Identity Management Services

Protect, manage and restore your identity.

Identity theft threats are everywhere.

Protect your identity with Mercury Insurance’s Identity Management Services for less than $3 a month.

More than 15.4 million people a year will experience identity theft, with an average loss of $1,038 per victim. And, on average, consumers spend $263 and take more than 7 hours of their own time trying to restore their identity and resolve the problems associated with a fraudulent act.

Not long ago, dumpster divers and lost wallets were your biggest threats to identity theft. That is no longer the case. Your life has gone digital, and so have scammers with email hacking, social media smears, phishing attacks and data breaches. Plus, thieves have more devices to exploit today, such as tablets and smartphones on top of PCs and home Wi-Fi networks, leaving you more vulnerable than ever before.

So, what are you doing to protect your most important asset – your identity?

There’s no question that identity theft can force your life into a tailspin, but the right protection will greatly mitigate the damages. Rather than your income underhandedly vanishing, Identity Fraud Expense and Resolution Services Coverage can make up for some of what was lost.

Mercury Independent Agent

Mercury Insurance is here to help.

Our Identity Fraud Expense and Resolution Services Coverage provides up to $25,000 of coverage for expenses you may incur if your identity is stolen. Expenses covered include:

  • Lost income
  • Notaries
  • Attorney fees
  • Mailing costs
  • Loan application fees

Recover, repair and protect your identity with the help of CyberScout.

We’ve partnered with CyberScout, a leader in identity services, to provide you and your family members with identity theft protection services. CyberScout’s dedicated fraud specialists will provide security advice, trigger fraud alerts, call creditors and stick with you for as long as it takes to restore your credit, reputation and peace of mind. And all of this is available for as little as $3 a month.

Call (800) 956-3728 to speak to an agent today.

Find an Agent Near You

Service

  • External Breach Support: Respond swiftly, confidently and correctly when companies notify you that your data has been compromised.
  • Email Identity Support: Thwart, detect and recover from email hacking. Plus, get help managing your identity and privacy in your online communications.
  • Phish Assist: Sidestep phishing scams with detection and recovery support when crooks try to steal your personal data, online usernames, passwords and credit card data.
  • Social Media Identity Support: Get smart about managing your family’s reputation on social networks.
  • System Protection Support: Protect your tablets, computers and smartphones. CyberScout fraud specialists will provide industry-leading resources and options.
  • Document Replacement Services: Replace lost, stolen or destroyed identification documents and get help notifying government agencies and providers of the fraud.
  • Proactive Services: Preventative measures can be taken to avoid identity theft even after your personal data has been compromised. Fraud alerts are an example.
  • Resolution Services: Recover from account takeover or identity theft with unlimited assistance working to fix issues, handle notifications and provide credit/fraud monitoring.
  • Assisted Living Identity Support: Lean on CyberScout for guidance in power of attorney and legal guardianship matters to assist with identity management and resolving fraudulent misuse.
  • Child Identity Theft Support: Invest in your children’s futures by asking CyberScout to help protect their identities now, before they become victims of fraud or theft.
  • Employment Identity Theft Support: Request that CyberScout give pink slips to any criminals who build their identities, careers and Social Security credit using your personal information.
  • Estate Identity Support: Keep the identities of deceased family members safe with help from fraud experts.
  • Financial Fraud Support: CyberScout will protect your current and future credit from unauthorized account activity, account takeovers and financial accounts opened in your name.
  • Medical Identity Theft Support: If criminals use your personal data to commit medical fraud, CyberScout will help you heal your identity and get back on your feet.
  • Military Identity Theft Support: Protect your good name when you’re defending our country. Fraud experts will work with you or an authorized family member to put in place an active-duty military fraud alert.
  • Tax Identity Theft Support: Cut through taxing red tape and secure your refund with expert guidance after crooks steal your Social Security number and file in your name.
  • Travel Identity Theft Support: Contact a fraud specialist to help replace your lost or stolen IDs, passports, visas or other documents no matter where you are on the globe.
  • Break-In Recovery: Stop thieves in their tracks after a home, auto or boat break-in with assistance from fraud experts to prevent use of compromised personal data.
  • Disaster Identity Support: Recover following a natural disaster with ID and document replacement, access to financial institutions and communication with family, friends or providers.

