Identity Theft Forms and Instructions
These instructions explain what to do if your identity is stolen. Each step includes a link to the form or forms needed for that step. Just click on the step to expand with more information.
Before getting started, read the Frequently Asked Questions included in this toolkit: Identity Theft.
Important: These instructions provide general information and are not a substitute for the advice and help of a lawyer.
a. Pull your credit report from all three agencies. You can do this online at each agency’s website.
b. Get 4 folders, large envelopes, or other containers in which to keep documents.
c. Label one folder “Originals.” Of course, in this file you will keep the originals of all materials you compile. DO NOT SEND YOUR ORIGINAL DOCUMENTS TO ANYONE. Keep them safe and in a place you will remember.
d. Label one folder “Copies.” And of course, in this file you will keep all copies of anything relevant to your ID theft/financial fraud case, except the copies you will have in your “Evidence” file.
e. In the next folder/file, you will label it “ID Theft Evidence.” In this file you will have all the copies of documentation you have compiled from your investigation of the theft. REMEMBER – ORIGINALS WILL NOT GO IN THIS FOLDER. KEEP ALL ORIGINALS IN THE FILE MARKED “ORIGINALS.
f. In the last folder, mark it “Time/Expenses.” You will need to keep track of your time and any out-of-pocket expenses. Put your receipts in this folder. Also, make a copy of the "Document" form, and regularly keep track of time and expenses. This will be helpful if you decide to proceed with a civil suit against the perpetrator.
g. Prepare yourself mentally and emotionally. Know that clearing your credit history may take many months and hard work. It is time consuming.
h. Send all mail certified, return receipt requested. This is expensive, but worth it. When sending mail, keep a copy of the letter or mail you have sent for yourself. You will need to record the certified mail number on the copy you keep for yourself. When you have received the green postal service return card, you can clip it to your copy that matches the number. This way you can prove the letter was received by the appropriate party.
i. During calls, get a name and ID number, if possible. Be sure to record each call on a call log, identifying the name of the organization/institution you are calling, the customer service representative information, the date and time, and the nature of the call. Also, if there is a way for you to be able to follow up with that particular representative or to get email confirmation of what was discussed in the phone call, this will help you prove what happened in the event there is a dispute about what was said in the call.
j. Make copies of your Report, Investigate, Monitor, Document, and Dispute forms. Make as many copies as you need. Keep one handy at all times, in case someone returns a call, or you are able to work on getting information out in a place other than your home. From time to time, reconcile the information and put the originals in the “Originals” folder.
k. As mentioned earlier, keep track of your time and expenses using the Action.
In this file you will either gather or create or draft the following items:
a. Proof of who you are – make a copies of your driver’s license or government issued ID card, your social security card (make exactly 3 copies, put them one in each folder, and know exactly where each folder is), and recent utility bills with your name on them. This will help prove your address. (Put the original in the “Originals” folder, one in “Copies,” and one in “ID Theft Evidence”). You can also contact your utility company and ask for a printout proving your residence for the previous 5 years.
b. A timeline of events, which may span many years, that outlines in chronological order the crime – what are your actions, when did you find out this occurred, what have you done before today to sort out the crime or investigate.
c. The police report, if any. If there isn’t one, there will be. Do not report to law enforcement just yet, but once you have a report, a copy of the report will go here. AGAIN, PUT THE ORIGINAL IN THE FILE MARKED “ORIGINALS.”
e. Most recent report from all 3 agencies – if you have not done so, make this request this now. Keep the original of each report safely in the file marked “Originals.” Make sure you highlight or put a post-it on the front of each report with name of the agency and the date the report was pulled.
i. Equifax (800) 685-1111; www.equifax.com
ii. Experian (888) 397-3742, www.experian.com
iii. Transunion (800) 680-7289; www.transunion.com
g. Any evidence regarding the crime or the perpetrator.
h. All written or email communication with creditors, banks, financial institutions, or credit reporting companies.
i. Logs of phone conversations (see Step 1, g).
a. First print out the “Report” form.
b. Notify law enforcement. This step may feel overwhelming. It may make you feel more comfortable knowing that any law enforcement officer to whom you decide to report SHALL (meaning they have to) make a report. According to Article 2.29 of the Texas Code of Criminal Procedure, “a peace officer to whom an alleged violation of Section 32.51, Penal Code, is reported shall make a written report to the law enforcement agency that employs the peace officer that includes the following information:
i. The name of the victim;
ii. The name of the suspect, if known;
iii. The type of identifying information obtained, possessed, transferred, or used in violation of section 32.51, Penal Code, and
iv. The results of any investigation.”
