How to Prevent Identity Theft of a Deceased Person?

Cyberlutions Team • Apr 19, 2024
A man in a blue shirt is holding a polaroid picture in front of his face.
Even in the silence of death, our identities remain vulnerable. 

In fact, identity fraud is often difficult to detect when you are not able to monitor your accounts actively.

This type of identity theft is referred to as ‘ghosting’ and it involves stealing someone's identity and using it to create a new, fake identity that cannot be traced back to the original person.

What’s especially brutal about ghosting is its timing—it preys upon survivors when their thoughts are preoccupied during times of grief and loss.

If you have lost your loved one and want to protect their identity from thieves, you’ve come to the right spot.

Today, we are going to discuss how to prevent the identity theft of a deceased person. 

So, without waiting any longer, let’s get started.

How Do Scammers Steal a Deceased Person’s Identity?

Ghosting isn’t just a monstrous act against the deceased; it poses additional stress on their loved ones.


Scammers use different tactics to steal a person’s identity and use it for financial gain.


To commit this crime, fraudsters steal personal information from various sources:


  • Death Certificates
  • Obituaries
  • Social Engineering
  • Falsifying Applications and Documents
  • Insider Collaboration


The data obtained from these sources can help fraudsters establish new accounts or lines of credit in the name of deceased individuals. 


How to Protect a Deceased Family Member From Identity Theft?

A person is typing on a keyboard in front of a computer screen.

Dealing with the identity theft of a decedent can be a difficult process, full of unexpected burdens. Therefore, it is better to take preventive measures that help you in managing and resolving these challenges.


These include the following:



1. Write the Obituary with Care

Obituaries and death notices are the goldmines for identity thieves.


Scammers use details from these obituaries to assemble the essential information required to steal a deceased person’s identity. Due to this reason, special care should be exercised to avoid mentioning any sensitive information.


Make sure to skip details like city of birth, birth date, full name, mother’s name, and street address which can be used to find additional information and ultimately to open new credit accounts in the decedent’s name.



2. Obtain Copies of the Death Certificate

Once your loved one has passed away, it is essential to obtain the necessary paperwork like a death certificate as early as possible.

In that regard, the first step is to acquire multiple copies of the death certificate.



I suggest you order at least twelve copies of official death certificates.


These will be required for various purposes such as informing credit reporting agencies, life insurance, pension accounts, and managing financial matters with institutions.


To apply for the certified copies of the death certificate different resources will help you regarding your state or territory.

You can check the details here.


3. Alert All Credit Card Reporting Agencies

Send certified copies of the death certificate to each of the three major credit reporting agencies:


  • Equifax®
  • Illion®
  • Experian®


Request them to put a “Deceased Alert” on the credit report.


This alert results in the permanent freezing of the report and prevents fraudsters from using a deceased person’s identity to get credit or open new accounts.


Moreover, you should request that a living relative or executor be notified if a credit application is made.


NOTE: Even though the Social Security Administration will eventually notify the credit bureaus about the death, the process may take months to complete. Therefore, it is better to do it on time by yourself.


4. Request and Review Credit Reports

A person is sitting on a couch writing on a clipboard.

Although you have already sent the certified copies of the death certificate to the credit reporting agencies, it is wise to keep an eye on the deceased credit report from time to time.


Make sure that there is no suspicious activity happening.


If you notice any, contact the police, the credit bureaus, and the creditor immediately.


If you are a surviving spouse, you can request a copy of the deceased’s credit report from all the credit bureaus.


The report not only notifies you about the theft but also gives information about the active accounts that still need to be closed.


That is an important step and if you think you’ll forget it, you can set up reminders or opt for a credit monitoring service that sends you regular updates on your credit account.



5. Alert the Australian Taxation Office (ATO) 

The process of filing income tax doesn’t change whether the person is dead or alive.


However, to prevent fraudulent filing in the name of the decedent, send a copy of the death certificate to the ATO using the address where the deceased would have typically filed their paper tax return.


In addition, you’ll need to file a final tax return for the deceased, typically covering the tax year they died in and possibly for any prior unfiled years.


The ATO provides resources and a guide to filing a tax return for a deceased person.


Also, if you are an eligible survivor you can claim the deceased’s refund with Form 1424.



6. Contact the Centrelink

Although funeral directors report the death to Centrelink as a part of their service, still it is a good idea to complete this step by yourself and provide Centrelink with a death certificate along with the date of death.


This is extremely important if the deceased person is collecting benefits.


What you need to do is use the Centrelink Self-Service line to report the death or apply for survivor benefits.



7. Alert your State Motor Transport Authority.

A woman is sitting at a desk in an office surrounded by other people.

A driver’s licence can also be a potential tool for fraudsters, as it may be used as part of an attempt to steal the identity of the deceased.


In those states where the Registry of Births, Deaths and Marriages does not notify the Department of Transport and Main Roads of a licence holder's death, you will need to take additional steps to manually cancel the licence.


To cancel a driving licence, you must provide the following documents either in person or by mail to the Transport Department:


  • A certified copy of the death certificate
  • The deceased’s original driver’s licence
  • A written request to cancel the deceased’s driving licence


NOTE: If you are concerned about the processing time, you can contact your local Transport Department office to inquire about it.


8. Keep All the Documents Secure

I know it’s hard to believe but in most cases, family members and close friends seem to be involved in the identity theft.


