Protect your Identity with the leader in Identity Theft Protection

Complete Credit & Identity Protection 24/7. Protection you can’t afford to pass up.

Identity Theft Insurance

IdentityIQ will offer up to $1 million in identity theft insurance for the primary member and provide you with financial peace of mind, making you an informed and proactive consumer with a team of experts to support you.4 If you have out of pocket costs due to ID theft, you’re covered with up to $1 million in identity theft insurance.

  • Lost wages
  • Legal experts
  • Stolen funds reimbursement

Identity Restoration

When you see signs of identity theft, we are the experts who will be there when you need us most. If your identity is stolen, we are here to personally help you restore your identity. You will receive a dedicated case manager that is based in the United States. Your case manager will help you put together a plan of action and be with you every step of the way.

Credit Reporting & Score Delivery

Whether you are looking for a 1-bureau credit report or a complete view of your credit report profile from each of the 3 credit bureaus (Experian, TransUnion, and Equifax), our products are designed to meet your needs.

Suspicious changes in your credit report are one of the first indications that your information may have been compromised. Take a look at your credit report and verify all of your information. We believe checking your report regularly is so important that you have access to 12 reports per year (on select plans), which is something our competition does not offer.

Credit Monitoring

Daily credit monitoring offers insight when changes are made to your credit report profile. When your report is delivered, check it thoroughly for inaccuracies and a team of U.S.-based customer service professionals will assist you with your questions if anything looks suspicious. Regular credit checks combined with the power of credit monitoring empowers you to see changes and act quickly if something unexpected happens.

Enhanced Credit Monitoring in Real-Time

Enhanced credit monitoring effectively monitors your credit on a whole new level. With this benefit, you are alerted to changes when authorized users are added to your credit cards or when your TransUnion score changes by 10+ points. This feature puts you in the driver seat and enables you to see changes and take action if something doesn’t seem right. We want to give you the best, so we’ve gone above and beyond what others in the market offer and included this feature in select products.

Dark Web Monitoring

Dark web monitoring, also known as internet or cyber monitoring, aids in identity theft prevention by keeping an eye out by scanning the dark web for information related to your identity. Through our global search, we scour the dark web for your SSN, name, mailing address, and other information you designate in over 25 languages. If we find anything suspicious, we notify you immediately.

IdentityIQ vs LifeLock

When comparing similar-priced plans, IdentityIQ benefits go beyond with our tools and features.

So What is Identity Theft?

Identity theft is the illegal use of someone else’s personal identifiable information (PII) with the intent to commit fraud or gain financial benefits in their name. If your identity or the identity of your child has been stolen, identity thieves may open new credit accounts, file fake tax returns, buy or rent property, or take out loans that wreak havoc on your financial health and credit score.

What is PII?

Personally Identifiable Information (PII) is any personal information about a person that is maintained by an agency. PII can include your name, place of birth, SSN, mother’s maiden name, biometric records, educational history, employment history, and more.

It’s important to understand that identity theft can happen to anyone at any time. What we call your identity is the total collection of your PII. This is the information thieves use when you experience a stolen identity. When they gain access to this information, they have the ability to, in essence, become you. If any of this information is stolen, we consider this a personal breach of your identity.

What could an identity thief do with your PII?

One of the first questions a victim of identity theft asks themselves is, “Why would someone want my identity?” For an identity thief, opening credit cards in your name, making fraudulent purchases, or using your personal information when being questioned by the police are just a part of a long list of what they are able to do with your stolen identity. They might:

  • Use your identity to file a fraudulent tax return
  • Open new credit cards in your name
  • Make fraudulent purchases
  • Log in to personal accounts (email, social media, bank, etc…)
  • Open new phone and utility accounts in your name
  • Clone your ATM or debit card
  • Change your billing address
  • Obtain a new driver’s license or official ID
  • Use your identity when questioned by police


It’s important to understand that identity theft can happen to anyone at any time. Your identity is built on multiple layers that include more than just your social security number. What we call your identity is the total collection of your personally identifiable information (PII). When they gain access to this information, they have the ability to, in essence, become you. If any of this information is stolen, we consider this a personal breach of your identity.

