What is Child Identity Theft and How Can You Protect Them

  • By David Lukic
  • Published: Oct 26, 2020
  • Last Updated: Mar 18, 2022

child identity theft

Criminals are very clever and continually devising new ways to steal from you. One very disturbing method is child identity theft. Identity thieves use it to open up bank accounts and apply for lines of credit. By the time your child reaches adulthood, and they apply for student loans, they find out their credit is ruined, and they can’t get financing, all because of identity theft.

Thieves can use your child’s social security number to apply for driver’s licenses, rent apartments, sign up for public utilities, open bank or credit card accounts, and even apply for government benefits. The list is endless once they have successfully stolen his or her identity. 

How Can Child Identity Theft Occur?

When you enroll your child in school, you need to fill out mountains of paperwork, and included in the mix is your child’s social security number, along with tons of other personal information. Sometimes, when you take your newborn to the physician, they request his or her social security number. Other government offices may also ask you for this identity information. Whenever your child’s data is stored, it can be stolen or breached, as evidenced by the OPM data breach where millions of people’s private information (from background checks) was stolen and sold on the dark web. 

How to Check for Child Identity Theft

Some things to look for that might indicate your child’s information was stolen and being used by someone else is:

  • You are turned down for financing or government benefits using your child’s social security number because they are being sent elsewhere. 
  • The IRS informs you that your child did not pay income taxes, but their social security number was used on another tax return.
  • You receive collection calls for unpaid bills you never authorized.

freeze child's credit

How to Protect Your Child From Identity Theft

Periodically get a copy of your child’s credit report. Even better, sign up for credit monitoring with a reputable company like IDStrong.com. freeze child's credit account until they enter adulthood so no one can open up lines of credit in their name.

  • Protect their social security number while they are children. Don’t carry their social security card with you; keep it safe at home. 
  • Do not share their social security number with anyone if you don’t have to.
  • Ask schools and medical facilities to provide you with information about how your child’s data will be used, stored, and discarded after use.
  • Store your child’s important papers (birth certificate, social security card, etc.) in a locked safe or safe deposit box.
  • Shred all documents that contain personal information if you no longer need them.
  • If you hear about a data breach where your child’s information might have been at risk, take quick action.
  • The Federal Family Educational Rights and Privacy Act  (FERPA) allows you to opt-out of sharing personal information with schools and other agencies until your child is an adult. 
  • Review all the paperwork that comes home from school and whenever possible, opt-out of sharing personal details. 
  • Ask your child’s school about the directory information policy. Many schools issue a directory, which could include your child’s name, address, date of birth, telephone number, email address, and photo. You have the right to refuse the use of their information in this directory. 

What To Do If a Child Identity is Stolen

If your child’s information is stolen and used for identity theft, you may have a mess on your hands. However, you can address child identity theft by following the steps below:

Contact each merchant, credit card company, bank, etc. and explain the situation. Use a copy of your child’s birth certificate to prove they are minor and could not have opened the accounts. Ask each merchant to close all accounts. Request that they confirm your child is not liable in writing. 

Contact each of the three major credit bureaus to report the identity theft and freeze child's credit on their account until they reach the age of 18. Request that all previous activity be removed and designated as fraud, so your child’s future credit is not affected.

If your child’s school was involved in a data breach, you can report the incident here: U.S. Department of Education. Contact the Family Policy Compliance Office.

Report the identity theft to the FTC online at IdentityTheft.gov or call 877-ID-THEFT.
About the Author
IDStrong Logo

Related Articles

What is Mail Theft and How to Prevent It in 3 Simple Steps

One of the many ways that identity thieves get their hands on your personal information is through ... Read More

Credit Card Fraud: What Is It and How To Protect Yourself Against It

Credit card fraud is a fact of life, and most Americans have experienced it or know someone who ha ... Read More

Lost or Stolen Phone? Don’t Panic, Follow These Steps

Most of us are tethered to our smartphones like a lifeline. In these tiny little computers, we car ... Read More

Stolen or Lost Wallet: What to Do?

Anyone who has ever lost their wallet or purse, or had it stolen, knows that instant spark of pani ... Read More

7 Most Common Types of Identity Theft That Can Happen to You

Identity theft is a major concern for many Americans these days with data breaches, ransomware att ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close