Keep an eye on who has access to all the important documents.


Be very careful if any family member or close friend starts asking a lot of questions about the decedent’s personal information.


To avoid this problem, consolidate all access to the deceased’s personal information to a single person who can share it with other family members only when necessary.


That’s all for today!


I hope that you’ve learned how to prevent the identity theft of a deceased person.



Conclusion

While we are not responsible for any fraud-related activity of the decedents (unless we are involved in it), it’s our responsibility to protect the identity of our loved ones.


For this purpose, you don’t need to make a lot of effort.


Just write the obituary with care and after getting certified copies of the death certificate, send a copy to all the relevant financial institutions, and you can significantly reduce the risk of identity theft.


Perhaps all these preventive steps look daunting, but they will give you peace of mind in the long run.


If you find this post helpful, don’t forget to share it with someone who needs it.



Kind regards.

A group of people standing next to each other on a path surrounded by padlocks.
By Cyberlutions Team 23 Apr, 2024
End-to-end encryption is like having a secret code for your messages. It means that only you and your intended recipient will be able read what you send. Even if someone tries to intercept, they won't be able to understand your messages, since they are encrypted. For example, sending a letter in a locked box. Only you and your recipient have the keys to unlock the box and read the letter. That's how end-to-end encryption works for digital messages. There are different types of encryption, but end-to-end encryption is special because it keeps your messages safe all the time. End-to-end encryption keeps your messages safe from start to finish. While using other encryption schemes, your data may be safe while traveling but may become vulnerable when they're stored on that server.
A group of servers surrounded by clouds and padlocks.
By Cyberlutions Team 16 Apr, 2024
Learn cloud encryption strategies and best practices for encrypting data at rest, in transit, and during processing to securely leverage cloud services.
A computer screen with a lot of code on it
By Cyberlutions Team 13 Apr, 2024
Discover proactive strategies for organizations to fortify their defences against data breaches and protect sensitive information in today's interconnected world. In today's hyperconnected world, data breaches have become an ever-present threat to organizations, regardless of size or industry. The proliferation of digital technologies and the increasing volume of data generated and shared have created new challenges for safeguarding privacy. To mitigate these risks, organizations must prioritize data breach preparedness and implement robust strategies to protect sensitive information. This article explores essential strategies businesses can adopt to safeguard privacy and enhance their resilience against data breaches.
An aerial view of a city at night with a lot of buildings and a river in the background.
By Cyberlutions Team 11 Apr, 2024
Explore the pivotal role of encryption technologies in preserving data privacy and security online. Delve into advanced encryption methods, challenges in implementation, and real-world examples illustrating their significance in the digital realm. In the complex landscape of cyberspace, where data breaches and cyber attacks loom large, encryption stands as a fundamental pillar of defence. Advanced encryption technologies play a crucial role in preserving data privacy and security online by rendering sensitive information indecipherable to unauthorized entities. This article delves into the multifaceted realm of encryption, examining its role, challenges, and real-world applications in safeguarding data privacy and security in the digital domain.
A man is covering his face while looking at a cell phone.
By Cyberlutions Team 09 Apr, 2024
Over the past couple of decades, traditional bullying has found its way into the digital world. The surge of advancements in the technological space has opened up many routes for bullies in the form of online forums, social media, chat groups, messengers, and gaming platforms. This has led to a new form of bullying, known as cyberbullying. Cyberbullying isn’t just limited to online harassment, abuse, or insult—it is a much broader term that also involves cases like online threats, unlawful sharing of personal information, identity theft, impersonation, and forgery. According to the Cyberbullying Research Center, a survey conducted in October 2016 showed that 34% of the students had experienced cyberbullying in their lifetime. Another survey conducted in June 2021 shows that an average of 27% of teenagers (aged 13–17 years) reported that they had been victims of cyberbullying. Although recent stats might look a bit lower than before, they are still pretty bad.
A hand is holding a computer mouse next to a sign that says data breach.
By Cyberlutions Team 07 Apr, 2024
A data breach is a security incident in which information is accessed without authorisation. This information could include personal details, financial data, or any sensitive data that is supposed to be protected under privacy laws and regulations. In Australia, as in many parts of the world, the consequences of data breaches can be severe, affecting not just the entities that hold the data but also individuals whose information has been compromised. The Australian context specifically emphasises protecting such information under the Privacy Act 1988, which includes the Notifiable Data Breaches (NDB) scheme. This scheme mandates that any organisation covered by the Privacy Act must notify individuals and the Office of the Australian Information Commissioner (OAIC) if they experience a data breach that is likely to seriously harm any individuals whose personal information is involved. A data breach can occur through various means, including hacking, phishing, or even through accidental disclosure by an e
An advertisement for australian data breach notifications in 2024
By Cyberlutions Team 07 Apr, 2024
2024 (updated) - Data Breach Notifications in Australia
An advertisement for Australian data breach notifications in 2023
By Cyberlutions Team 07 Apr, 2024
2023 - Data Breach Notifications in Australia
An advertisement for Australian data breach notifications in 2022
By Cyberlutions Team 07 Apr, 2024
2022 - Data Breach Notifications in Australia
An advertisement for Australian data breach notifications in 2021
By Cyberlutions Team 07 Apr, 2024
2021 - Data Breach Notifications in Australia
Show More
Share by: