What is Identity Theft?
Identity theft: Identity theft is a crime in which an  imposter obtains key pieces of personal information, such as Social Security or  driver's license numbers, in order to impersonate someone else. The information  can be used to obtain credit, merchandise, and services in the name of the  victim, or to provide the thief with false credentials. In addition to running  up debt, an imposter might provide false identification to police, creating a  criminal record or leaving outstanding arrest warrants for the person whose  identity has been stolen.
The State of Louisiana takes the security of its citizens' data very seriously.  Therefore, all citizens are strongly encouraged to review the list of FREE steps that can be taken to mitigate the risk of identity theft.  Please carefully read the steps here:
NextSteps (la.gov)
Common Types of Computer Identity Theft Schemes
 Phishing: When internet fraudsters impersonate a business to  trick you into giving out your personal information, it is called phishing.  Don't reply to email, text, or pop-up messages that ask for your personal or  financial information. Don't click on links within them either – even if the  message seems to be from an organization you trust. It isn't. Legitimate  businesses don't ask you to send sensitive information through unsecure  channels.
Pharming: This can happen when a hacker tampers with a  website host file or domain name system so that URL address requests are  rerouted to a fake or spoofed website created by the hacker to capture personal  identifying information from victims. The victim then thinks that they are on a  trusted website, and are more willing to enter their personal information, such  as credit card numbers, social security numbers, and addresses. The hacker then  uses that information to commit identity theft.
Vishing: A technique, much like phishing, that allows  criminals to maliciously gain access to your personal information for the  purposes of identity theft. Vishing scams use a combination social engineering  and phishing to find victims that can be tricked into providing credit card or  personally identifying information. Typically, the criminal sends the victim  some kind of notice or leaves a message, requesting that the victim returns a  call to verify an account or some similar ploy. When the victim returns the  call, they are asked to provide account and identifying information under the  guises of "updating" the account.
Once the criminal has access to that information, it is used  for credit card or banking fraud, or as the first step in a stolen identity.  Vishing also allows criminals to spoof caller-id, making a vishing scam hard to  detect because everything appears to be legitimate.
ATM Tampering: Thieves steal credit/debit card numbers by  using a special storage device attached to ATM machines. The device reads the  magnetic strip on your card which thieves use to commit fraud.
Other Common Ways Thieves Steal Your Information
 Dumpster Diving: Thieves will go through your trash looking  for bills, credit cards and other information.
Information retrieval: Thieves desire your hard drive with  personal information on it. Have your hard drive professionally erased before  disposing of it.
Victim research: Thieves access government registers,  internet search engines, and public records to gain pieces of your personal  information.
Shoulder surfing: The thief simply eavesdrops on  transactions you make in public and pick up whatever useful information you  disclose.
Employment scams: These scams advertise a bogus job and  request personal information. Never give out personal identification  information without knowing whom you are dealing with.
Social networking: Thieves regularly troll social networking  sites to steal personal information so they can use to commit fraud.
 Changing Your Address: Thieves divert your billing  statements to another location by completing a change of address form.
Are you a victim?