You also have a right to have this report taken at your home. If you receive resistance, be polite, but firm. Politely remind the officer that Chapter 2 of the Texas Code of Criminal Procedure mandates that an ID Theft report be taken at the place where the victim lives. Advise each entity that you will provide additional information as it becomes available.
You also have a right to a copy of that report. Be sure to write down the case/incident number from the officer at the time you report, as his full report will not be available to you, but it is the number you will use to retrieve that report, once the officer has finished it.
c. Report to FTC. You can do this online at www.identitytheft.gov
i. You can also call 877-438-4338
ii. TYY: 866-653-4261
d. Report to credit agencies:
i. (This step may have already been taken when you pulled your credit reports. If not, do this now.)
ii. Now you have an incident report in the event you need one for these businesses.
iii. Each of the agencies has a responsibility to share their information with the other 2. This means you should only have to report the ID theft to one.
iv. You will have to report to Innovis separately.
v. At this time, request that a fraud alert be placed on your file. Also request that the first 5 numbers of your social security number be blocked from your credit report.
e. Report to U.S. Postal Inspector:
i. If you believe the U.S. Postal Service was used in stealing your identity, make a report to the U.S. Postal Inspector online at http://ehome.uspis.gov/mailtheft/idtheft.aspx.
ii. Or you can call 1-877-876-2455.
iii. Mail to Criminal Investigations Service Center, ATTN: MAIL FRAUD, 222 S. Riverside Plaza #1250, Chicago, IL 60606-6100.
f. Texas DPS – If you think someone used your driver’s license or obtained a driver’s license using your information, complete a DPS affidavit and take it to your nearest DPS office.
i. DPS Affidavit Form
g. Social Security Administration – if you suspect your Social Security number has been misused. Here you can find out if a new number will be necessary.
i. Fraud Hotline (800) 269-0271
ii. (866) 501-2101 (TTY)
iii. P.O. Box 17785, Baltimore, MD 21235
i. EVEN IF YOU DON’T THINK THE ID THEFT IS RELATED TO YOUR TAXES, someone may be able to file a fraudulent return using your social security number. Report to IRS Identity Protection Specialized Unit (800) 908-4490.
ii. Fill out and send in the IRS Identity Theft Affidavit
a. Use the “Investigate” form.
b. Review your last few bank or financial account statements, your credit card bills, and credit reports. Mark the activity or accounts that do not belong to you. Record information about fraudulent activity or accounts in the form.
c. As you find out more information, consider whether or not you need to report to another government agency or authority, or whether you should add information to an open report or investigation to an agency with whom you have already reported.
a. This process can be lengthy, so set reasonable expectations for what you can accomplish each day. Record your progress on the DISPUTE form.
b. First, write down the physical/mailing address information for disputes for each of the credit reporting agencies and any creditor, debt collector, and financial institution associated with each account fraudulently used in your name.
c. Remember to send each letter Certified Mail/Return Receipt Requested.
i. Each time you mail off a letter, you should have 2 additional copies of exactly what you have sent. One will need to be in the “Originals” file and one in the “Copies” file. When you receive the little green card proving the mail has been received, make a copy of it. Attach the original to the corresponding letter in your Originals file. Then attach a copy of it to the corresponding letter in your Copies file.
ii. Also, be sure to log the expense of mailing these letters. Put each receipt in your Time/Expenses folder and document it in the “DOCUMENT” form.
