Identity theft occurs when someone uses your personal information (Aadhaar, PAN, Password, or Photo) to commit fraud, take loans in your name, or defame you. In India, this is a serious crime under the IT Act and the BNS. This 850-word guide provides a checklist of what to do if your identity is stolen.
1. Common Types of Identity Theft
- Financial Identity Theft: Using your PAN/Aadhaar to take "instant loans" or credit cards.
- Social Media Impersonation: Creating a fake profile using your photos to ask for money from your friends.
- Phishing: Tricking you into giving your OTP or banking credentials.
2. Legal Provisions (Section 66C and 66D of IT Act)
- Section 66C: Punishment for identity theft (using electronic signature, password, or unique identification feature). Up to 3 years in jail.
- Section 66D: Punishment for "cheating by personation" using a computer resource. Up to 3 years in jail.
3. Step 1: Immediate Financial Lockdown
If your financial data is compromised:
- Block all credit/debit cards.
- Inform your bank in writing (get an acknowledgement).
- Check your CIBIL Report to see if any unauthorized loans have been opened in your name.
4. Step 2: Filing a Complaint
- National Cyber Crime Portal: Report immediately at cybercrime.gov.in. This is the fastest way to get the attention of the authorities.
- Local Cyber Cell: Visit the nearest police station or Cyber Cell with all screenshots, emails, and transaction IDs.
- Adjudicating Officer: Under the IT Act, you can also file a petition before the IT Secretary of your state (Adjudicating Officer) to seek compensation for the loss caused by the theft.
5. Notifying the Platforms
If someone is impersonating you on Facebook or Instagram, use the platform's "Report" tool. Most platforms have a specific category for "Impersonation." They are legally required to act within 24-36 hours once they receive a valid complaint.
Conclusion
Identity theft can destroy your credit score and your reputation. Being proactive—regularly checking your bank statements and using Two-Factor Authentication (2FA)—is the best defense. If it happens, don't panic; follow the legal trail to prove you are the victim, not the perpetrator.