Skip to content

Identity & Personal Info

Scams involving your personal information

Start here when the main concern is what a scammer has: your email, phone, address, password, verification code, card number, bank details, Social Security number, or ID.

Start with what they got

The right next step depends on what was shared. A scammer having your phone number is not the same as having a password, one-time code, bank details, Social Security number, or photo of your ID.

Different information creates different risk

  • Email, phone number, or address: watch for follow-up messages and account impersonation attempts.
  • Password or verification code: change the affected password and check sign-ins, recovery settings, and connected apps.
  • Card, bank, or payment information: contact the bank, card issuer, or payment provider connected to the account.
  • SSN, ID image, or sensitive personal record: consider identity theft steps and official recovery resources.

How the scam started can still matter

If the information was entered through a suspicious email or login page, compare phishing scams. If it came from a text message, compare smishing scams.

If a fake support caller asked for passwords, codes, remote access, or bank details, compare tech support scams.

Common questions

Is all exposed information equally serious?

No. A phone number is different from a password, verification code, bank login, Social Security number, or ID image.

What should I save before taking action?

Save messages, links, screenshots, account alerts, phone numbers, email addresses, payment details, and a note of exactly what was shared.

When does this become identity theft?

Identity theft becomes a concern when personal information is used or could be used to open accounts, access money, file claims, impersonate you, or misuse your identity.