Identity & Personal Info
Scams involving your personal information
Start here when the main concern is what a scammer has: your email, phone, address, password, verification code, card number, bank details, Social Security number, or ID.
Start with what they got
The right next step depends on what was shared. A scammer having your phone number is not the same as having a password, one-time code, bank details, Social Security number, or photo of your ID.
Published identity page
This is the live personal-information page available now.
Different information creates different risk
- Email, phone number, or address: watch for follow-up messages and account impersonation attempts.
- Password or verification code: change the affected password and check sign-ins, recovery settings, and connected apps.
- Card, bank, or payment information: contact the bank, card issuer, or payment provider connected to the account.
- SSN, ID image, or sensitive personal record: consider identity theft steps and official recovery resources.
How the scam started can still matter
If the information was entered through a suspicious email or login page, compare phishing scams. If it came from a text message, compare smishing scams.
If a fake support caller asked for passwords, codes, remote access, or bank details, compare tech support scams.
Common questions
Is all exposed information equally serious?
No. A phone number is different from a password, verification code, bank login, Social Security number, or ID image.
What should I save before taking action?
Save messages, links, screenshots, account alerts, phone numbers, email addresses, payment details, and a note of exactly what was shared.
When does this become identity theft?
Identity theft becomes a concern when personal information is used or could be used to open accounts, access money, file claims, impersonate you, or misuse your identity.