• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
IdentityTheft.org

IdentityTheft.org

Identity Theft Protection, Statistics & Prevention

  • Protection
    • Cloud Backups
      • Best Cloud Backup Services
      • Backblaze Review and Pricing Plans
      • Carbonite Review and Pricing Plans
      • IDrive Review and Pricing Plans
    • Password Managers
      • Best Password Managers
      • LastPass Review and Pricing Plans
      • 1Password Review and Pricing Plans
      • Password Boss Review and Pricing Plans
      • Dashlane Review and Pricing Plans
      • Keeper Review and Pricing Plans
      • RoboForm Review and Pricing Plans
      • pCloud Review and Pricing Plans
    • Phone Number Lookup
      • Best Reverse Phone Lookup Services
      • RoboKiller Cost and Pricing Plans
    • People Search
      • Best People Search Services
      • Spokeo Cost and Pricing Plans
      • BeenVerified Cost and Pricing Plans
      • PeopleFinders Cost and Pricing Plans
      • DeleteMe Cost and Pricing Plans
    • Parental Control Software
      • Best Parental Control Software
      • Net Nanny Review and Pricing Plans
    • Credit Card Protection
  • Recovery
    • Credit Repair
      • Best Credit Repair Services
      • Credit Saint Review and Pricing Plans
      • Lexington Law Review and Pricing Plans
      • Sky Blue Review and Pricing Plans
      • Ovation Credit Repair Cost and Pricing Plans
      • Credit Repair Hotlines
    • Data Recovery
      • Best Data Recovery Services
      • Disk Drill Review and Pricing Plans
      • Stellar Data Recovery Cost and Pricing
      • EaseUS Review and Pricing Plans
      • Recoverit Review and Pricing
      • Ontrack Data Recovery Cost and Pricing
  • Report Identity Theft

What is Employment Identity Theft and How Can it Occur?

Employment identity theft is when another person uses your social security number to apply for a job under false pretenses. It’s often difficult to detect because there isn’t an immediate impact on the victim, so it can be hard for them to figure out what happened and who did it. Most people, only realize that something was wrong once the application failed, and then they start unraveling evidence that may point back at their perpetrator. In this article, we will discuss the signs of employment identity theft and what you can do to stay or get in the clear.

What is Employment Identity Theft?

Employment identity theft occurs when someone uses your personal information, such as your name, SSN, or date of birth, without your knowledge or consent in order to gain employment. This can happen if an employee fails to report the theft of the identifying information that had been provided during the hiring process.

This is a serious problem in today’s society. In fact, there are some who argue that it is the most prevalent form of identity theft. There are many different scenarios where an individual may be at risk for this type of infraction. For example, a job interviewee could be using false data in order to pass their test and get hired into a position they’re not qualified for. Someone could also use false information in order to steal from you or commit other crimes by pretending to be you. There are many ways that this type of identity theft takes place and so it is crucial to protect yourself from these situations if you want to avoid becoming one of the statistics.

How it Happens

Employment identity theft happens when someone uses your personal information, such as your name, SSN, or date of birth, without your knowledge or consent in order to gain employment. This can happen if an employee fails to report the theft of the identifying information that had been provided during the hiring process. Here are a few scenarios that may indicate employment identity theft:

Limited-Term Offers

One scenario where someone may be at risk for this type of infraction is when an individual has a limited-term job offer. For example, a business may offer temporary work for a certain amount of time. If this individual does not report their identity theft within the allotted time frame, then they are guilty of employment identity theft.

Inaccurate Credentials

Another one is when an employer hires someone who has false or inaccurate credentials on their resume from their previous employers. This could also be considered employment identity theft if it is discovered later on in the process that these credentials are false or inaccurate.

Co-Workers

Without getting too cynical, the reality is that it’s much more likely that one of your colleagues at work could go through your personnel file to use it for personal gain than someone snooping around in a dumpster or the Dark Web. In fact, you’re more likely to be victimized by an employee who has access to confidential information about yourself and others due to the position he/she occupies.

Useful Tips for Prevention

Always Guard Your SSN

To keep your SSN safe, it is important to use a secure password manager that encrypts the information you store in it. Password managers are best at keeping sensitive documents such as your passport or financial documents like your SSN safe and making sure they aren’t accidentally revealed during an interview process or background check. Job seekers should also know that they can skip giving their Social Security Number (SSN) before applying for employment, waiting until after the job has been offered when instead an employer will collect this number on a separate “background check authorization form” rather than from any part of their application paperwork.

Confirm E-Verification

E-Verify is a web-based system that both employers and employees can use to verify employment eligibility. Employees are able to do their own checks for free, while employers can screen all prospective hires using E-Verify in order to ensure they have proper documentation prior to hiring them.

Verify Online Job Applications

Many job applicants complete online forms and often enter information like their Social Security Number or driver’s license number. Unfortunately, not all companies use a secure site to host these application forms and they can be easily hacked by scam artists looking for potentially lucrative data. In order to ensure your application form is protected from identity thieves, you should use VPNs with password managers that help boost your online security.

Primary Sidebar

Copyright National Council on Identity Theft Protection© 2023

Identitytheft.org is a privately owned website and is not owned or operated by any state or government agency. The government operated website can be found at Identitytheft.gov. We may receive a payment, commission, or affiliate compensation in connection with any purchase you make of products or services featured on our site. These commissions help us to operate Identitytheft.org.

  • About Us
  • Digital Safety Tools
  • Research
  • Privacy Policy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT