Scam Victim’s Guide on How To Guard Against Identity Theft After a Scam – 2025

Scam Victim’s Guide on How To Guard Against Identity Theft After a Scam

How to Guard Against Identity Theft in the Context of Scams, Fraud, and Cybercrime – a Guide for Scam Victims & Survivors

Identity Theft – A SCARS Institute Guide

Author:
•  Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.

Article Abstract

Scam victims face heightened risks of identity theft, as scammers often collect and exploit sensitive personal information to commit further fraud. Identity thieves use stolen data in various ways, including financial fraud, opening fraudulent accounts, impersonation, and selling information on the dark web. Recognizing common schemes such as phishing, fake job offers, or tech support scams, and taking preventive measures like monitoring financial accounts, securing documents, and enabling two-factor authentication, are essential steps to mitigate risks.

Additionally, responding proactively to data breaches and staying vigilant about personal information can help victims protect themselves from the lasting consequences of identity theft. Recovery is challenging, but with awareness and proper precautions, victims can regain control and safeguard their financial and personal well-being.

Scam Victim's Guide on How To Guard Against Identity Theft After a Scam

How to Guard Against Identity Theft in the Context of Scams, Fraud, and Cybercrime – a Guide for Scam Victims & Survivors

Identity theft is a pervasive threat, especially for individuals targeted by scams, fraud, and cybercrime. It can lead to devastating financial losses, reputational damage, and emotional distress. Protecting yourself requires a combination of vigilance, proactive measures, and an understanding of how identity thieves operate. Below is a thorough guide to help you safeguard against identity theft.

Why Scam Victims Should Be Concerned About Identity Theft

Falling victim to a scam is not just a one-time event—it can have lasting consequences, particularly when it comes to identity theft. Scammers often aim to collect sensitive personal information, such as Social Security numbers, bank account details, or passwords, which can be used or sold to commit further fraud. For scam victims, the risk of identity theft increases significantly because their data has already been exposed to individuals with malicious intent. This can lead to unauthorized financial transactions, the opening of fraudulent accounts, and damage to credit, all of which can take years to fully resolve. Understanding and addressing the potential for identity theft after a scam is crucial for mitigating these risks and protecting your financial and personal well-being.

Recognize Common Identity Theft Schemes

Identity thieves use various schemes to exploit victims. Among the most common are impersonation scams and fraudulent employment offers. Impersonation scams involve criminals posing as legitimate representatives from trusted organizations, such as banks, government agencies, or well-known companies, to trick individuals into sharing sensitive information like Social Security numbers, account details, or passwords. Fraudulent employment scams often entice victims with high-paying job offers or work-from-home opportunities, asking for personal information under the pretense of completing background checks or payroll forms. Recognizing these schemes is the first step in avoiding them—always verify the identity of the requester and the legitimacy of the communication.

25 Common Identity Theft Schemes that Target Previous Scam Victims

Here are 25 common identity theft schemes that specifically target scam victims. Some may be a repeat of the previous scam allowing the scammer to obtain more information or money.

  1. Phishing Scams: Victims are tricked into providing sensitive information through fake emails or websites.
  2. Fake Job Offers: Scammers pose as employers offering jobs and request Social Security numbers, bank details, or other personal data.
  3. Lottery or Prize Scams: Victims are told they’ve won a prize but must provide personal or financial information to claim it.
  4. Impersonation Scams: Fraudsters pretend to be government officials, banks, or tech support to extract sensitive information.
  5. Romance Scams: Scammers build trust in a fake relationship to persuade victims to share personal data or financial details.
  6. Charity Scams: Victims are asked to donate to fake charities and provide payment details that can be exploited.
  7. Overpayment Scams: Scammers overpay for an item or service and ask victims to refund the difference, often requiring personal banking details.
  8. Fake Debt Collection: Scammers claim victims owe money and demand payment with sensitive financial data.
  9. Online Marketplace Fraud: Scammers pose as buyers or sellers, requesting personal information to finalize fake transactions.
  10. Investment Scams: Victims are lured into fake investment opportunities and asked to provide personal and financial data.
  11. Tech Support Scams: Fraudsters claim the victim’s computer has a problem and request remote access or payment information.
  12. Identity Verification Scams: Victims are asked to verify their identity for a fake service or account recovery, leading to stolen details.
  13. Subscription Traps: Scammers offer free trials that require personal or credit card information, which they then misuse.
  14. Fake Utility Scams: Fraudsters claim the victim’s utilities will be shut off unless immediate payment is made, collecting personal and payment details.
  15. Online Dating Blackmail: Scammers threaten to share private information collected during fake online relationships unless paid.
  16. Imposter Family Member Scams: Victims are told a family member is in trouble and must provide personal information to “help.”
  17. Social Media Scams: Fraudsters impersonate friends or followers to extract personal information through direct messaging.
  18. Fake Charity GoFundMe Campaigns: Scammers create fraudulent fundraising campaigns to collect victims’ payment information.
  19. Scholarship Scams: Victims are asked for personal details to apply for fake scholarships or financial aid.
  20. Rental Scams: Fraudulent landlords request Social Security numbers and financial details for fake rental applications.
  21. Fake Check Scams: Victims deposit fake checks and provide personal banking information to “process refunds.”
  22. Cryptocurrency Scams: Victims are lured into fake crypto investments requiring sensitive account access.
  23. Loan Scams: Scammers offer low-interest loans and require victims to provide personal data for “approval.”
  24. Business Email Compromise (BEC): Victims working in businesses are targeted with fake emails requesting sensitive company or employee data.
  25. Utility Account Takeover: Scammers gain access to victims’ utility accounts to create new fraudulent accounts or reroute bills.

These schemes leverage the initial psychological impact of deception and betrayal of a scam to extract further personal information or commit additional fraud against victims.

How Do Scammers Exploit the Data They Obtain During a Scam?

Scammers exploit the data they obtain during a scam in numerous ways, often depending on the type of information they’ve collected. Here are the most common methods:

1. Financial Fraud

Scammers use stolen financial details like credit card numbers, bank account information, or online banking credentials to:

      • Make unauthorized purchases: Buying goods or services online or in-person.
      • Withdraw cash: Using bank accounts or ATMs if they have PINs or other account access details.
      • Transfer funds: Moving money from victims’ accounts to their own or laundering it through mule accounts.

2. Opening Fraudulent Accounts

Using personal details such as names, addresses, Social Security numbers, and birthdates, scammers can:

      • Open credit card accounts: Running up large balances in the victim’s name.
      • Set up utility accounts: Establishing services like electricity, phone, or internet.
      • Apply for loans: Taking out personal, payday, or student loans that victims are then liable for.

3. Identity Theft

With sufficient personal information, scammers can impersonate victims to:

      • Commit tax fraud: Filing fraudulent tax returns to claim refunds.
      • Obtain medical services: Using insurance details to access healthcare or purchase prescription drugs.
      • Commit social security fraud: Stealing benefits or creating fake identities using real SSNs.

4. Selling Information on the Dark Web

Scammers often monetize stolen data by selling it to other criminals on the dark web. This includes:

      • Personal information packages: Bundles containing names, addresses, SSNs, and credit card details.
      • Login credentials: Usernames and passwords for online banking, email, or social media accounts.

5. Blackmail and Extortion

Scammers use sensitive or embarrassing information to:

      • Demand money: Threatening to release private data unless a ransom is paid.
      • Exploit victims further: Coercing victims into providing additional information or funds.

6. Account Takeovers

Scammers use login credentials to:

      • Access email accounts: Intercepting personal or business communications.
      • Hijack social media: Posting malicious content, contacting friends, or spreading further scams.
      • Control e-commerce accounts: Ordering goods or accessing stored payment methods.

7. Fraudulent Employment

Scammers can use stolen personal details to:

      • Pass background checks: Using victims’ identities to obtain jobs, especially in regulated industries.
      • Commit payroll fraud: Redirecting wages to fraudulent accounts.

8. Facilitating Further Scams

The information obtained can be leveraged to make future scams more convincing, such as:

      • Phishing campaigns: Using known details to create personalized, believable phishing messages.
      • Pretexting: Pretending to know victims personally to gain additional trust and data.

9. Credit Score Damage

      • Scammers open fraudulent accounts, rack up unpaid debts, or default on loans, which can severely damage the victim’s credit score and financial reputation.

10. Tax Identity Fraud

Scammers use stolen Social Security numbers and personal information to:

      • Claim fraudulent tax refunds: Filing fake returns in the victim’s name.
      • Receive government benefits: Accessing unemployment or social assistance programs.

11. Illegal Activities and Money Laundering

Scammers use stolen identities to:

      • Set up fake businesses: Using victims’ details to establish entities for laundering money.
      • Commit criminal acts: Ensuring their real identities are not tied to illegal activities.

12. Exploiting Medical Records

With access to medical information, scammers can:

      • Commit insurance fraud: Filing fraudulent claims or creating fake insurance accounts.
      • Steal prescription drugs: Using stolen data to order controlled substances.

13. Misusing Child Identities

Children’s information, especially Social Security numbers, is valuable for:

      • Creating new identities: Opening accounts, obtaining loans, or committing fraud unnoticed for years.

14. Business Espionage

If scammers gain access to business-related data, they can:

      • Steal trade secrets: Selling sensitive business information to competitors.
      • Commit financial fraud: Embezzling funds or committing invoice fraud.

15. Facilitating Unauthorized Immigration

      • Scammers may sell stolen identities to individuals seeking illegal entry into a country or for other purposes such as employment.

16. Harassment and Stalking

Personal information can be used to:

      • Harass victims: Sending threatening messages or making unwanted calls.
      • Track locations: Using stolen data to identify where victims live or work.

17. Social Engineering

Detailed personal data is valuable for:

      • Building trust: Making social engineering attacks, such as pretending to be a trusted authority, more convincing.
      • Exploiting relationships: Manipulating victims into providing further sensitive information.

Scammers are adept at exploiting the data they steal in multiple ways, often layering their methods to extract the maximum value from their victims. Understanding these risks emphasizes the importance of taking immediate action to protect yourself after a scam.

Implement Preventive Measures

Monitor Financial Accounts

Regularly review your financial accounts for unauthorized transactions. This simple habit can help you detect suspicious activity early and limit potential damage. Many banks and credit card providers offer free alerts for unusual transactions. Enrolling in these services can further enhance your vigilance.

Secure Personal Documents

Sensitive documents, such as birth certificates, Social Security cards, and passports, should always be stored securely. Avoid carrying these items unless absolutely necessary. Investing in a home safe or a safety deposit box can add an extra layer of security, ensuring these critical documents are not easily accessible to others.

Shred Sensitive Materials

Identity thieves often retrieve personal information from discarded documents. Shred old bills, bank statements, medical records, and other paperwork containing sensitive data before throwing them away. Cross-cut shredders are particularly effective, as they make it nearly impossible to reconstruct documents.

Use Strong, Unique Passwords

Strong passwords are a cornerstone of online security. Create passwords with a mix of upper and lowercase letters, numbers, and symbols, avoiding easily guessed words like birthdays or pet names. Additionally, never reuse passwords across multiple accounts. Using a password manager can simplify this process while keeping your credentials secure.

Enable Two-Factor Authentication (2FA)

Two-factor authentication (2FA) adds an extra layer of protection by requiring a second form of verification, such as a text message code or biometric scan, in addition to your password. Enable 2FA wherever possible, particularly for banking, email, and social media accounts, to reduce the likelihood of unauthorized access.

Be Cautious with Public Wi-Fi

Public Wi-Fi networks are convenient but often lack robust security measures. Avoid accessing sensitive accounts, such as online banking, when connected to public Wi-Fi. If necessary, use a virtual private network (VPN) to encrypt your data and protect it from hackers who may be monitoring the network.

Responding to Identity Theft

What to Do If Your Personal Information Is Involved in a Data Breach

Data breaches are increasingly common, exposing personal information to unauthorized access. If your personal information is compromised in a breach, immediate and strategic actions can help mitigate the damage. Below is a detailed guide on what steps to take if you are affected by a data breach.

1. Confirm the Breach and Understand Its Scope

The first step is to verify that your information has indeed been compromised. Breached organizations often notify affected individuals directly via email or letter. If you suspect a breach but haven’t been notified, check credible sources like Have I Been Pwned to confirm. Understand the type of information exposed, whether it’s email addresses, Social Security numbers, passwords, or financial data, as this will determine the necessary steps to protect yourself.

Once you’ve confirmed the breach, visit the organization’s website or contact their customer service to learn about any remedies they’re offering, such as free credit monitoring services. Understanding the scope of the breach is crucial to prioritizing your actions effectively.

2. Change and Strengthen Compromised Passwords

If passwords were part of the exposed data, immediately change them on the affected accounts. Use unique, strong passwords that combine uppercase and lowercase letters, numbers, and special characters. Avoid reusing passwords across multiple accounts. If the breached account shares a password with other services, update those as well to prevent hackers from exploiting reused credentials. Using a password manager can streamline the process of creating and storing secure passwords.

Additionally, enable two-factor authentication (2FA) on all accounts that offer it. This adds an extra layer of security, requiring a secondary form of verification beyond just a password.

3. Monitor Your Financial Accounts

If financial information, such as credit card numbers or bank account details, was compromised, carefully review your financial statements for unauthorized transactions. Report any suspicious activity to your bank or credit card provider immediately. Most financial institutions have fraud protection measures and can assist you in disputing charges or issuing replacement cards.

Consider placing alerts on your accounts to be notified of transactions over a specific amount. This proactive step ensures that you’re aware of potentially fraudulent activities as they occur.

4. Place a Fraud Alert or Credit Freeze

For breaches involving Social Security numbers or other sensitive identifiers, consider placing a fraud alert on your credit file. Fraud alerts notify creditors to take additional steps to verify your identity before opening new accounts in your name. You can request a fraud alert for free from any of the three major credit bureaus—Experian, TransUnion, or Equifax—and the alert will automatically extend to the other two.

Alternatively, you can implement a credit freeze, which restricts access to your credit file. This prevents creditors from pulling your report to approve new credit applications. A credit freeze can be lifted temporarily or permanently, giving you control over who accesses your credit.

5. File a Report with the Federal Trade Commission (FTC)

If you suspect identity theft as a result of the data breach, file a report with the FTC at IdentityTheft.gov. This provides you with an official report and a personalized recovery plan to help you navigate the process of resolving any fraudulent accounts or disputes. An FTC report is often required when dealing with creditors or law enforcement.

6. Use Free Credit Monitoring Services

Many organizations affected by data breaches offer free credit monitoring to impacted individuals. Take advantage of these services to monitor your credit report for unusual activity, such as hard inquiries or new accounts you didn’t authorize. Credit monitoring services provide alerts in real-time, enabling you to act quickly if suspicious activity occurs.

If the breached organization doesn’t provide this service, consider signing up for a reputable credit monitoring service on your own.

7. Be Alert for Phishing Scams

After a breach, scammers may attempt to exploit victims through phishing emails or calls that impersonate the breached organization. These fraudulent communications often aim to steal additional information or install malware. Be cautious of unsolicited messages asking for personal data or instructing you to click on links. Verify the legitimacy of all communications directly with the organization through official channels.

8. Regularly Review Credit Reports

Check your credit reports regularly for signs of unauthorized activity. By law, you are entitled to one free credit report annually from each of the three major credit bureaus. In response to COVID-19, credit reports are currently available for free weekly through AnnualCreditReport.com. Reviewing your credit report allows you to catch unfamiliar accounts, unauthorized hard inquiries, or inaccuracies in your personal information.

9. Replace Compromised IDs or Account Numbers

If critical identifiers like a driver’s license, passport, or account numbers are exposed, contact the issuing authorities to replace them. For Social Security numbers, while replacements are rarely granted, monitor your SSN for misuse and report any fraudulent activity to the Social Security Administration.

10. Stay Informed About Future Breaches

Data breaches often expose individuals to ongoing risks. Stay informed about new breaches by subscribing to alerts from credible sources, such as cybersecurity news outlets or credit monitoring services. Awareness is key to responding promptly if your information is compromised again in the future.

