Case Study
Identity Protection Guide
SECURITY GUIDE The McAfee Safety Series Identity Protection GuideTable of Contents There’s no one else like you. Let’s help keep it that way.. . . . . . . . . . . 3 Section One—Get to know your identity . . . . . . . . . . . . . . . . . . . . . 5 What is identity fraud and identity theft? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 5 How does identity fraud and theft happen? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 6 How do thieves get ahold of personal information? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 7 What are some of the signs your identity is being used by someone else? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 8 Section Two—Ident