top of page
Navy blue abstract watercolor. Dark art background with space for design..jpg
hooded hacker online security concept.jpg
How to Protect Yourself From Identity Theft
  1.  CREDIT REPORTS.  Credit reports include, not only information about accounts opened in your name, but information regarding your address and employment as well as versions of your name used.  For this reason, they are an ideal resource for monitoring whether or not your credit or identity are being hijacked. 

A.  Credit Monitoring.  Credit monitoring services such as Credit Karma, Lifelock, Aura, Identity Guard, Experian, Identity Defense, Identity Force or myFico.  If you cannot afford a monitoring service, you can check your credit for free once per year at annualcreditreport.com.  You will want to check all 3 reports because not all creditors report to all 3 reporting agencies. 

​

B.  Credit Freeze.  Consider placing a freeze on your credit reports to prevent new applications for credit and unfreeze when you need to apply yourself. ​

​

C.  Fraud Alert.  Even if you already have a credit freeze in place, you may also place an initial fraud alert if you suspect fraud. An initial fraud alert tells businesses to check with you before opening a new account in your name.  See FTC, Consumer Advice.

2.  SOCIAL SECURITY NUMBER.  Your social security number is what creditors use to access your credit reports and employers use to pay you.  It is your identity.  Accordingly, you need to protect your social security number.

A.  Card Storage.  Do not keep your social security card in your wallet or purse. It could be stolen or lost.  Instead, keep it in a safe, locked space.

​

B.  IRS Pin.  Apply for an IRS pin number to protect your tax returns.  Your prior tax returns may be used to prepare and file false returns the following years, having your refund sent to a different address to be stolen. 

​

C.  2 Factor Authentication.  Elect 2 factor authentication if you are using online software to prepare and/or submit your tax returns.  2 factor authentication requires two or more credentials to log in.  If you try to submit your tax return online or through a tax preparer, the IRS will reject your tax return as a duplicate filing. If this happens, go to IdentityTheft.gov and report it using as many details as possible.   When you submit a report at IdentityTheft.gov, it will create your 1) FTC Identity Theft Report; 2) IRS Identity Theft Affidavit and 3) Personal recovery plan.  FTC, Consumer Advice.

​

D.  Social Security Number on Forms When completing forms in a medical or other offices, never provide your full social security number.  Only provide the last 4 digits of your social security number.  There are rare instances when your full social security number is necessary such as for some legal purposes, government benefit applications, beginning a new job (not applying), or applying for credit.

​

E.  E-Verify.  If you want to prevent someone from using your Social Security number to get a job, consider setting up an E-Verify account so you can lock your Social Security number at e-verify.gov/mye-verify. E-Verify is an online system that lets employers verify you're eligible to work in the United States, while also letting you lock your Social Security number so others can't use it to get a job.

3. COMPUTER & CELL PHONE USE.  For most people, their cell phone is their life-line.  We store valuable information in our phones, receive and send e-mails and often access on-line accounts using our phone.  Likewise, we store valuable information in our computers, receive and send e-mails and often access on-line accounts. 

A.  Phone Pin.  Always have a pin number on your phone.

​

B.  Computer Login.  Always have a password or pin number to log onto your computer.

​

C.  Strong Passwords.  When creating on-line passwords, use strong passwords that include upper case letters, lower case letters, numbers and symbols. Avoid using numbers or words that can easily be associated with you such as children’s names, pet’s names, dates of birth or words associated with your favorite hobbies.

​

D.  Monitoring Software Use malware and antivirus monitoring software such as TotalAVNorton,or Malwarebytes.

​

E.  Secure Network.  Avoid using unsecured networks with your computer or phone.

​

F.  Social Media.  Never answer online social media questionnaires, especially any questionnaire that asks about for your mother's maiden name or your “favorite food”, “favorite color”, “favorite place” or favorite anything.  Minimize any personal information you provide on-line.  Even providing information as to who is linked to you on-line could reveal sensitvie information or provide hints to information about you.

​

G.  Links.  Never access your accounts via a link in your text or e-mail unless you are expecting the link as part of a 2 Authentication process or account set-up. Always go to the known website or app to access.  Do not click on links or open attachments in emails, texts, or social media messages from unknown senders

​

H.  Electronics Disposal.  Before disposing of all electronics such as computers, cell phones, printers or even thumb drives, reformat the item to wipe the files or destroy the data storage.

4.  U.S. MAIL.  We receive a great deal of sensitive information in the U.S. Mail including account statements, new blank checks, new credit cards and correspondence from the IRS.  Accordingly, you need to be protective of your mail to prevent identity theft.

A.  Informed Delivery.  Sign up with the USPS to receive e-mail notifications regarding your expected mail to be delivered.

​

B.  Daily Pick-up.  Retrieve your mail from your mailbox daily.  Do not leave it in your mailbox overnight.  Thieves troll neighborhoods looking for mail to steal.

