Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse have documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers.[38] Poor corporate diligence standards which can result in data breaches include:
Both a Medical Power of Attorney and a Living Will act in the same way in that both cater towards a person’s medical wishes. A Living Will specifically handles end-of-life health care situations whereas a medical power of attorney covers a broad range of healthcare decisions and only goes into effect when a person becomes incapacitated (unable to think for themselves).
Credit Reporting Agencies - Contact one of the three major credit reporting agencies to place fraud alerts or freezes on your accounts. Also get copies of your credit reports, to be sure that no one has already tried to get unauthorized credit accounts with your personal information. Confirm that the credit reporting agency will alert the other two credit reporting agencies.
Seek legal counsel in the creation of a will. A will can be effective in an estate transfer and other legal proceedings after death, but there are drawbacks of which you should be aware. Your estate will become part of the public record, for example, and anything left by a will must go through probate court. Also, probate attorneys can be expensive and cannot be avoided, except in California and Wisconsin.
While identity theft can happen to anyone, there are some things you can do to reduce your risk. If you think someone is using your personal information to open accounts, file taxes, or make purchases, visit IdentityTheft.gov to report and recover from identity theft. Looking for identity theft resources to share in your community? Visit ftc.gov/idtheft.
As for the future of medical care and Medicaid, people are mostly concerned about cloud computing. The addition of using cloud information within United States medicare system would institute easily accessible health information for individuals, but that also makes it easier for identity theft. Currently, new technology is being produced to help encrypt and protect files, which will create a smooth transition to cloud technology in the healthcare system.[75]

Not only are children in general big targets of identity theft but children who are in foster care are even bigger targets. This is because they are most likely moved around quite frequently and their SSN is being shared with multiple people and agencies. Foster children are even more victims of identity theft within their own family and other relatives. Young people in foster care who are victims of this crime are usually left alone to struggle and figure out how to fix their newly formed bad credit.[21]
The Texas Power of Attorney Act, which is contained in Chapter 7 of the Texas Probate Code,[1] allows a resident to transfer financial and health care decision-making powers to another individual. Powers of attorney are very useful for anyone to have in place, no matter what one's age might be. The reality is that events can occur suddenly that make an individual unable to make certain decisions on their own. A power of attorney allows another person, who has been chosen in advance by the individual, to make those decisions for them.
A power of attorney is a document that lets you name someone to make decisions on your behalf. This appointment can take effect immediately if you become unable to make those decisions on your own. For example, if you become mentally incapacitated, or leave the country for a period of time, you would be unable to make these important choices for yourself.

Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained, and identity theft is not always detectable by the individual victims, according to a report done for the FTC.[6] Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft".[7] The report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known", but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%".[8] More recently,[when?] an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.[citation needed]


The equal dignity rule is a principle of law that requires an authorization for someone performing certain acts for another person to have been appointed with the same formality as required for the act the representative is going to perform. This means, for example, that if a principal authorizes someone to sell the principal's house or other real property, and the law requires a contract for the sale of real property to be in writing (which is required under the Statute of Frauds in most U.S. jurisdictions), then the authorization for the other person to sign the sales contract and deed must be in writing too. Likewise, in common-law jurisdictions other than the U.S., a power of an attorney to execute a deed (i.e. instrument under seal or executed in presence of two witnesses) must be itself executed as a deed.

While identity theft can happen to anyone, there are some things you can do to reduce your risk. If you think someone is using your personal information to open accounts, file taxes, or make purchases, visit IdentityTheft.gov to report and recover from identity theft. Looking for identity theft resources to share in your community? Visit ftc.gov/idtheft.