iii. Remember: keep track of time. Did you spend 15 minutes in line at the post office? Write it down and keep track of it in your “Time/Expense” folder.
d. In each letter, you will request that each fraudulent account be closed and removed from your credit report. You will also request a copy of all applications or business transaction records relating to your identity theft (the Fair Credit Reporting Act allows you to receive this information). You will need the information in your ID Theft Evidence file that proves who you are:
i. Include a copy of your driver’s license or government issued ID card.
ii. Include a copy of your ID Theft report from FTC or law enforcement.
iii. Include your ID Theft affidavit.
iv. List out each fraudulent item on your report.
v. Include a business records affidavit (if possible).
e. If you follow this procedure, the credit reporting companies MUST remove fraudulent accounts from your credit report within 4 days, unless they open an investigation and can prove the account was your own. Each creditor must send you copies of their records regarding accounts and transactions that are the result of the ID theft. Form letters are provided here.
f. If you include the business records affidavit, and someone decides to prosecute the offender, the information you receive from the institutions to whom you write will be admissible in court without testimony.
a. Starting a year from the date in which you requested each credit report, request another report. But this time, begin to stagger your requests. Since there are 3 major credit reporting agencies, request a copy from a different agency every 3-4 months so that you can continuously monitor your credit throughout the year.
b. Consistently review bank statements (monthly) and dispute fraudulent items as soon as you discover them.
c. As always, keep an accurate record of all people and businesses that contact you regarding your identity theft and flag any “follow-up” contacts you need to make.
d. As always, keep a log of all the letters you send and any phone conversations you have. You can use the “Monitor” form for help.
a. Be aware that sometimes the best potential for recovery of lost assets is through a civil suit. Consult with a civil attorney who works for victims of financial fraud. The attorney would best analyze the particular facts and circumstances surrounding each person’s potential case.
b. Consider calling the National Crime Victim Bar Association for a list of referrals to attorneys who may be able to help you.
i. (202) 467-8716.
c. Many states have laws that allow the victim to sue the identity thief directly.
d. A business or organization who has failed to properly secure your personal information may be held liable if the perpetrator used that information to steal your identity.
e. Under the Fair Credit Reporting Act, credit reporting agencies may be required to pay damages to victims for failing to add an identity theft annotation to the victim’s credit report.
a. Watch your trash – shred documents with an account number or personal identifying information before you recycle them (e.g. bills, account statements, bank statements, tax returns, and credit card offers).
b. Watch your mail – Install a mailbox that locks, if possible, so that thieves may not steal your mail. When you go out of town, contact your post office and ask that your mail be held until your return.
c. Consider a credit freeze – It makes your credit report unavailable for viewing by potential creditors unless you take steps to “thaw” it. It will take time to “thaw” a freeze, so be sure to understand the consequences of a freeze before you do it, and know exactly what you will need to do and how long it will take to thaw the freeze for each reporting agency.
i. This can cost money – again, keep track of any time and money spent to protect your ID.
ii. Send your request for a freeze by certified mail/return receipt requested.
iii. Equifax Security Freeze, P.O. Box 105788, Atlanta, GA 30348.
iv. Experian Security Freeze, P.O. Box 9554, Allen, TX 75013.
v. Trans Union Security Freeze, P.O. Box 2000, Chester, PA 19022-2000.
d. Opt out of credit card offers:
i. Visit www.optoutprescreen.com and follow the online instructions. Or you can call 1-888-5-OPT-OUT (1-888-567-8688).
ii. Get on the federal “no call” list. Visit www.donotcall.gov. You may register both your home and cell phone numbers. After your telephone numbers have been placed in the registry for 31 days, most telemarketers should not call you. Charities, political organizations and business with whom you currently do business are exempt and are allowed to contact you in some cases unless you specifically ask them not to.
e. Surf Safely:
i. Protect email and other online accounts with passwords. Do not use passwords that are easily guessed (e.g., your name your birthdate, or your telephone number). Do not keep a list of passwords on or near your computer. Do not open or respond to emails UNLESS you know the sender. Do not respond to emails asking for passwords or personal information.