The Louisiana Identity Theft by Known Imposter Package is designed to assist individuals whose identity has been stolen by someone they know. This comprehensive package provides essential forms and guidance to help victims effectively communicate with creditors and resolve the complexities arising from identity theft. Unlike other identity theft packages, this one is specifically tailored for situations involving known imposters, making it particularly useful for victims who have a clear understanding of the person responsible for the fraud.
This form package is useful in scenarios such as:
Some forms in this package need notarization to be legally binding. Our online notarization service, powered by Notarize, lets you verify and sign documents remotely through an encrypted video session, available 24/7.
Our built-in tools help you complete, sign, share, and store your documents in one place.
Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.
Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.
Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.
If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.
We protect your documents and personal data by following strict security and privacy standards.

Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.

Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.

Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.

If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.

We protect your documents and personal data by following strict security and privacy standards.
Skimmer devices. Thieves can copy your credit card information using a hand held device called a skimmer. Dumpster diving. Printed documents that state private information should be shredded before being thrown away. Mail theft. Internet. Phishing. Pretext Calling. Shoulder Surfing. Card Verification Value Code Requests.
You may be able to have your identity theft charges dropped if: You didn't obtain use a person's information unlawfully If you did not obtain or use someone else's personal information unlawfully, you are not guilty of identity theft.
Aggravated identity theft is punishable by a mandatory minimum sentence of imprisonment for two years or by imprisonment for five years if it relates to a terrorism offense. At least thus far, the government has rarely prosecuted the five-year terrorism form of the offense.
Check your credit card statements and bank account. If you notice any suspicious activity, alert your bank or credit union right away. Run a credit report. U.S. citizens are entitled to a free one every 12 months. Monitor your finances closely.
Report Identity Theft. Report identity (ID) theft to the Federal Trade Commission (FTC) online at IdentityTheft.gov or by phone at 1-877-438-4338.
Identity thieves can also obtain your personal information by stealing your wallet or purse. When this occurs, we recommend that you immediately contact credit card companies, bank, and credit bureaus to let them know of your situation.
Go to your local police office with: Tell the police someone stole your identity and you need to file a report.
A thief can get your personal information in person or online.steal your mail or garbage to get your account numbers or your Social Security number. trick you into sending personal information in an email. steal your account numbers from a business or medical office.
The identified categories are: Physical Theft: examples of this would be dumpster diving, mail theft, skimming, change of address, reshipping, government records, identity consolidation. Technology-Based: examples of this are phishing, pharming, DNS Cache Poisoning, wardriving, spyware, malware and viruses.