Ebook Sample Content Preview:
You might think this would be the easiest part of combating identity theft, but it really isn’t. Think about it. The thief was allowed to pose as you, how do the companies know that you’re not also just trying to impersonate someone else?
Applications or other transaction records related to the theft of your identity may help you prove that you are a victim. For example, you may be able to show that the signature on an application is not yours.
These documents also may contain information about the identity thief that is valuable to law enforcement. By law, companies must give you a copy of the application or other business transaction records relating to your identity theft if you submit your request in writing.
Be sure to ask the company representative where you should mail your request. Companies must provide these records at no charge to you within 30 days of receipt of your request and supporting documents. You also may give permission to any law enforcement agency to get these records, or ask in your written request that a copy of these records be sent to a particular law enforcement officer.
The company can ask you for proof of your identity. This may be a photocopy of a government-issued ID card, the same type of information the identity thief used to open or access the account, or the type of information the company usually requests from applicants or customers, and a police report and a completed affidavit, which may be an Identity Theft Affidavit or the company's own affidavit.
This all, of course, is a daunting process. There are steps you can take, however, to organize your case and have all the documents you need at hand to combat the theft of your identity.