{"id":1529,"date":"2015-02-10T07:57:48","date_gmt":"2015-02-10T12:57:48","guid":{"rendered":"http:\/\/keysolutions.us\/blog\/?p=1529"},"modified":"2015-02-10T07:57:48","modified_gmt":"2015-02-10T12:57:48","slug":"identity-theft-action-steps-you-need-to-take","status":"publish","type":"post","link":"https:\/\/keysolutions.us\/blog\/identity-theft-action-steps-you-need-to-take\/","title":{"rendered":"IDENTITY THEFT \u2013 ACTION STEPS YOU NEED TO TAKE"},"content":{"rendered":"<p>Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. With the increased reports of identity theft, you need to take preventive steps to minimize your risk, and if your identity has been stolen, you need to know what action steps to take.<\/p>\n<p>The IRS discusses sound preventive steps to reduce your risk of identity theft and action steps to take if your identity has been stolen on its website <a href=\"http:\/\/www.irs.gov\/uac\/Taxpayer-Guide-to-Identity-Theft#.UVWmOn9_t6o.email\"><strong>http:\/\/www.irs.gov\/uac\/Taxpayer-Guide-to-Identity-Theft#.UVWmOn9_t6o.email<\/strong><\/a><strong>. <\/strong>One of the IRS&#8217;s\u00a0recommendations to help minimize identity theft is to request your free annual credit report which can be found at: <a href=\"https:\/\/www.annualcreditreport.com\/index.action\">https:\/\/www.annualcreditreport.com\/index.action<\/a>. Since there are 3 agencies (Equifax, Experian, and TransUnion) that provide credit reports, we suggest that you do NOT request your <strong><em>free<\/em><\/strong> credit report from each agency at the same time since you are only allowed <em><strong>one free credit report each year from each agency<\/strong><\/em>. We recommend to our clients that they request their free annual report from one of the individual agencies on a rotating basis every 4 months. Thus, if there is suspicious activity on your credit report, you will hopefully be able to identify it within a four-month period rather than requesting your free reports from all 3 companies once a year.<\/p>\n<p>Despite taking precautionary steps, what action steps should you take if you suspect or know that you confidential information has been breached? <!--more-->Again, a great resource is the aforementioned IRS website to read its \u201cTaxpayer Guide to Identity Theft.\u201d In addition to recommending the filing a police report, the IRS has provided links to the Federal Trade Commission, the 3 credit-reporting agencies, and the filing of Form 14039 with the IRS.<\/p>\n<p>While not mentioned on the IRS website, you may wish to contact the Internet Crime Complaint Center (<a href=\"http:\/\/www.ic3.gov\/\">www.ic3.gov<\/a>), the National Association of Attorney Generals (<a href=\"http:\/\/www.naag.org\/\">www.naag.org<\/a>), and the Social Security Administration Fraud Hotline (800-269-0271).<\/p>\n<p>Due to the increased identify theft crimes, future blog posts will discuss how to better protect yourself during the tax season, how to protect you home computer from viruses and hackers, using better caution when using a public computer, FBI Internet Security measures to use, and publications that you should have in your possession should you be a victim of identity theft.<\/p>\n<p>If you want to learn more about your personal situation, we invite you to call <a href=\"http:\/\/www.keysolutions.us\/\">610-594-2601<\/a> today to make an appointment at our <a href=\"http:\/\/www.keysolutions.us\/index.htm\">Exton PA CPA office<\/a> to discuss your situation. You can also schedule a consultation at <a href=\"http:\/\/keysolutions.us\/consultation.htm\">Click Here<\/a>.<\/p>\n<h6><em>Copyright \u00a9 2015 Keystone Financial Solutions, P.C. All rights reserved. BE SURE TO READ THE DISCLAIMER PAGE: Content in this blog is for educational purposes only and should not be considered as the rendering of tax, legal or investment advice. The publisher of this blog makes no representations as to the accuracy or completeness of any information herein, will not be liable for any errors or omissions, and shall not assume liability for any losses, injuries, or damages from the display or use of this information.<\/em><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. With the increased reports of identity theft, you need to take preventive steps to minimize your risk, and if your identity has been stolen, you need to know what action steps to take. The IRS discusses sound [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3],"tags":[],"class_list":{"0":"post-1529","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-irs-tax-planning-ideas-tips-news","7":"entry"},"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p9W9tf-oF","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/posts\/1529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/comments?post=1529"}],"version-history":[{"count":8,"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/posts\/1529\/revisions"}],"predecessor-version":[{"id":1543,"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/posts\/1529\/revisions\/1543"}],"wp:attachment":[{"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/media?parent=1529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/categories?post=1529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/keysolutions.us\/blog\/wp-json\/wp\/v2\/tags?post=1529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}