How quickly does an identity thief start to use your personal information?

One study* by the FTC showed that criminals acted on stolen information within 9 minutes of getting the data. It is important to understand how identity theft can happen and act quickly when it does.

*Source: Federal Trade Commission

Is Your Personal Information Vulnerable to Identity Theft and Fraud?

What’s the one thing we ask when we see a magician make something disappear? How did they do that? When you are watching a performer, you’re left confused by the sleight of hand, but in the end, it is fun and entertaining. The fun stops when the magician is an identity thief and we notice things in our life are disappearing. It may seem like magic when someone else mysteriously accesses your personally identifiable information, but knowing how identity theft happens removes the magic and puts the control back in your hands. So, how do thieves steal an identity? Here are a few of the most common ways identity theft happens:

Think about all the times you’ve been on the go, reading emails while in line at the coffee shop, or checking your bank account while waiting at the doctor’s office. Unless you were logged into a private Wi-Fi network that requires a password, any data transmitted during your online session could be vulnerable to eavesdropping by strangers using the same network.

Thieves rummage through trash looking for receipts, credit card bills, utility bills, medical insurance, bank statements, and other items with your personal information on them. When they find enough information, they have the basis for what they need to build a basic profile of the identity they want to steal. One easy step you can take today to protect yourself against a dumpster diving thief is to shred anything with your personal information on it using a cross-cut paper shredder.

Have you ever received a call and been asked to verify your security information? It may sound something like, *Mrs. Smith, I have important information about your account, but before I can tell you I will need to verify your address and date of birth.” This is a technique used by thieves to gather the personal information they need to infiltrate your identity. Unfortunately, thieves using this technique have just enough information about you to make you feel secure and lead you to believe the information they have is truly valuable.

The best thing to do in this kind of situation is to ask what company the representative is calling from, hang up, and then call the number listed on your bill or the company website. A situation like this is never fun and leaves victims feeling vulnerable and taken advantage of.



Credit and debit card fraud is awful. Too many of us have received a call from the bank informing us a purchase has been made that we were not aware of. We experience an immediate feeling of violation and are flooded with questions about how someone got our account information.

A popular method among thieves is to get your credit card info with a card skimmer. This type of theft occurs when a thief installs a device onto an ATM or credit card reader to read your credit card information. The device can read your card number and pin, allowing the thief to have full access to your account. Other ways thieves get your information include hacking, data breaches, and unsecure websites.

Whichever method the thief uses, once a criminal has your credit or debit card, they can use it within minutes to steal from you. If the incident isn’t flagged by the bank, you may not know what happened until the next time you see your statement.

From banks to health care institutions, our information is being stored electronically. As our information is distributed and stored digitally, it becomes vulnerable to computer savvy thieves. Hackers have become proficient in hacking into some of the most secure institutions and gaining access to our personal information. Data breaches are becoming commonplace and the consumer has little power to prevent their information from being abused.

Malware is an umbrella term used to describe any malicious software designed to harm, exploit, or extract sensitive data from a system, device, or network. Cybercriminals use malicious software to access sensitive information they can use for financial gain. Stolen data can include anything from your payment details, to your medical records, passwords, and more.

This computer scheme is one of the most common types of identity theft. Phishing asks you to enter personal information like your credit card, account information, or social security number. They claim this information is to verify a purchase or to warn you about a security-related event.

Like pretexting, phishing convinces you to reveal personal information that allows a thief to steal from you. Virus and malware programs are great but are never foolproof. So, what do you do? If something like this were to happen, actively monitoring for changes and abuse is the best way to stay protected.

here is an opportunity for this type of theft anytime you enter your pin or account information at a public location. Without any technology involved, a thief invades your space and watches you enter your pin. This happens at ATM and payment machines and is a crime of opportunity. Always be aware of your surroundings and if someone is standing too close.

As technology advances, we all become more willing to place our payment information online. Unfortunately, not every website is secure and encrypted. This opens up the opportunity for a thief to intercept your personal information once submitted. Always ensure that any site you place your personal information shows proof of encryption with the https identifier in the website address.

Ready to get protected?

Start your membership today