Taking swift and comprehensive action after a data breach can significantly reduce the risks of identity theft and financial harm. By following these steps, you can protect yourself and minimize the long-term impact of compromised personal information.

Even If You Are Not Yet a Victim of Identity Theft

Stay Informed and Vigilant

Educate Yourself

Staying informed about the latest scam tactics and identity theft trends is essential. Cybercriminals continually adapt their methods, so understanding common schemes can help you recognize red flags and avoid falling victim. Subscribe to alerts from reputable organizations, such as the FTC or cybersecurity firms, to stay updated.

Regularly Check Credit Reports

Your credit report is a valuable tool for detecting identity theft. By law, you are entitled to one free credit report annually from each of the three major credit bureaus. Review these reports for unfamiliar accounts, hard inquiries, or inaccurate personal information, and dispute any discrepancies immediately.

Exercise Caution with Personal Information

Be cautious when sharing personal information, whether online, over the phone, or in person. Verify the identity of anyone requesting sensitive data, and never provide such information through unsolicited communications. Social media platforms are also a common source of data for scammers; limit the amount of personal information you share publicly.

By implementing these strategies and remaining vigilant, you can significantly reduce your risk of falling victim to identity theft. Protecting your personal information is an ongoing process, but the peace of mind it provides is well worth the effort.

Conclusion

Guarding against identity theft is essential for scam victims and survivors, as the aftermath of scams often includes an elevated risk of further fraud. Scammers are adept at exploiting compromised data to perpetuate financial crimes, impersonations, and other forms of deception, leaving victims to bear the long-term consequences. By understanding the risks, recognizing common schemes, and implementing proactive security measures, you can regain control and protect yourself from additional harm.

Whether you’re responding to a recent scam or taking preventive steps for the future, vigilance is key. Monitor your accounts regularly, secure sensitive information, and stay informed about emerging threats. Additionally, take advantage of resources such as free credit reports, fraud alerts, and tools like two-factor authentication to strengthen your defenses.

While recovering from a scam can be challenging, knowing how to safeguard your personal information is a powerful step toward regaining confidence and peace of mind. By remaining proactive and aware, you can minimize the risk of identity theft and protect your financial and personal well-being.

Please Leave Us Your Comment
Also, tell us of any topics we might have missed.

Leave a Reply

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you

Your email address will not be published. Required fields are marked *

Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.

Recent Reader Comments

Important Information for New Scam Victims

If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org

If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines

A Question of Trust

At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.

A Note About Labeling!

We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!

Statement About Victim Blaming

Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.

These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.

Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org

SCARS Resources:

Other Cyber Resources

Psychology Disclaimer:

All articles about psychology and the human brain on this website are for information & education only

The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.

While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.

Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.

If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.

Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.

If you are in crisis, feeling desperate, or in despair please call 988 or your local crisis hotline.

-/ 30 /-

What do you think about this?
Please share your thoughts in a comment below!

Legal Disclaimer:

The content provided on this platform regarding psychological topics is intended solely for educational and entertainment purposes. The publisher makes no representations or warranties regarding the accuracy or completeness of the information presented. The content is designed to raise awareness about various psychological subjects, and readers are strongly encouraged to conduct their own research and verify information independently.

The information presented does not constitute professional advice, diagnosis, or treatment of any psychological disorder or disease. It is not a substitute for professional medical or mental health advice, diagnosis, or treatment. Readers are advised to seek the guidance of a licensed medical professional for any questions or concerns related to their mental health.

The publisher disclaims any responsibility for actions taken or not taken based on the content provided. The treatment of psychological issues is a serious matter, and readers should consult with qualified professionals to address their specific circumstances. The content on this platform is not intended to create, and receipt of it does not constitute, a therapist-client relationship.

