Caira by Unwildered can turn privacy, account-recovery or fraud records into a careful request and follow-up plan.

Free Identity Theft Dispute Packet Checklist

How to assemble FTC reports, police reports, account notices and dispute letters. Use this page when you need a practical written record for the exact account, charge, notice or company process in front of you.

If you are considering do not pay, first identify the charge, deadline and evidence that support your position.

Public complaint patterns are useful, but they are not proof that a company did anything wrong in your case. Public privacy complaints often turn on screenshots, confirmation numbers, limited identity proof, account recovery attempts and whether the company confirmed the requested action.

Template

This free download is plain on purpose so you can copy and paste it into Microsoft Word or email. No login is needed. Add your names, dates, amounts, account references, and evidence.

Copy-and-paste template

Free Identity Theft Dispute Packet Checklist

Use this checklist to assemble your identity theft dispute packet before sending it to a bank, credit bureau, platform, or other company. Fill in the bracketed fields and attach copies of the listed documents.

Sender: [Your Name]
Date: [Today's Date]
Reference: [Account Number, Ticket, or Report Reference]
Recipient: [Company/Agency Name, Department, or Contact Person]
Subject: Identity Theft Dispute Packet for [Account/Issue]

1. FTC Identity Theft Report
[ ] Filed at identitytheft.gov or by phone
[ ] Report number: [FTC Report Number]
[ ] Date filed: [Date]

2. Police Report
[ ] Filed with [Police Department Name]
[ ] Report number: [Police Report Number]
[ ] Date filed: [Date]
[ ] Officer/contact: [Name/Badge Number]

3. Account Notices
[ ] Notice of unauthorized activity (bank, credit card, platform, etc.)
[ ] Date of notice: [Date]
[ ] Account or transaction reference: [Number/Details]

4. Dispute Letter
[ ] Signed letter requesting correction, investigation, or action
[ ] Date sent: [Date]
[ ] Method sent: [Mail, Email, Portal]

5. Supporting Evidence
[ ] Copy of government-issued ID (with sensitive info masked if needed)
[ ] Proof of address (utility bill, statement, etc.)
[ ] Screenshots or printouts of suspicious activity
[ ] Confirmation numbers or support ticket references
[ ] Bank or credit card statements showing disputed charges
[ ] Any company or bureau responses received

6. Timeline of Events
[ ] List of key dates and actions taken (e.g., when fraud occurred, when reported, when contacted support)

7. Preservation Request
[ ] Written request to preserve account logs, device records, support tickets, and relevant communications

8. Next Steps
[ ] Requested remedy: [Delete, correct, restrict, restore access, investigate, close account, stop debit, etc.]
[ ] Response deadline requested: [Date, usually 10 business days from today]
[ ] Preferred contact method: [Email, Mail, Portal]

9. Signature
[ ] Signed: [Your Name]
[ ] Contact information: [Mailing Address, Email, Phone]

Attach copies of all checked items to your packet. Retain originals and send the packet by a method that provides proof of delivery.

What People Commonly Complain About Online

  • privacy forums often focus on data broker removals, people-search pages, recurring reappearance of personal information and how much identity proof to provide

  • hacked-account complaints often involve changed passwords, new two-factor settings, unfamiliar devices, recovery loops and support tickets that close too soon

  • identity-theft threads often involve credit freezes, fraud alerts, unauthorized ACH debits, bank investigations and uncertainty about whether to file an FTC identity theft report

Example Scenarios

  • A consumer sends an identity theft packet request and keeps the confirmation number because the company later says no request was received.

  • An account is hacked and the platform asks for proof; the consumer sends a concise evidence pack rather than a long story.

For this specific identity theft packet issue, make the first example match your facts: who charged you, which account or document identifies the charge, what promise or term you rely on, and what outcome you want.

Specific Practical Note

Before sending, decide what identity proof is necessary and what can be redacted. Save the URL, profile, ticket number, confirmation, login alert, or transaction record before the page or account changes.

What To Collect First

  • the account page, URL, identity-theft report or confirmation tied to the identity theft packet request

  • account identifiers, screenshots and confirmation numbers

  • limited identity proof if required, redacted where appropriate

  • fraud reports, police reports, credit bureau letters or platform tickets

  • bank statements, login notices, IP or device alerts where relevant

  • a record of what information was sent and when

Steps Before You Send

  1. Use the official privacy, fraud or account-recovery route first.

  2. Name the identity theft packet issue in one sentence so the reader can see the exact route you are using.

  3. Send only the identity proof that is necessary for the request.

  4. Ask for written confirmation, deletion, correction, access restoration or investigation.

  5. Preserve screenshots before the platform changes the page or closes the ticket.

  6. Escalate to the FTC, state privacy agency, attorney general or platform safety team when appropriate.

Common Mistakes

  • sending more sensitive data than necessary

  • using public comments instead of official privacy or safety channels

  • forgetting to save confirmation numbers

  • treating account closure as proof that billing or fraud is fixed

How Caira Can Help

If account recovery keeps looping, ask Caira by Unwildered to build a short evidence pack instead of repeating the whole story.

Caira is powered by AI and can read your PDFs, photos, docs, receipts and screenshots, then give answers, evidence summaries and draft letters in seconds.

Where To Check The Rules

  • state privacy law guidance, including CCPA/CPRA where relevant

  • FTC identity theft and data security resources

  • platform account recovery and fraud procedures

FAQ

Should I stop paying immediately?

Not always. Stopping payment can create late fees, service cutoffs, credit reporting, default notices or collection activity. First identify the contract, charge, deadline and safest route.

Should I name a company in the letter?

Yes, if it is the company you dealt with. Keep the wording factual: account number, date, promise, charge and requested fix. Do not accuse fraud unless you have a documented evidence.

Can this become a small-claims issue?

Sometimes. If the amount is documentable and the company will not respond, a demand letter and evidence index may help you decide whether small claims is worth considering.

This article is general information, not legal, financial, tax or medical advice. US law varies by federal rule, state rule, contract wording, forum, timing and facts.

Ask question or get drafts

24/7 with Caira USA

Ask question or get drafts

24/7 with Caira USA

1,000 hours of reading

Save up to

$500,000 in attorney fees

1,000 hours of reading

Save up to

$500,000 in attorney fees

No credit card required

Artificial intelligence for law in the UK: Family, criminal, property, ehcp, commercial, tenancy, landlord, inheritence, wills and probate court - bewildered bewildering