps for kids
Mobile apps for kidsMobile apps for kids
Mobile apps for kids
- Mark - Fullbright
 
Banking Basics
Banking BasicsBanking Basics
Banking Basics
- Mark - Fullbright
 

Viewers also liked (8)

Elder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior ScamsElder Fraud - Preventing Senior Scams
Elder Fraud - Preventing Senior Scams
 
Children and Parents Media Use
Children and Parents Media UseChildren and Parents Media Use
Children and Parents Media Use
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
 
Law Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer SecurityLaw Enforcement Provisions Related to Computer Security
Law Enforcement Provisions Related to Computer Security
 
Safeguarding Your Child's Future
Safeguarding Your Child's FutureSafeguarding Your Child's Future
Safeguarding Your Child's Future
 
Raytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity SurveyRaytheon Millennial Cybersecurity Survey
Raytheon Millennial Cybersecurity Survey
 
Mobile apps for kids
Mobile apps for kidsMobile apps for kids
Mobile apps for kids
 
Banking Basics
Banking BasicsBanking Basics
Banking Basics
 

Similar to Statement of Rights for Identity Theft Victims

Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
- Mark - Fullbright
 
Consumer issues for seniors and caregivers
Consumer issues for seniors and caregiversConsumer issues for seniors and caregivers
Consumer issues for seniors and caregivers
Janice [Jan] Neal
 
Understanding your credit report
Understanding your credit reportUnderstanding your credit report
Understanding your credit report
rick zimmerman
 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcra
Resolvly LLC
 
Your Credit Report
Your Credit ReportYour Credit Report
Your Credit Report
Western NY Law Center
 
Resolvly your rights-under-the-fcba
Resolvly your rights-under-the-fcbaResolvly your rights-under-the-fcba
Resolvly your rights-under-the-fcba
Resolvly LLC
 
Increasing Intensity to achieve collection
Increasing Intensity to achieve collectionIncreasing Intensity to achieve collection
Increasing Intensity to achieve collection
Hannah Rain
 
Understanding your credit.
Understanding your credit.Understanding your credit.
Understanding your credit.
Jessica Aliaga-Froelke
 
Debt Collection
Debt CollectionDebt Collection
Debt Collection
- Mark - Fullbright
 
How to Obtain Your Credit File and Repair Your Credit Problems
How to Obtain Your Credit File and Repair Your Credit ProblemsHow to Obtain Your Credit File and Repair Your Credit Problems
How to Obtain Your Credit File and Repair Your Credit Problems
Whichdeal Limited
 
10 Credit Myth
10 Credit Myth10 Credit Myth
10 Credit Myth
Mark Bustamonte
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
- Mark - Fullbright
 
Credit Reports and Credit Scores
Credit Reports and Credit ScoresCredit Reports and Credit Scores
Credit Reports and Credit Scores
- Mark - Fullbright
 
Have a complaint about your bank
Have a complaint about your bankHave a complaint about your bank
Have a complaint about your bank
- Mark - Fullbright
 
Credit Score and Debt basics 2nd edition
Credit Score and Debt basics 2nd editionCredit Score and Debt basics 2nd edition
Credit Score and Debt basics 2nd edition
Jeff Wilson II, CPA/PFS, CFE, CGMA
 

Similar to Statement of Rights for Identity Theft Victims (20)

Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
 
Consumer issues for seniors and caregivers
Consumer issues for seniors and caregiversConsumer issues for seniors and caregivers
Consumer issues for seniors and caregivers
 
Understanding your credit report
Understanding your credit reportUnderstanding your credit report
Understanding your credit report
 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcra
 
Your Credit Report
Your Credit ReportYour Credit Report
Your Credit Report
 
Ultimate Weapon Against Debt Collectors
Ultimate Weapon Against Debt CollectorsUltimate Weapon Against Debt Collectors
Ultimate Weapon Against Debt Collectors
 
Resolvly your rights-under-the-fcba
Resolvly your rights-under-the-fcbaResolvly your rights-under-the-fcba
Resolvly your rights-under-the-fcba
 
Increasing Intensity to achieve collection
Increasing Intensity to achieve collectionIncreasing Intensity to achieve collection
Increasing Intensity to achieve collection
 
Understanding your credit.
Understanding your credit.Understanding your credit.
Understanding your credit.
 
Debt Collection
Debt CollectionDebt Collection
Debt Collection
 
How to Obtain Your Credit File and Repair Your Credit Problems
How to Obtain Your Credit File and Repair Your Credit ProblemsHow to Obtain Your Credit File and Repair Your Credit Problems
How to Obtain Your Credit File and Repair Your Credit Problems
 
Credit Review
Credit ReviewCredit Review
Credit Review
 
10 Credit Myth
10 Credit Myth10 Credit Myth
10 Credit Myth
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
Credit Reports and Credit Scores
Credit Reports and Credit ScoresCredit Reports and Credit Scores
Credit Reports and Credit Scores
 
Revised Credit
Revised CreditRevised Credit
Revised Credit
 
Revised Credit
Revised CreditRevised Credit
Revised Credit
 
Managing Your Credit
Managing Your CreditManaging Your Credit
Managing Your Credit
 
Have a complaint about your bank
Have a complaint about your bankHave a complaint about your bank
Have a complaint about your bank
 
Credit Score and Debt basics 2nd edition
Credit Score and Debt basics 2nd editionCredit Score and Debt basics 2nd edition
Credit Score and Debt basics 2nd edition
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
- Mark - Fullbright
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
- Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 