Support

  • Assisted Living Identity Support: Lean on CyberScout for guidance in power of attorney and legal guardianship matters to assist with identity management and resolving fraudulent misuse.
  • Child Identity Theft Support: Invest in your children’s future by asking CyberScout to help protect their identities now, before they become victims of fraud or theft.
  • Employment Identity Theft Support: Call CyberScout to give pink slips to criminals who build their identities, careers and Social Security credit using your personal information.
  • Estate Identity Support: Keep the identities of deceased family members safe with help from fraud experts.
  • Financial Fraud Support: CyberScout will protect your current and future credit from unauthorized account activity, account takeovers and financial accounts opened in your name.
  • Medical Identity Theft Support: If criminals use your personal data to commit medical fraud, CyberScout will help you heal your identity and get back on your feet.
  • Military Identity Theft Support: Protect your good name when you’re defending our country. They’ll work with you or an authorized family member to put in place an active-duty military fraud alert.
  • Tax Identity Theft Support: Cut through taxing red tape and secure your refund with expert guidance after crooks steal your social security number and file in your name.
  • Travel Identity Theft Support: Contact a fraud specialist to help replace your lost or stolen IDs, passports, visas and other documents no matter where you are on the globe.

Recovery

  • Break-In Recovery: Stop thieves in their tracks after a home, auto or boat break-in with assistance from fraud experts to prevent use of compromised personal data.
  • Disaster Identity Support: Recover following a natural disaster with ID and document replacement, access to financial institutions and communication with family, friends or providers.

Frequently Asked Questions

What is identity theft?

Identity theft is a fast-growing crime that claims a new victim every two seconds. It is defined as the misuse of another individual's sensitive information to fraudulently open credit accounts, use existing credit and banking assets, and even seek medical treatment. Sensitive data includes personally identifiable information (PII), such as Social Security and financial account numbers, as well as protected health information (PHI). PII and PHI can be exposed in many ways, including through human error, data theft and hacking attacks on computing devices.

How do thieves use PII and PHI?

Fraudsters use personally identifiable information and personal health information to:

  • Obtain credit fraudulently from banks and retailers.
  • Steal money from a victim's existing accounts.
  • Secure loans, employment and housing.
  • Establish accounts with utility companies.
  • Receive medical care.
  • Achieve financial gain in other ways using the victim's name.
  • Dumpster-diving for documents containing personal information.
  • Stealing mail to get preapproved loan offers, credit cards, bills and more.
  • Impersonating a loan officer, employer or landlord to obtain access to credit files.
  • Gaining insider access to names, addresses, birthdates and Social Security numbers in company personnel or customer files.
  • Shoulder-surfing when people are using laptops, payment or identification cards in public places.
  • Skimming of credit and debit card information at point-of-sale machines.
  • Tapping online sources of personal data, such as public records and personal networking sites.
  • Hacking into an individual's or organization's network and devices to steal sensitive information.
  • Purchasing fraudulent or stolen identities on the internet or through a secondary market.

Are there laws against identity theft?

Yes. In 1998, Congress passed the Identity Theft and Assumption Deterrence Act, which makes it a federal felony to use another person's identification with the intent to commit unlawful activity.

What are some common ways criminals are stealing identities?

Theft of wallets and purses were once the most common way to obtain documents and accounts with identifying information. Today, thieves attack virtually every area of an individual’s life, wherever personal information is stored or sent. An identity thief needs only a few strategic bits of personal information to commit theft and fraud. Common methods include:

  • Dumpster-diving for documents containing personal information.
  • Stealing mail to get preapproved loan offers, credit cards, bills and more.
  • Impersonating a loan officer, employer or landlord to obtain access to credit files.
  • Gaining insider access to names, addresses, birthdates and Social Security numbers in company personnel or customer files.
  • Shoulder-surfing when people are using laptops, payment or identification cards in public places.
  • Skimming of credit and debit card information at point-of-sale machines.
  • Tapping online sources of personal data, such as public records and personal networking sites.
  • Hacking into an individual’s or organization’s network and devices to steal sensitive information.
  • Purchasing fraudulent or stolen identities on the internet or through a secondary market.