Frequently Asked Questions About Identity TheftIn the world of digital convenience, where all it takes is a user name and password to do almost any business transaction from a laptop or home computer, never has it been easier for identity thieves to wreak havoc on unsuspecting victims. Young people and teenagers are especially vulnerable as they tend to have no credit history, making them even more appealing as targets. This book defines identity theft and gives practical, helpful information on how to protect yourself, what to do if your identity has been stolen, and how to reestablish your identity after being a victim. |
Common terms and phrases
Avenue NW Washington bank statements bill Cell phones chat rooms checkbook clear your name credit card offers credit history credit reporting companies Division P.O. Box documents driver's license Dumpster diving e-mail Equifax everything Experian Federal Trade Commission fraud alert Fraud Division P.O. fraudulent friendly fraud Fund Insufficient Funds identity stolen identity theft involves Identity Theft Resource identity theft victims illegitimate Web sites Insufficient Funds Insufficient laptop legitimate loan mailbox motor vehicle depart never Once a thief passwords Pennsylvania Avenue NW percent of identity personal information phishers Phishing phone number Phone or utilities police prevent identity theft protect consumers Qwest Communications rent an apartment Retrieved April safe scam Secure Socket Layer shredder Social Security Administration Social Security number someone steal your identity stolen your identity teens things transactions trash U.S. government username victim of identity wallet