The New Mexico Identity Theft by Known Imposter Package is designed to assist individuals whose identity has been stolen by someone they know. This comprehensive form package provides essential documents that enable victims to communicate effectively with creditors and other entities to rectify the consequences of identity theft. Unlike other general identity theft packages, this one focuses specifically on cases involving known imposters, ensuring that the communication and actions taken are appropriate to the situation.
This package is beneficial in scenarios such as:
Notarization is not commonly needed for forms in this package. However, if your state’s laws require it, our notarization service, powered by Notarize, allows you to finalize documents online 24/7 without in-person visits.
Our built-in tools help you complete, sign, share, and store your documents in one place.
Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.
Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.
Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.
If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.
We protect your documents and personal data by following strict security and privacy standards.

Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.

Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.

Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.

If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.

We protect your documents and personal data by following strict security and privacy standards.
Report Identity Theft. Report identity (ID) theft to the Federal Trade Commission (FTC) online at IdentityTheft.gov or by phone at 1-877-438-4338.
You can call the Federal Trade Commission (FTC) at 1-877-438-4338 or TDD at 1-866-653-4261, or online at http://www.consumer.ftc.gov/features/feature-0014-identity-theft to report identity theft.
Go to your local police office with: Tell the police someone stole your identity and you need to file a report.
Identity thieves can also obtain your personal information by stealing your wallet or purse. When this occurs, we recommend that you immediately contact credit card companies, bank, and credit bureaus to let them know of your situation.
The FTC cannot resolve individual complaints, but it can provide information about what steps to take. The FTC says that complaints can help it and its law enforcement partners detect patterns of fraud and abuse, which may lead to investigations and stopping unfair business practices.
File a claim with your identity theft insurance, if applicable. Notify companies of your stolen identity. File a report with the FTC. Contact your local police department. Place a fraud alert on your credit reports. Freeze your credit. Sign up for a credit monitoring service, if offered.
The FTC's IdentityTheft.gov can assist attorneys who counsel identity theft victims. The site provides victims with a personal recovery plan, walking through each step to take. It also provides pre-filed letters and forms to send to credit bureaus, businesses, and debt collectors.
You may be able to have your identity theft charges dropped if: You didn't obtain use a person's information unlawfully If you did not obtain or use someone else's personal information unlawfully, you are not guilty of identity theft.
Skimmer devices. Thieves can copy your credit card information using a hand held device called a skimmer. Dumpster diving. Printed documents that state private information should be shredded before being thrown away. Mail theft. Internet. Phishing. Pretext Calling. Shoulder Surfing. Card Verification Value Code Requests.