Identity Theft

Sometimes, an identity thief can strike even if you've been very careful about keeping your personal information to yourself. If you suspect that your personal information has been hijacked and misappropriated to commit fraud or theft, take action immediately! Keep a record of your conversations and correspondence.

Your 1st 3 Steps

1st: Contact Fraud Departments

Contact the fraud departments of each of the three major credit bureaus. Tell them that you are an identity theft victim. Request that a "fraud alert" be placed in your file, as well as a victim's statement asking that creditors call you before opening any new accounts or changing your existing accounts. This can help prevent an identity thief from opening additional accounts in your name. At the same time, order copies of your credit reports from the credit bureaus. Credit bureaus must give you a free copy of your report if your report is inaccurate because of fraud and you request it in writing. Usually, calling one of the bureaus is sufficient. The first bureau will forward it to the others and you will get a copy of your credit report from each. Watch your mail for these items as they contain a lot of information that could be used for fraud. If possible, have them delivered to a post office box.

2nd: Contact Creditors

Contact the creditors for any accounts that have been tampered with or opened fraudulently. Creditors can include credit card companies, phone companies and other utilities, banks and other lenders. Ask to speak with someone in the security or fraud department of each creditor and follow up with a letter.

3rd: File a Report

File a report with your local police. Get a copy of the police report in case the bank, credit card company, or others need proof of the crime. Even if the police can't catch the identity thief in your case, having a copy of the police report can help you when dealing with creditors. In addition, if your checks have been stolen or misused, stop payment or close the account. Also contact the major check verification companies to request that they notify retailers using their databases not to accept these checks, or ask your bank to notify the check verification service with which it does business.

Learn more on what you can do if you are a victim of identity theft.

Major Creditors


  • Order your report at 800-685-1111 or write:
    P.O. Box 740241
    Atlanta, GA 30374-0241
  • To report fraud call 800-525-6285 and write:
    P.O. Box 740241
    Atlanta, GA 30374-0241
  • Visit the Equifax Website


  • Order your report at 888-397-3742 or write:
    P.O. Box 949
    Allen, TX 75013-0949
  • To report fraud call 888-397-3742 and write:
    P.O. Box 949
    Allen, TX 75013-0949
  • Visit the Experian Website

Trans Union

  • Order your report at 800-916-8800 or write:
    P.O. Box 1000
    Chester, PA 19022
  • To report fraud call 800-680-7289 and write:
    Fraud Victim Assistance Division
    P.O. Box 6790
    Fullerton, CA 92634
  • Visit the Trans Union Website
For further information visit the U.S. Government Website.

Protect Yourself From Phishing Scams & Identity Theft

Have You Heard About Phishing (Pronounced Fishing)

Phishing refers to fraudulent communications designed to deceive the recipient into divulging personal information such as social security numbers, credit card info, usernames and passwords, etc. Often, a well known brand name is hijacked to give the impression that the communication was sent by a bank, e-retailer, credit card, or service provider. These fraudulent emails often create a false sense of urgency and instruct the recipient to "verify your information" or "update your account" and threaten that "your service will be cancelled". Victims are unknowingly directed to seemingly credible websites where they are asked to provide valuable personal information that can be used for identify theft.

Another possibility is that the attack is designed to install malicious software onto the user's computer for identify theft or other purposes. By clicking on the link in the email, the recipient enables the impostor website to download software to their computer that can do any number of things, including render the computer completely useless.