​

C.  Outgoing Mail.  Never leave outgoing mail in your mailbox overnight.  If the item contains sensitive information, elect to drop off the item at a mail drop facility.

​

D.  Mail Hold If going on vacation, request USPS to hold your mail until you return.

​

E.  Shred.  Prospective credit card and loan offers often arrive in the mail complete with your name and address information.  Shred any credit card or loan offer you receive in your mail before disposing of same to prevent would-be thieve from fishing the applications out of your trash.

5.  BANK & CREDIT CARD STATEMENTS.  Your bank and credit card statements provide an excellent record of your financial transactions.  Most banks and credit card companies no longer print the full account number on statements but some still do.  Accordingly, you will want to protect these statements from disclosure.

A.  Statement Access.  A. Opt out of mail delivery and access your statements via the company’s known website.

​

B.  Opt In for Notices.  Opt in for text and e-mail notices regarding occurring transactions.

​

C.  Statement Review.  Review statements at least monthly to determine if there has been any suspicious activity.

​

D.  Act Promptly When You See Suspicious Activity If you discover suspicious activity, immediately contact your bank or credit card company using a phone number known to be connected with your bank or credit card company to cancel your card and obtain a replacement. Many banks and credit card companies allow you to do this on-line.

​

E.  Keep Alert Once you have ordered a new card or new account checks, monitor your mail closely. If the party who used your credit card also knows your address, once he or she knows the card is canceled, he may be checking your mail for the new card.​

​

F.  Post-Office Box.  If you experience mail theft or aware that there is a problem with mail theft in your neighborhood, consider renting a post-office box.

6.  GENERALLY.  There are steps you can take to generally protect your information and identity.

A.  Prevent Access.  If you have roommates or untrustworthy family members, lock up your wallet when you are home.

​

B.   Maintain Supervision.  Avoid using your credit card anywhere your card will be taken from you and out of your supervision.

​

C.  Dispose With Care.  Before disposing of any documents that contain sensitive information, black out sensitive information such as social security numbers and even birth dates with a black marker then shred the documents or use a shredding service to do so.

​

D.  Selective Communication Never provide personal information to strangers on the telephone or via text.

​

E.  Communicate Only With Known Phone Numbers.  If you receive a call from an unknown person representing a company you do business with, advise that you will call back then call the number you know to be associated with that company.

​

F.  Be Aware of Your Surroundings.  Be aware of anyone standing too close to you, especially when you are using a card with a pin number at an ATM or debit card check out.  .Be aware at all times of your phone, your wallet, your purse and your surroundings. Make sure your purse is held in front of you rather hanging open off your shoulder. Store your wallet in your front pocket if possible. Thieves will steal your purse from you while you are in the bathroom stall by reaching under the door or over the door and lifting it off the hook. Thieves will also look for you to leave your purse in your shopping cart and will then steal your wallet or phone while you are distracted. Likewise, a thief can lift your wallet without you being aware by cutting it right out of your pocket.​

The information provided in this website and  blog page is intended for informational purposes and should not be construed as legal advice.  You should never rely solely on websites for legal information or advice and contact a licensed attorney with any questions you may have.

The Law Office of Heather A. Harwell, PLLC is a Federally designated debt relief agency which defends consumers and files suits on behalf of consumers pursuant to various Florida and Federal laws, including bankruptcy under Title 11.  The Law Office of Heather A. Harwell, PLLC handles Consumer Bankruptcy, | Chapter 7 Bankruptcy, Debt Defense Against Credit Card Lawsuits by Original Creditors  including American Express, Discover, T.D. Bank, Synchrony Bank, Capital One Bank, Credit One Bank and others;, Debt Defense Against Credit Card Lawsuits by Debt Buyers including Midland Funding, LLC, Portfolio Recovery Associates, LLC, LVNV Funding, LLC, and others; Debt Defense Regarding Automobile Repossession Deficiencies; Debt Defense regarding Foreclosure Sale Deficiencies; Garnishment Defense, Credit Reporting Issues, Lawsuits against Creditors & Debt Collectors violating Fair Debt Collection Law violations, and Appeals regarding Debt, Credit and Violations issues in the U.S.M.D. of Florida, Hillsborough County, Hernando County, Pasco County, Wesley Chapel, Zephyrhills, Spring Hill, San Antonio, Trinity, North Tampa, New Port Richey,  Lutz, Land O Lakes and surrounding areas.  EVERY CASE IS DIFFERENT.  The information provided in this website is meant for general informational purposes only and should NOT be construed as formal or comprehensive legal advice.  Visiting this website and/or referring to its content does not create an attorney-client relationship.  The attorney provides a no-contact consultation via telephone or video regarding Chapter 7 Bankruptcy, Debt Defense,, Debt Collector Violations, Debt Settlement, Debt Negotiation and Garnishment / Attachment Issues.

Office:  Wesley Chapel, Florida

bottom of page