The Wisconsin Identity Theft Recovery Package is a comprehensive set of legal forms designed for victims of identity theft in Wisconsin. This package empowers individuals to take action against identity theft by providing the necessary documents to communicate effectively with creditors and government agencies. Unlike other packages, this one focuses specifically on the unique legal requirements and protections offered in Wisconsin, ensuring that your recovery process is as efficient as possible.
You should use this form package if you have experienced identity theft in Wisconsin and need to address fraudulent activities. This may include:
Notarization is not commonly needed for forms in this package. However, if your state’s laws require it, our notarization service, powered by Notarize, allows you to finalize documents online 24/7 without in-person visits.
Our built-in tools help you complete, sign, share, and store your documents in one place.
Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.
Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.
Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.
If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.
We protect your documents and personal data by following strict security and privacy standards.

Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.

Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.

Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.

If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.

We protect your documents and personal data by following strict security and privacy standards.
The four types of identity theft include medical, criminal, financial and child identity theft.
Financial Identity Theft. Financial identity theft is by far the most common type of identity theft. Medical Identity Theft. Criminal Identity Theft. Child Identity Theft. Identity Cloning & Concealment. Synthetic Identity Theft. Mitigate Your Risk.
Account Takeover Fraud. Debit Card Fraud or Credit Card Fraud. Driver's License Identity Theft. Mail Identity Theft. Online Shopping Fraud. Social Security Number Identity Theft. Senior Identity Theft and Scams. Child Identity Theft.
Step 1: Call the companies where you know fraud occurred. Call the fraud department. Step 2: Place a fraud alert and get your credit reports. Place a free, one-year fraud alert by contacting one of the three credit bureaus. Step 3: Report identity theft to the FTC.
Skimmer devices. Thieves can copy your credit card information using a hand held device called a skimmer. Dumpster diving. Printed documents that state private information should be shredded before being thrown away. Mail theft. Internet. Phishing. Pretext Calling. Shoulder Surfing. Card Verification Value Code Requests.
Identity thieves can also obtain your personal information by stealing your wallet or purse. When this occurs, we recommend that you immediately contact credit card companies, bank, and credit bureaus to let them know of your situation.
Notify affected creditors or banks. Put a fraud alert on your credit report. Check your credit reports. Freeze your credit. Report the identity theft to the FTC. Go to the police. Remove fraudulent info from your credit report.
69 percent reported feelings of fear related to personal financial safety. 60 percent reported anxiety. 42 percent reported fearing for the financial security of family members. 8 percent reported feeling suicidal.
Skimmer devices. Thieves can copy your credit card information using a hand held device called a skimmer. Dumpster diving. Printed documents that state private information should be shredded before being thrown away. Mail theft. Internet. Phishing. Pretext Calling. Shoulder Surfing. Card Verification Value Code Requests.