{"id":2504,"date":"2018-05-04T11:45:13","date_gmt":"2018-05-04T15:45:13","guid":{"rendered":"https:\/\/www.med.unc.edu\/patientprivacy\/?page_id=2504"},"modified":"2020-04-15T11:01:52","modified_gmt":"2020-04-15T15:01:52","slug":"identity-theft","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/","title":{"rendered":"Identity Theft"},"content":{"rendered":"<p>Identity theft occurs when someone steals or uses your personal information without your permission. Identity thieves use many methods to obtain your personal information, including pretending to work for legitimate companies, such as places where you do personal banking, shopping, or receive health care services. The information can then be used to open credit cards, file tax returns in your name, to obtain medical treatment and for many other purposes. It is important to stay alert to potential identity theft scams and protect yourself against any attempts to illegally obtain and use your personal information.<\/p>\n<h4>Protect Yourself Against Identity Theft<\/h4>\n<p>You can protect yourself against identity theft through a combination of awareness of potential threats and some commonly used best practices to minimize exposure of your personal information. It is also a good idea to check your credit report, which can be obtained annually and for free from each of the three major credit bureaus.<\/p>\n<h4>Protect Your Personal Information<\/h4>\n<ul>\n<li>Use strong password for important accounts<\/li>\n<li>Don&#8217;t carry your Social Security card with you and keep it in a secure place<\/li>\n<li>Don&#8217;t give out personal information on the phone, through the mail or over the internet unless you have initiated the contact or are sure you know with whom you are dealing. If you are not sure who you are speaking with, ask if you can call back, but do not provide your personal information until you are confident that you are dealing with a representative of a legitimate organization that you wish to do business with.<\/li>\n<li>Only give your Social Security Number when absolutely necessary. Always ask if another type of identifier is acceptable.<\/li>\n<li>Guard your mail and trash from theft and always properly dispose of documents that contain personal information by tearing or shredding.<\/li>\n<li>Keep your computer and electronic communications safe. Maintain up to date virus protection, use a firewall program and secure browser to minimize risk. Never open an email or attachments from unknown and\/or suspicious senders.<\/li>\n<\/ul>\n<h4>Be Aware of Threats and Resources<\/h4>\n<p>There are many identity theft schemes and it is important to know where to find information about threats and resources if you think you may be a victim of identity theft or targeted by identity thieves.<\/p>\n<h4>Resources<\/h4>\n<ul>\n<li><strong>Federal Resource<\/strong>\n<ul>\n<li>The Federal Trade Commission provides <a href=\"https:\/\/www.consumer.ftc.gov\/features\/feature-0014-identity-theft\">information<\/a> to consumers about identity theft, including information about scams and how to protect your identity in the marketplace<\/li>\n<\/ul>\n<\/li>\n<li><strong>State Resources (North Carolina)<\/strong>\n<ul>\n<li>The North Carolina Department of Justice provides <a href=\"https:\/\/www.ncdoj.gov\/Protect-Yourself\/2-4-3-Protect-Your-Identity.aspx\">information and resources<\/a> about identity theft for residents of North Carolina as well as a means to <a href=\"https:\/\/www.ncdoj.gov\/Consumer.aspx\">report a suspected scam<\/a>.<\/li>\n<\/ul>\n<\/li>\n<li><strong>UNC Health Resources<\/strong>\n<ul>\n<li>UNC MC Policy: <a href=\"https:\/\/unchealthcare-uncmc.policystat.com\/policy\/5255750\/latest\/\">Identity Theft Protection<\/a> (<a href=\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2019\/03\/Identity-Theft-Protection.pdf\">PDF<\/a>)<\/li>\n<li>UNC MC Policy: <a href=\"https:\/\/unchealthcare-uncmc.policystat.com\/policy\/4964952\/latest\/\">Identity Theft Prevention, Red Flag Program<\/a> (<a href=\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2019\/03\/Identity-Theft-Prevention-Red-Flag-Program.pdf\">PDF<\/a>)<\/li>\n<li>Identity Theft Handout (<a href=\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2019\/04\/Identity_Theft_Resources.pdf\">PDF<\/a>)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4>UNC Medical Center Hospital Police<\/h4>\n<p>If you have lost personal information or suspect a theft of your personal information at the UNC Medical Center and would like to file a report, <a href=\"https:\/\/www.uncmedicalcenter.org\/uncmc\/patients-visitors\/hospital-police-department\/\">contact the Hospital Police Department at UNC Medical Center<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft occurs when someone steals or uses your personal information without your permission. Identity thieves use many methods to obtain your personal information, including pretending to work for legitimate companies, such as places where you do personal banking, shopping, or receive health care services. The information can then be used to open credit cards, &hellip; <a href=\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/\" aria-label=\"Read more about Identity Theft\">Read more<\/a><\/p>\n","protected":false},"author":79870,"featured_media":2629,"parent":2487,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-2504","page","type-page","status-publish","has-post-thumbnail","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity Theft - Privacy Office<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity Theft - Privacy Office\" \/>\n<meta property=\"og:description\" content=\"Identity theft occurs when someone steals or uses your personal information without your permission. Identity thieves use many methods to obtain your personal information, including pretending to work for legitimate companies, such as places where you do personal banking, shopping, or receive health care services. The information can then be used to open credit cards, &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"Privacy Office\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-15T15:01:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/\",\"url\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/\",\"name\":\"Identity Theft - Privacy Office\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg\",\"datePublished\":\"2018-05-04T15:45:13+00:00\",\"dateModified\":\"2020-04-15T15:01:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#primaryimage\",\"url\":\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg\",\"width\":1920,\"height\":648,\"caption\":\"Old Well in front of UNC Campus Building in Spring with trees and flowers in full bloom.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/patientprivacy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Topics\",\"item\":\"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity Theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/patientprivacy\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/patientprivacy\/\",\"name\":\"Privacy Office\",\"description\":\"UNC Health Care System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/patientprivacy\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity Theft - Privacy Office","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"Identity Theft - Privacy Office","og_description":"Identity theft occurs when someone steals or uses your personal information without your permission. Identity thieves use many methods to obtain your personal information, including pretending to work for legitimate companies, such as places where you do personal banking, shopping, or receive health care services. The information can then be used to open credit cards, &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/","og_site_name":"Privacy Office","article_modified_time":"2020-04-15T15:01:52+00:00","og_image":[{"width":1920,"height":648,"url":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/","url":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/","name":"Identity Theft - Privacy Office","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/patientprivacy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#primaryimage"},"image":{"@id":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg","datePublished":"2018-05-04T15:45:13+00:00","dateModified":"2020-04-15T15:01:52+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#primaryimage","url":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg","contentUrl":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-content\/uploads\/sites\/524\/2018\/07\/Picture-for-Website.jpg","width":1920,"height":648,"caption":"Old Well in front of UNC Campus Building in Spring with trees and flowers in full bloom."},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/identity-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/patientprivacy\/"},{"@type":"ListItem","position":2,"name":"Privacy Topics","item":"https:\/\/www.med.unc.edu\/patientprivacy\/privacy-topics\/"},{"@type":"ListItem","position":3,"name":"Identity Theft"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/patientprivacy\/#website","url":"https:\/\/www.med.unc.edu\/patientprivacy\/","name":"Privacy Office","description":"UNC Health Care System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/patientprivacy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/pages\/2504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/users\/79870"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/comments?post=2504"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/pages\/2504\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/pages\/2487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/media\/2629"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/patientprivacy\/wp-json\/wp\/v2\/media?parent=2504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}