Home » IDENTITY THEFT EDUCATION » OTHER PERSONAL INFORMATION
OTHER PERSONAL INFORMATION 2017-09-19T18:05:57+00:00

What Is Identity Theft?

According to the 2014 FTC Sentinel Report, credit card fraud accounted for only 17% of all reported types of fraud last year. There are many identity elements that thieves can steal that have nothing to do with your credit information – that’s why it’s so important to monitor non-credit identity data.

What is non-credit data?

Non-credit data is personally identifiable information (PII) that contributes to your identity status, but is not related to your credit file. Monitoring these non-credit data sources can help you to spot signs of identity theft:

THE INTERNET.

Complete ID enables you to monitor forums and websites, web pages, IRC channels and more looking for your personal information. We can look for items like email addresses, credit card numbers, drivers’ license numbers and other identifying numbers and credentials that criminals may try to use to impersonate you.

SOCIAL SECURITY DATABASE.

One of the first steps a criminal might take is to register a new name or alias using your Social Security Number (SSN). Complete ID monitors the SSN database so if you’re a member, you will be aware if this happens.

COURT AND JAIL BOOKING RECORDS.

Criminals may use a stolen identity to avoid being held responsible for a crime by law enforcement. To deter identity thieves from doing this, in 2004, Congress passed the Identity Theft Penalty Enhancement Act. The legislation established penalties for “aggravated” identity theft, which is using the identity of another person to commit felony crimes. Using Complete ID to watch court records and jail bookings is a good way to know if a criminal act is booked or reported in the court system using your identity, and what to do next.

PAYDAY LOANS.

Payday loans do not require a Social Security number or credit inquiry to complete — that’s why they are such a popular way for criminals to get quick cash. Using Complete ID to monitor payday lenders is a good way to watch for this kind of theft.

NATIONAL SEX OFFENDER REGISTRY.

Sometimes, a sex offender registers with the sex offender registry using a stolen identity. Watching the sex offender registry database with Complete ID can not only notify you if your identity is taken for this purpose, but also enable you to be aware of sex offenders living close by.

UNITED STATES POSTAL SERVICE.

An easy way for criminals to start the identity theft process is to redirect your mail to another address in order to gain access to your personal information and ultimately use it maliciously. Complete ID enables you to monitor USPS Address Change requests so you’re aware if this happens to you and can take action.

MORE EDUCATION

MINIMIZE YOUR RISK

While there is no way to ensure that you never become a victim, managing your personal information carefully and sensibly is the first step in minimizing your risk.

Learn More

CREDIT INFORMATION

Your credit information is the first place to look when you suspect identity theft has taken place. Make sure you’re educated on how to spot something fishy.

Learn More

FREQUENTLY ASKED QUESTIONS

Explore in-depth FAQs to learn more about fraud, identity theft, and how products work.

Learn More

FROM THE BLOG

How Common Is Identity Theft?

How Common Is Identity Theft? Identity theft is a serious issue in America. According to the Bureau of Justice Statistics (BJS), there were 17.6 million victims of identity theft in the United [...]

Choosing an Identity Theft Monitoring Service

Choosing an Identity Theft Monitoring Service Comparing and contrasting identity theft monitoring companies can be daunting. Which service offers the right features for you at a great savings? Make sure the service [...]

Identity Theft While Traveling: 5 Easy Steps to Protect Yourself

Identity Theft While Traveling: 5 Easy Steps to Protect Yourself The risk of identity theft increases when you travel. You carry sensitive documents like passports, you aren’t familiar with your surroundings, and [...]

SIGN UP TAKES JUST MINUTES. DEFENSE STARTS THE MINUTE YOU ACT.