1.0Privacy Office/patientprivacyldoyen/patientprivacy/author/ldoyen/Identity Theft - Privacy Officerich600338<blockquote class="wp-embedded-content" data-secret="efLTN8rxbj"><a href="/patientprivacy/privacy-topics/identity-theft/">Identity Theft</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="/patientprivacy/privacy-topics/identity-theft/embed/#?secret=efLTN8rxbj" width="600" height="338" title="“Identity Theft” — Privacy Office" data-secret="efLTN8rxbj" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script type="text/javascript">
/* <![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]> */
</script>
/patientprivacy/wp-content/uploads/sites/524/2018/07/Picture-for-Website.jpg1920648Identity theft occurs when someone steals or uses your personal information without your permission. Identity thieves use many methods to obtain your personal information, including pretending to work for legitimate companies, such as places where you do personal banking, shopping, or receive health care services. The information can then be used to open credit cards, … Read more