Call For Case Review 937-435-4000

Identity Theft (FCRA – Ohio Law)

Victimized by Identity Theft?

JAMISON LAW Offers Answers to your Identity Theft Legal Questions. Contact JAMISON LAW today for a Case Review: (937) 435-4000.

In the 1990s, identity theft became all too commonplace, and the number of victims plagued by this personal nightmare has increased exponentially ever since. In 2007, more than eight million people were victimized. According to the Federal Trade Commission, identity theft was again the top consumer complaint in 2011 for the 11th consecutive year. Two out of every ten complaints were attributable to this epidemic. The problem is not getting better.
It is estimated that identity theft claims a new victim every six seconds. Identity theft is far more than mere inconvenience, victims of this epidemic feel as if their lives have been hijacked. If you believe you have been a victim of identity theft, contact JAMISON LAW to schedule a case review regarding your legal rights, and assistance on restoring the sanctity of your good name.

All too often, identity thieves are “friends” or family members. JAMISON LAW is well-versed in handling these cases with sensitivity and compassion. Attorney Mandy Jamison understands the financial and emotional ramifications identity theft inflicts upon its victim.

Signs of Identity Theft

You may be an identity theft victim if you have experienced any of the following problems:

  • Unknown credit accounts are appearing on your credit report.
  • You are receiving mail or pre-approved credit offers with someone else’s name.
  • Companies you have not done business with or applied to for credit have inquiries appearing on your credit report.
  • Debt collectors have started sending you collection notices for accounts you do not have.
  • Your credit report lists an alias name or address that you have never used.

If you have questions regarding obtaining, reading, or understanding your credit report, you may contact JAMISON LAW for a case review.

You cannot be certain if you have been a victim of identity theft until you have received all the relevant documents. You may also be victimized due to failures of creditors and/or credit bureaus to maintain accurate information about you. Creditors and credit bureaus frequently mix and merge the information of consumers, resulting in inaccurate information belonging to someone else appearing on your credit report.

Identity Theft Can Hurt You

Identity thieves can open credit cards in your name and run up substantial charges, destroying your credit rating and making future purchases impossible. Insurance companies use lower credit scores to justify higher rates, or even deny insurance. You may even be denied employment or terminated from your job because of false information on your credit report. You may also suffer harassment by debt collectors.

The average identity theft victim spends between many hours addressing their problems arising from identity theft.

Steps to Fight Back Against Identity Theft

  • Under federal law, you may be entitled to money damages for the failure of creditors and/or credit bureaus to remove inaccurate information from your credit report based upon identity theft. To schedule a case review, contact Attorney Jamison.
  • You may also place a fraud block on your credit file. This will notify all potential creditors that someone has stolen your identity, and warn them not to extend credit without proof that the applicant is really you.

Possible Online Threats to Your Identity

  • Phishing: This happens when you get an e-mail that appears to be from your bank or a known online business, often PayPal or eBay, instructing you to click on a link and provide information to verify your account.
  • Spoofing or Pharming: This happens when you access a legitimate Web site that has been compromised by hackers who have redirected the site’s traffic to a fraudulent site where they instruct you to provide confidential information.
  • Smishing: This happens when identity thieves send you a text message on your cell phone, instructing you to visit a fraudulent Web site.
  • Spyware: This happens when you unknowingly download software when you open an attachment, click a pop-up window, or download a game or music online. Criminals can use spyware to record the keystrokes on your computer, and obtain credit card numbers, bank-account information, and passwords when you make purchases or conduct other online business. They can also hack into your computer’s hard drive.

Other Threats to Your Identity

  • Vishing (voice phishing): This happens when identity thieves leave you a voice mail asking you to call your bank or credit card company at a number they provide. When you call the number, you are asked to key in your account number, PIN or other personal information.
  • Bank-card skimming: This happens when identity thieves use a combination of a fake ATM slot and cameras to record your account information and PIN when you use an ATM machine. Your credit or debit card also can be skimmed by a dishonest store or restaurant worker armed with a portable card reader.
  • Mail/Trash: Identity thieves will steal your wallet or go through your mail or trash to obtain your personal information.

Protect Your Children

As a mother herself, Attorney Jamison encourages parents to help safeguard and protect their children from identity theft. Children account for about 5% of reported identity theft cases. The fraud often goes undetected for years. Only after the child reaches adulthood and applies for credit does the nightmare typically begin.

Tips to Protect Yourself & Safeguard Your Computer

  • Keep your confidential information secure. Never give out your bank or credit card information over the phone or Internet. Your bank or credit card company won’t call or e-mail to ask for your account information. They already have it.
  • Keep an inventory of everything in your wallet and your PDA, including account numbers. Don’t keep your Social Security card in your wallet, and don’t share your Social Security number unless absolutely necessary.
  • If you conduct business online, use your own personal computer. A public computer is less secure, as is wireless Internet.
  • Don’t provide your credit card number online unless you are making a purchase from a Web site you trust. Reputable sites will always direct you to a secure page with an URL starting with “https://” whenever you actually make purchases or are asked to provide confidential information.
  • Stop getting banking and credit card statements by mail. Most financial institutions and credit card companies offer “paperless” banking at no cost to you.
  • Install anti-virus, anti-spyware and firewall protection, and keep them updated.
  • Monitor your bank and credit card transactions for unauthorized use.
  • Look for suspicious devices and don’t let anyone stand near you when you use an ATM. Take your card and receipt with you. Do not write down PIN numbers. Commit them to memory.
  • Never open e-mails from strangers. Harmful information can be hidden in embedded attachments and graphics files.
  • Never open attachments unless you know who sent them and what they contain.
  • Don’t click on pop-ups. Configure Windows or your Web browser to block them.
  • Use passwords with at least six characters, using a combination of letters and numbers and no reference to your name or other personal information. Use a different password for every site that requires one, and change passwords often.
  • Never send a user name, password or other confidential information via e-mail.
  • Turn off your computer when you’re not using it, or at least put it in standby mode.
  • Don’t save passwords, tax returns, or other financial information on your hard drive.

Steps to Take If You are a Victim of Identity Theft

  • Contact your local police department and make an identity theft report. Be sure to keep a copy for yourself.
  • File a complaint with the Federal Trade Commission and contact the Ohio Attorney General. Be sure to keep a copy of all documentation.
  • Close any accounts that have been compromised. Send a letter to the company by certified mail, return receipt requested. Request written confirmation that the disputed charges have been removed. Document your communications and keep copies of all written correspondence.
  • Place a fraud alert on your credit reports.
  • Dispute the fraudulent information on your credit report.
  • Contact an attorney to preserve your legal rights.
Share This Page:

Firm News

January 22, 2018 Thank You for Ranking us in the Top Three Consumer Protection Attorneys in Dayton,Ohio!
We, here at JAMISON LAW, LLC, would like to say thank you to Three Best Rated for selecting our office as one of the...
December 7, 2017 The Equifax Breach Aftermath …
As you probably recall, on September 7, 2017, Equifax announced that it had suffered one of the largest security...
November 22, 2017 Happy Thanksgiving!
We at JAMISON LAW, LLC are thankful for another great year of assisting people to protect their legal rights against...
Quick Contact Form - Tab
Captcha Image