ID Sanctuary


Summary

Thieves want to steal your identity. Don’t let them get away with it! ID Sanctuary combines the power of FraudScout® credit & fraud monitoring and LifeStages® identity management services. With ID Sanctuary, you can rely on immediate, personalized attention from a fraud specialist whenever you need it. Fraud specialists are armed with the knowledge to help reduce the risk of identity theft and provide unlimited restoration assistance should you fall victim—giving you emotional support and peace of mind.   

ID Sanctuary™

Thieves want to steal your identity. Don’t let them get away with it! ID Sanctuary combines the power of FraudScout® credit & fraud monitoring and LifeStages® identity management services. With ID Sanctuary, you can rely on immediate, personalized attention from a fraud specialist whenever you need it. Fraud specialists are armed with the knowledge to help reduce the risk of identity theft and provide unlimited restoration assistance should you fall victim—giving you emotional support and peace of mind.   

  • Unlimited 24/7 restoration assistance whenever your identity has been               compromised
  • Step-by-step guidance through the identity restoration process if you become a victim of identity theft or fraud
  • Document replacement assistance when identification documents such as Social Security cards, birth certificates, passports and driver’s licenses are lost, stolen or destroyed
  • Credit inquiry activity alerts
  • One bureau credit report, credit score and monitoring
  • Access to an online educational resource with new articles, information, tips and best practices to protect against identity theft

FAQ

Q. What is identity theft?
ID theft is the misuse of an individual’s personally identifiable information (PII). In true identity theft, an identity thief fraudulently uses another person’s PII (name, Social Security number, date of birth, address, etc.) to obtain goods, services and/or employment, open new accounts for financial gain, or hide a real identity. Victims may not know about the fraud for a long time, which can allow the criminal to continue the ruse for months or even years.  In recent years, the PII definition has expanded to include other personal information such a mother’s maiden name, pet names and other information which can often be a key to uncovering other PII or enabling a bad actor to gain access to otherwise protected information.

Q. How do identity thieves get to my information?
Some of the most common methods include:

  • Dumpster diving for credit card statements, loan applications, and other documents containing names, addresses, account information, and SSNs
  • Stealing mail from unlocked boxes
  • Impersonating a loan officer, employer or landlord to obtain access to credit files
  • Taking advantage of “insider” access to names, addresses, birth dates, and SSN
  • Shoulder surfing when people are using laptops in public places or watching ATM transactions and public phones to capture PINs
  • Hacking into an organization’s database to steal sensitive information

Q. What do criminals do with my identification information?
Some examples of the many ways criminals use stolen identity information are to:

    Obtain credit fraudulently from banks and retailers
    Steal money from victim’s existing accounts
    Apply for loans
    Establish accounts with utility companies
    Rent an apartment
    Obtain a job
    Receive medical care

Q. How does ID Sanctuary monitor my identity?
ID Sanctuary detects potential fraud by monitoring a full-range of credit and non-credit information including:

  •     Public records
  •     Change of Address
  •     Court records
  •     Single bureau credit report and score
  •     Cyber internet surveillance – chat rooms and websites are monitored for your PII     (name, SSN, email, phone number, credit/debit cards)
  •     Social media channels

Q. How does ID Sanctuary resolve identity theft when it occurs?
As a member, you can call the toll-free number on the back of your membership card for 24/7 assistance. A fraud investigator from CyberScout will lead the restoration process and help you every step of the way. You will receive a personalized review and a customized, appropriate course of action. Once fraud has been resolved, your fraud specialist will conduct a six-month follow-up to ensure no other issues have occurred and to answer any additional questions.

Q. How is a credit score different from a credit report?
Your credit score is a numerical representation of the history of credit use found in your credit report. Your credit report lists the details of your credit history, which can include creditor names, addresses, loan amounts, credit limits, payments made on time or past due, and amount of monthly payments. The ID Sanctuary free credit report is provided by TransUnion.

Q. How does monitoring protect me from identity theft?
Credit report monitoring does not prevent identity theft. However, it can alert you to activity that may indicate identity theft is being attempted or has taken place. If you learn someone used your data to apply for credit, ID Sanctuary can help you take steps to prevent future misuse of your data.

Q. Is a Power Of Attorney required for resolution services?
No. Resolution experts will lead the resolution process and help you every step of the way. You will receive a personalized review and a customized, appropriate course of action. However, you may submit a LPOA if you prefer CyberScout to work completely on your behalf.

Disclosures

ID Sanctuary is NOT insurance and has a no-risk 30-day money-back guarantee. ID Sanctuary is powered by CyberScout. Since 2003, we have been leading the charge against hackers, thieves and even simple human error by providing solutions that deliver prevention education, proactive protection services and swift remediation for millions of households. Our long-term commitment is to be a leader in the personal security industry by deploying new technologies and practices to ensure clients and their customers have the latest tools to protect the privacy and security of their most valuable assets.