Statement of Rights for Identity Theft Victims

  • 1. Statement of Rights for Identity Theft Victims ftc.gov/idtheft Several federal laws protect victims of identity theft. These laws relate to: • documenting the theft • working with credit reporting companies • communicating with creditors and debt collectors • limiting financial losses that may result from identity theft Documenting the Theft You have the right to create an identity theft report. An identity theft report will help you take advantage of many of your rights. The report consists of your complaint, an affidavit, and a report to law enforcement. To prepare for filing a report with local law enforcement, complete the FTC’s complaint form and affidavit (ftc.gov/complaint) and print a copy. Give it to your local law enforcement agency when you file a report there. Your complaint and affidavit provide the details that allow credit reporting companies and the businesses involved to verify that you are a victim and to know which of your accounts or information have been affected so far. You have the right to: • Create an identity theft report. • Place a 90-day initial fraud alert on your credit report. • Place a seven-year extended fraud alert on your credit report. • Get free copies of your credit report. • Have fraudulent information blocked from your credit report. • Dispute fraudulent or inaccurate information on your credit report. • Stop creditors and debt collectors from reporting fraudulent accounts. • Get copies of documents related to the theft of your identity. • Stop a debt collector from contacting you.
  • 2. Working with Credit Reporting Companies You have the right to: • Place a 90-day initial fraud alert on your credit report. The alert tells anyone who uses your credit report that they must take reasonable steps to verify who is applying for credit in your name. To place this alert, contact one of the three nationwide credit reporting companies. The one you contact must notify the others. • Place a seven-year extended fraud alert on your credit report. To do this, provide an identity theft report to each credit reporting company and explain how potential creditors can contact you. The credit reporting companies will put your contact information on the extended fraud alert to tell potential creditors they must contact you before issuing credit in your name. • Get one free copy of your credit report and a summary of your rights from each credit reporting company when you place a 90-day initial fraud alert. If you place an extended fraud alert with a credit reporting company, you have the right to two copies of that company’s credit report about you in a 12-month period. These are in addition to the free credit report everyone is entitled to each year from each credit reporting company. • Have credit reporting companies block fraudulent information from appearing on your credit report. You must send them a copy of a valid identity theft report, proof of your identity, and a letter stating which information is fraudulent. Then the credit reporting companies must tell any creditors who gave them fraudulent information that it resulted from identity theft. Creditors may not turn fraudulent debts over to debt collectors. • Dispute information on your credit report — if you think it’s fraudulent or inaccu- rate — with a credit reporting company. The credit reporting company must investigate your dispute and amend your report if you are right. • In many states, you have the right to place a freeze on your credit report. A credit freeze makes it less likely that an identity thief could open a new account in your name. The 3 nationwide credit reporting companies are: Equifax 800-685-1111 www.equifax.com Experian 888-397-3742 www.experian.com TransUnion 800-916-8800 www.transunion.com
  • 3. Communicating with Creditors and Debt Collectors You have the right to: • Stop creditors and debt collectors from reporting fraudulent accounts. After you give them a copy of a valid identity theft report, they may not report fraudulent accounts to the credit reporting companies. • Get copies of documents related to the theft of your identity, like transaction records or applications for new accounts. You must include a copy of your police report and an identity theft affidavit with your written request to the company that has the documents. You can tell the company to give the documents to a specific law enforcement agency. • Stop a debt collector from contacting you. In most cases, debt collectors must stop contacting you after you send them a letter telling them to stop. • Get written information from a debt collector about a debt, including the name of the creditor and the amount you supposedly owe. Limits on Financial Losses from Identity Theft You have limited liability for fraudulent debts caused by identity theft. For example: • Under most state laws you are not liable for any debt incurred on fraudulent new accounts opened in your name and without your permission. • Your liability for fraudulent purchases made with your credit card is up to $50, if you tell the credit card company about the fraudulent charges within 60 days of when the company sends you the statement showing the fraudulent charges. Some credit card companies say cardholders who are victims of fraudulent charges have no liability for those charges at all. • If your ATM or debit card is lost or stolen, your liability for the misuse of your card is up to $50, as long as you notify the bank or credit union within two business days after you realize the card is missing. Your liability may increase if you don’t report the loss promptly. • If fraudulent electronic withdrawals are made from your bank or credit union account but your ATM or debit card is not lost or stolen, you are not liable if you write to let the bank or credit union know about the error within 60 days of when they send you the account statement showing the fraudulent withdrawals. • Most state laws limit your liability for fraudulent checks issued on your bank or credit union account if you notify the bank or credit union promptly.
  • 4. Other Federal Rights Under the Justice for All Act, you have additional rights when the identity thief is being prosecuted in federal court. You have the right to: • Reasonable protection from the accused. • Reasonable, accurate, and timely notice about any public court proceeding; parole proceeding involving the crime; or release or escape of the accused. • Not be excluded from any public court proceeding unless the judge decides that your testimony would change significantly if you heard other testimony. • Be reasonably heard at any public proceeding in the district court involving release, plea, sentencing, or parole proceeding. • Confer with the attorney for the government in the case. • Full and timely restitution as provided in the law. • Proceedings free from unreasonable delay. • Be treated with fairness and respect for your dignity and privacy. Other Rights: In many states, businesses or organizations that lose or misplace certain types of personal information must tell you if that has happened. Ask your state attorney general’s office for more information. Resources • To file a complaint and get an affidavit: ftc.gov/complaint or call (877) FTC-HELP • For more information about identity theft: ftc.gov/idtheft • To learn about rights in your state and credit freeze laws: www.naag.org Federal Trade Commission www.ftc.gov/idtheft