Interpretation and Definitions

Definitions

For the purposes of this Disclaimer:

  • Company (referred to as either “the Company”, “We”, “Us” or “Our” in this Disclaimer) refers to Society of Citizens Against Relationship Scams Inc. (registered d.b.a. “SCARS”,) 9561 Fountainbleau Blvd., Suit 602, Miami FL 33172.
  • Service refers to the Website.
  • You means the individual accessing this website, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.
  • Website refers to RomanceScamsNOW.com, accessible from https://romancescamsnow.com

Website Disclaimer

The information contained on this website is for general information purposes only.

The Company assumes no responsibility for errors or omissions in the contents of the Service.

In no event shall the Company be liable for any special, direct, indirect, consequential, or incidental damages or any damages whatsoever, whether in an action of contract, negligence or other tort, arising out of or in connection with the use of the Service or the contents of the Service. The Company reserves the right to make additions, deletions, or modifications to the contents on the Service at any time without prior notice.

The Company does not warrant this website in any way.

External Links Disclaimer

This website may contain links to external websites that are not provided or maintained by or in any way affiliated with the Company.

Please note that the Company does not guarantee the accuracy, relevance, timeliness, or completeness of any information on these external websites.

Errors and Omissions Disclaimer

The information given by SCARS is for general guidance on matters of interest only. Even if the Company takes every precaution to ensure that the content of this website is both current and accurate, errors can occur. Plus, given the changing nature of laws, rules, and regulations, there may be delays, omissions, or inaccuracies in the information contained on this website.

SCARS is not responsible for any errors or omissions, or for the results obtained from the use of this information.

Fair Use Disclaimer

SCARS may use copyrighted material that has not always been specifically authorized by the copyright owner. The Company is making such material available for criticism, comment, news reporting, teaching, scholarship, or research.

The Company believes this constitutes a “fair use” of any such copyrighted material as provided for in section 107 of the United States Copyright law.

If You wish to use copyrighted material from this website for your own purposes that go beyond fair use, You must obtain permission from the copyright owner.

Views Expressed Disclaimer

The Service may contain views and opinions which are those of the authors and do not necessarily reflect the official policy or position of any other author, agency, organization, employer, or company, including SCARS.

Comments published by users are their sole responsibility and the users will take full responsibility, liability, and blame for any libel or litigation that results from something written in or as a direct result of something written in a comment. The Company is not liable for any comment published by users and reserves the right to delete any comment for any reason whatsoever.

No Responsibility Disclaimer

The information on the Service is provided with the understanding that the Company is not herein engaged in rendering legal, accounting, tax, medical or mental health, or other professional advice and services. As such, it should not be used as a substitute for consultation with professional accounting, tax, legal, medical or mental health, or other competent advisers.

In no event shall the Company, its team, board of directors, volunteers, or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever arising out of or in connection with your access or use or inability to access or use the Service.

“Use at Your Own Risk” Disclaimer

All information on this website is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information, and without warranty of any kind, express or implied, including, but not limited to warranties of performance, merchantability, and fitness for a particular purpose.

SCARS will not be liable to You or anyone else for any decision made or action taken in reliance on the information given by the Service or for any consequential, special, or similar damages, even if advised of the possibility of such damages.

Contact Us

If you have any questions about this Disclaimer, You can contact Us:

  • By email: contact@AgainstScams.org

PLEASE NOTE: Psychology Clarification

The following specific modalities within the practice of psychology are restricted to psychologists appropriately trained in the use of such modalities:

  • Diagnosis: The diagnosis of mental, emotional, or brain disorders and related behaviors.
  • Psychoanalysis: Psychoanalysis is a type of therapy that focuses on helping individuals to understand and resolve unconscious conflicts.
  • Hypnosis: Hypnosis is a state of trance in which individuals are more susceptible to suggestion. It can be used to treat a variety of conditions, including anxiety, depression, and pain.
  • Biofeedback: Biofeedback is a type of therapy that teaches individuals to control their bodily functions, such as heart rate and blood pressure. It can be used to treat a variety of conditions, including stress, anxiety, and pain.
  • Behavioral analysis: Behavioral analysis is a type of therapy that focuses on changing individuals’ behaviors. It is often used to treat conditions such as autism and ADHD.
    Neuropsychology: Neuropsychology is a type of psychology that focuses on the relationship between the brain and behavior. It is often used to assess and treat cognitive impairments caused by brain injuries or diseases.