CPR and DNR: Healthcare providers use CPR to try to restart your heart if it stops beating. Sometimes electric shock is used. Consider when and how long you want CPR if you have a terminal disease or are in a long-term coma. If you do not want CPR, you can add a DNR (do not resuscitate) order to your living will. A copy of the DNR order must also go in your medical records.
A Conservatorship isn’t something you can put in place ahead of time. In order to become the conservator of someone else, you must file a petition with the court and the court must decide that the individual in question is unable to care for themselves. The court also decides what types of decisions the conservator is allowed to make on the person’s behalf: medical, financial, and legal, to name a few. Conservatorships have no time limits and if the incapacitated person recovers, the court must decide that they are now able to care for themselves going forward.
Identity theft complaints as a percentage of all fraud complaints decreased from 2004-2006.[60] The Federal Trade Commission reported that fraud complaints in general were growing faster than ID theft complaints.[60] The findings were similar in two other FTC studies done in 2003 and 2005. In 2003, 4.6 percent of the US population said they were a victim of ID theft. In 2005, that number had dropped to 3.7 percent of the population.[61][62] The Commission's 2003 estimate was that identity theft accounted for some $52.6 billion of losses in the preceding year alone and affected more than 9.91 million Americans;[63] the figure comprises $47.6 billion lost by businesses and $5 billion lost by consumers.
The increase in crimes of identity theft led to the drafting of the Identity Theft and Assumption Deterrence Act.[54] In 1998, The Federal Trade Commission appeared before the United States Senate.[55] The FTC discussed crimes which exploit consumer credit to commit loan fraud, mortgage fraud, lines-of-credit fraud, credit card fraud, commodities and services frauds. The Identity Theft Deterrence Act (2003)[ITADA] amended U.S. Code Title 18, § 1028 ("Fraud related to activity in connection with identification documents, authentication features, and information"). The statute now makes the possession of any "means of identification" to "knowingly transfer, possess, or use without lawful authority" a federal crime, alongside unlawful possession of identification documents. However, for federal jurisdiction to prosecute, the crime must include an "identification document" that either: (a) is purportedly issued by the United States, (b) is used or intended to defraud the United States, (c) is sent through the mail, or (d) is used in a manner that affects interstate or foreign commerce. See 18 U.S.C. § 1028(c). Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending on the underlying crime per 18 U.S.C. § 1028(b). In addition, punishments for the unlawful use of a "means of identification" were strengthened in § 1028A ("Aggravated Identity Theft"), allowing for a consecutive sentence under specific enumerated felony violations as defined in § 1028A(c)(1) through (11).[56]
A POLST is intended for people who have already been diagnosed with a serious illness. This form does not replace your other directives. Instead, it serves as doctor-ordered instructions — not unlike a prescription — to ensure that, in case of an emergency, you receive the treatment you prefer. Your doctor will fill out the form based on the contents of your advance directives, the discussions you have with your doctor about the likely course of your illness and your treatment preferences.
In some jurisdictions, a durable power of attorney can also be a "health care power of attorney." This particular affidavit gives the attorney-in-fact the authority to make health-care decisions for the grantor, up to and including terminating care and life support. The grantor can typically modify or restrict the powers of the agent to make end-of-life decisions.[14] In many jurisdictions a health care power of attorney is also referred to as a "health care proxy" and, as such, the two terms are sometimes used interchangeably.[8]
While you can appoint multiple agents, decide whether these agents must act jointly or separately in making decisions. Multiple agents can ensure more sound decisions, acting as checks and balances against one another. The downside is that multiple agents can disagree and one person's schedule can potentially delay important transactions or signings of legal documents.
Sign your living will according to your state's rules. Many states require at least 1 witness to watch you sign the form. The witness must be someone who is not your relative, healthcare provider, or legal agent. Some states will not accept your living will as valid without the right witnesses. Check with your lawyer if you are not sure about the state laws for living wills.
The acquisition of personal identifiers is made possible through serious breaches of privacy. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves (e.g., in a phishing attack) but identity-related documents such as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from vehicles, homes, offices, and not the least letterboxes, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the US Federal Trade Commission, Canadian Phone Busters and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands.
*For complete information, see the offer terms and conditions on the issuer or partner's website. Once you click apply you will be directed to the issuer or partner's website where you may review the terms and conditions of the offer before applying. We show a summary, not the full legal terms – and before applying you should understand the full terms of the offer as stated by the issuer or partner itself. While Experian Consumer Services uses reasonable efforts to present the most accurate information, all offer information is presented without warranty.
There is an active market for buying and selling stolen personal information, which occurs mostly in darknet markets but also in other black markets.[40] People increase the value of the stolen data by aggregating it with publicly available data, and sell it again for a profit, increasing the damage that can be done to the people whose data was stolen.[41]
A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated.[14] The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their subfiles impacts their credit ratings.[15]

Not only are children in general big targets of identity theft but children who are in foster care are even bigger targets. This is because they are most likely moved around quite frequently and their SSN is being shared with multiple people and agencies. Foster children are even more victims of identity theft within their own family and other relatives. Young people in foster care who are victims of this crime are usually left alone to struggle and figure out how to fix their newly formed bad credit.[21]
Disclaimer: Communications between you and doyourownwill are protected by our Privacy Statement but not by the attorney-client privilege or as work product. We are not a law firm or a substitute for an attorney or law firm. We cannot provide any kind of advice, explanation, opinion, or recommendation about possible legal rights, remedies, defenses, options, selection of forms or strategies. Your access to the website is subject to our Disclaimer.

Both a Medical Power of Attorney and a Living Will act in the same way in that both cater towards a person’s medical wishes. A Living Will specifically handles end-of-life health care situations whereas a medical power of attorney covers a broad range of healthcare decisions and only goes into effect when a person becomes incapacitated (unable to think for themselves).
Likewise, each state has enacted their own privacy laws to prevent misuse of personal information and data. The Commonwealth Privacy Act is applicable only to Commonwealth and territory agencies, and to certain private sector bodies (where for example they deal with sensitive records, such as medical records, or they have more than $3 million turnover PA).
You cannot make your own medical decisions: Your living will takes effect when you can no longer let healthcare providers know what care you want. Depending on the state you live in, 1 or 2 doctors have to decide that you can no longer make medical decisions. You may not be able to communicate what you want. You may lack the ability to understand the choices that need to be made about your medical care and the effects of the choices.
If you receive applications for "pre-approved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location.
Sweden has had relatively few problems with identity theft. This is because only Swedish identity documents have been accepted for identity verification. Stolen documents are traceable by banks and some other institutions. The banks have the duty to check the identity of people withdrawing money or getting loans. If a bank gives money to someone using an identity document reported as stolen, the bank must take the loss. Since 2008, any EU passport is valid in Sweden for identity check, and Swedish passports are valid all over the EU. This makes it harder to detect stolen documents, but still banks in Sweden must ensure that stolen documents are not accepted.
I was fortunate to find Rania online. We worked with her on our estate planning, getting all our documents in order. She was extremely competent, responsive and professional. I wasn’t sure how I would like working with some strictly online but she scheduled conference calls, educated us and handled it beautifully, putting my mind at ease. She was personal and genuinely cared about getting this right for us. I would highly recommend her services!
×