Home » IDENTITY THEFT EDUCATION » OTHER PERSONAL INFORMATION
OTHER PERSONAL INFORMATION 2017-04-20T11:24:22+00:00

IDENTITY THEFT EDUCATION

YOUR IDENTITY IS MORE THAN YOUR CREDIT.

According to the 2014 FTC Sentinel Report, credit card fraud accounted for only 17% of all reported types of fraud last year. There are many identity elements that thieves can steal that have nothing to do with your credit information – that’s why it’s so important to monitor non-credit identity data.

WHAT IS NON-CREDIT DATA?

Non-credit data is personally identifiable information (PII) that contributes to your identity status, but is not related to your credit file. Monitoring these non-credit data sources can help you to spot signs of identity theft:

THE INTERNET.

Complete ID enables you to monitor forums and websites, web pages, IRC channels and more looking for your personal information. We can look for items like email addresses, credit card numbers, drivers’ license numbers and other identifying numbers and credentials that criminals may try to use to impersonate you.

SOCIAL SECURITY DATABASE.

One of the first steps a criminal might take is to register a new name or alias using your Social Security Number (SSN). Complete ID monitors the SSN database so if you’re a member, you will be aware if this happens.

COURT AND JAIL BOOKING RECORDS.

Criminals may use a stolen identity to avoid being held responsible for a crime by law enforcement. To deter identity thieves from doing this, in 2004, Congress passed the Identity Theft Penalty Enhancement Act. The legislation established penalties for “aggravated” identity theft, which is using the identity of another person to commit felony crimes. Using Complete ID to watch court records and jail bookings is a good way to know if a criminal act is booked or reported in the court system using your identity, and what to do next.

PAYDAY LOANS.

Payday loans do not require a Social Security number or credit inquiry to complete — that’s why they are such a popular way for criminals to get quick cash. Using Complete ID to monitor payday lenders is a good way to watch for this kind of theft.

NATIONAL SEX OFFENDER REGISTRY.

Sometimes, a sex offender registers with the sex offender registry using a stolen identity. Watching the sex offender registry database with Complete ID can not only notify you if your identity is taken for this purpose, but also enable you to be aware of sex offenders living close by.

UNITED STATES POSTAL SERVICE.

An easy way for criminals to start the identity theft process is to redirect your mail to another address in order to gain access to your personal information and ultimately use it maliciously. Complete ID enables you to monitor USPS Address Change requests so you’re aware if this happens to you and can take action.

MORE EDUCATION

MINIMIZE YOUR RISK

While there is no way to ensure that you never become a victim, managing your personal information carefully and sensibly is the first step in minimizing your risk.

Learn More

CREDIT INFORMATION

Your credit information is the first place to look when you suspect identity theft has taken place. Make sure you’re educated on how to spot something fishy.

Learn More

FREQUENTLY ASKED QUESTIONS

Explore in-depth FAQs to learn more about fraud, identity theft, and how products work.

Learn More

FROM THE BLOG

Educate Your Family on Security Best Practices

With the holiday season in full swing, most consumers are aware that online holiday shopping may present a number of security risks. While you may consider yourself to be cyber-aware, what about the rest of [...]

Do children need identity theft protection?

In the U.S. identity theft is a growing problem. As technology continues to develop, hackers will find newer, more sophisticated methods they can use to steal our identities – and those of our children. According [...]

My Family Member’s Identity Was Stolen. Now What?

When you receive a call from the bank about checks bouncing, or your spouse gets a collection call on a loan neither of you have, you may realize that you are most likely another identity [...]

SIGN UP TAKES JUST MINUTES. DEFENSE STARTS THE MINUTE YOU ACT.