SCARS and the members of the SCARS Team do not engage in any of the above modalities in relationship to scam victims. SCARS is not a mental healthcare provider and recognizes the importance of professionalism and separation between its work and that of the licensed practice of psychology.

SCARS is an educational provider of generalized self-help information that individuals can use for their own benefit to achieve their own goals related to emotional trauma. SCARS recommends that all scam victims see professional counselors or therapists to help them determine the suitability of any specific information or practices that may help them.

SCARS cannot diagnose or treat any individuals, nor can it state the effectiveness of any educational information that it may provide, regardless of its experience in interacting with traumatized scam victims over time. All information that SCARS provides is purely for general educational purposes to help scam victims become aware of and better understand the topics and to be able to dialog with their counselors or therapists.

It is important that all readers understand these distinctions and that they apply the information that SCARS may publish at their own risk, and should do so only after consulting a licensed psychologist or mental healthcare provider.

SCARS IS A DIGITAL PUBLISHER AND DOES NOT OFFER HEALTH OR MEDICAL ADVICE, LEGAL ADVICE, FINANCIAL ADVICE, OR SERVICES THAT SCARS IS NOT LICENSED OR REGISTERED TO PERFORM.

IF YOU’RE FACING A MEDICAL EMERGENCY, CALL YOUR LOCAL EMERGENCY SERVICES IMMEDIATELY, OR VISIT THE NEAREST EMERGENCY ROOM OR URGENT CARE CENTER. YOU SHOULD CONSULT YOUR HEALTHCARE PROVIDER BEFORE FOLLOWING ANY MEDICALLY RELATED INFORMATION PRESENTED ON OUR PAGES.

ALWAYS CONSULT A LICENSED ATTORNEY FOR ANY ADVICE REGARDING LEGAL MATTERS.

A LICENSED FINANCIAL OR TAX PROFESSIONAL SHOULD BE CONSULTED BEFORE ACTING ON ANY INFORMATION RELATING TO YOUR PERSONAL FINANCES OR TAX RELATED ISSUES AND INFORMATION.

SCARS IS NOT A PRIVATE INVESTIGATOR – WE DO NOT PROVIDE INVESTIGATIVE SERVICES FOR INDIVIDUALS OR BUSINESSES. ANY INVESTIGATIONS THAT SCARS MAY PERFORM IS NOT A SERVICE PROVIDED TO THIRD-PARTIES. INFORMATION REPORTED TO SCARS MAY BE FORWARDED TO LAW ENFORCEMENT AS SCARS SEE FIT AND APPROPRIATE.

This content and other material contained on the website, apps, newsletter, and products (“Content”), is general in nature and for informational purposes only and does not constitute medical, legal, or financial advice; the Content is not intended to be a substitute for licensed or regulated professional advice. Always consult your doctor or other qualified healthcare provider, lawyer, financial, or tax professional with any questions you may have regarding the educational information contained herein. SCARS makes no guarantees about the efficacy of information described on or in SCARS’ Content. The information contained is subject to change and is not intended to cover all possible situations or effects. SCARS does not recommend or endorse any specific professional or care provider, product, service, or other information that may be mentioned in SCARS’ websites, apps, and Content unless explicitly identified as such.

The disclaimers herein are provided on this page for ease of reference. These disclaimers supplement and are a part of SCARS’ website’s Terms of Use. 

All original content is Copyright © 1991 – 2023 Society of Citizens Against Relationship Scams Inc. (Registered D.B.A SCARS) All Rights Reserved Worldwide & Webwide. Third-party copyrights acknowledge.

U.S. State of Florida Registration Nonprofit (Not for Profit) #N20000011978 [SCARS DBA Registered #G20000137918] – Learn more at www.AgainstScams.org

View the claimed and or registered indicia, service marks, and trademarks of Society of Citizens Against Relationship Scams Inc., All Rights Reserved Worldwide

Contact the law firm for the Society of Citizens Against Relationship Scams Incorporated by email at legal@AgainstScams.org

Share This Information - Choose Your Social Media!

Leave A Comment

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you


Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.