Fraud Information and Security

Size: px
Start display at page:

Download "Fraud Information and Security"

Transcription

1 Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we keep your personal, business, and account information secure. We are committed to your online security. Here is what we're doing to keep your information safe. Individualized password When you sign up for online access, we ask you to create your own username and password to access your accounts. This information is encrypted during transmission. We now allow you to select your own, personal username to sign on, instead of your Social Security number. We strongly recommend that you do not use your Social Security number as a username or password. We may request a participant's online username to authenticate the participant by phone or ; however, we do not request a participant's online password to verify their identity. Our s may include a sign-on link. If there is ever a question regarding the legitimacy of an , participants should sign on from their homepage. Security questions Online users are required to select four security questions and provide answers. If we ever need to confirm your identity, your correct answers to security questions will help us verify it's you. Timed log-off Our website will automatically log you off after 10 minutes of inactivity. This reduces the risk of others accessing your information from your unattended computer. Firewall Our computer systems are protected 24 hours a day by a powerful firewall that blocks unauthorized entry. In order to gain access to authorized information, the Web browser you are using must know the proper protocol, or language, and even then only select information is available. Encryption From the moment account information leaves your computer to the time it enters our system, all online access sessions are encrypted. We employ some of the strongest forms of encryption commercially available for use on the Web today.

2 During any transaction, our encryption turns your information into a coded sequence with billions of possible variations, making it nearly impossible for unwanted intruders to decipher. Our computers possess the proper formulas to turn this code back into meaningful information and complete your transaction. Look for a "closed lock" icon in the lower right-hand corner (Microsoft Internet Explorer) or in the right end of the address bar (Firefox 2) or in the top right corner (Safari) of your browser to determine if encryption is being used on any Web page you are viewing. Any Web address beginning with " " indicates the page you are viewing uses encryption. The "s" stands for "secured." Constant Surveillance Our security team constantly monitors our security systems to help ensure that your accounts are safe and secure. Additional security measures Our layered approach to online security extends beyond a unique username and password, 128- bit encryption, a powerful firewall, technology updates, and continuous surveillance. We have additional security measures that may be activated in response to certain activities or events. If we are suspicious of any online behavior, we may restrict online access to accounts or prevent certain types of transactions. These measures safeguard your identity and your accounts. Further proof of identity may be required before online access is restored. Technology updates To resist constantly evolving online threats, we have adopted proven industry standards for technology to protect your account security. In addition, we collaborate closely with major Internet software manufacturers like Microsoft, Mozilla, and Apple to ensure that new web browsers meet our high security standards and can be included in our list of supported browsers. Common Methods Fraudsters Use Fraudulent s (phishing) Phishing is usually a two-part scam involving s and spoof websites. Fraudsters, also known as phishers, send an to a wide audience that appears to come from a reputable company. This is known as a phish . In the phish , there are links to spoof websites that imitate a reputable company's website. Fraudsters hope to convince victims to share their personal information by using clever and compelling language, such as an urgent need for you to update your information immediately or a need to communicate with you for your own safety or security. Once obtained, your personal information can be used to steal money or transfer stolen money into another account. Use caution if you receive an expressing an urgent need for you to update your information, activate your online banking account, or verify your identity by clicking on a link.

3 These s may be part of a phish scam conducted by fraudsters to capture your confidential account information and commit fraud. Never open attachments, click links, or respond to s from suspicious or unknown senders. If you receive a suspicious from us, report it and delete it. How fraudsters obtain addresses Fraudsters obtain addresses from many places on the Internet. They also purchase lists and sometimes guess addresses. Fraudsters generally have no idea if people to whom they send financial-related phish s are actual account holders. Their hope is that a percentage of those phish s will be received by actual account holders. If you receive a fraudulent that appears to come from WySTAR Global, this does not mean that our computer systems have been breached. Fraudulent websites (phish or spoof websites) Fraudsters may attempt to direct you to spoof websites via s, pop-up windows or text messages. These websites are used to try to obtain your personal information. One way to detect a phony website is to consider how you got to the site. Use caution if you may have followed a link in a suspicious , text message, online chat or other pop-up window requesting your personal or account information. Text-message phishing (smishing) A phishing attempt sent via SMS (Short Message Service) or text message to a mobile phone or device. This tactic is also referred to as smishing, which is a combination of SMS and phishing. The purpose of text message phishing is the same as traditional phishing: convince recipients to share their confidential information. Never take action on a request for your personal or financial information, including account numbers, passwords, Social Security number or birth date. If you receive a text message expressing an urgent need for you to update your information, activate an account, or verify your identity by calling a phone number or submitting information, on a website, do not respond and delete it. These messages may be part of a phishing scam conducted by fraudsters in an attempt to capture your confidential account information and may be used to commit fraud. Telephone or voice phishing (vishing) Known as vishing, or voice phishing, this tactic is a phishing attempt made through a telephone call or voice message. Fraudsters may have the ability to spoof their caller ID so it could appear that the telephone call is coming from a legitimate company. Fraudsters may also have identifying personal information, such as your name, which they may use to make the call appear more authentic. If you are uncomfortable with a phone call that was not initiated by you, ask for the purpose of the call and then hang up. Then, contact the company using legitimate sources such as contact phone numbers found on the company's website, your bank statements, and those listed on your ATM, debit or credit card.

4 Paper mail or fax phishing Some fraudsters still use low-tech methods to obtain your personal and financial information. Phishing attempts can be made through regular mail or fax machines. If you are suspicious about a piece of mail or fax you have received requesting personal or financial information, you should discard it. If you responded to a suspicious mailing or fax and provided confidential information, contact the company the mail or fax appears to be from. Use a legitimate source such as the phone number listed on the company's website, billing statement, or on the back of your ATM, debit or credit card to determine if your information was compromised. Pop-up windows Fraudsters may use pop-up windows small windows or ads to obtain personal information. These windows may be generated by programs hidden in free downloads such as screen savers or music-sharing software. If you encounter a suspicious pop-up window, close it. To protect yourself from harmful pop-up windows, avoid downloading programs from unknown sources on the Internet and always run anti-virus software on your computer. Your Responsibilities If you have registered for online access to your retirement account, you have agreed to additional obligations under the Online Access and Use Agreement. You are responsible for keeping your online username, password, and other account data confidential. What You Can Do When it comes to keeping your personal and financial information safe, it's important to be proactive. Follow these tips to help protect yourself from fraud and identity theft. Protect your identity Safeguard your personal and financial information so that it doesn't fall into the wrong hands. Identity Protection Tips Carry only necessary information with you. Leave your Social Security card and unused credits cards at home in a safe and secure location. Do not provide your Social Security number unless absolutely necessary. Make photocopies (front and back) of vital information you carry regularly and store them in a secure place, such as a safety deposit box. Then, if your purse or wallet is lost or stolen, you have contact information and account numbers readily available. If you are uncomfortable with a phone call that was not initiated by you, hang up or ask for the purpose of the call. Then contact the company using legitimate sources such as contact phone numbers found on the company's website, your bank statements, and those listed on your ATM, debit or credit card. Never provide payment information on a call that you did not initiate. Replace paper invoices, statements and checks with electronic versions, if offered by your employer, bank, utility provider or merchant.

5 Shred documents containing personal or financial information before discarding. Many fraud and identity theft incidents happen as a result of mail and garbage theft. Review your credit report at least once a year to look for suspicious or unknown transactions. You can get a free credit report once a year from each of the three major credit bureaus at Get a copy at any time directly from: o Equifax: or o Experian: or o TransUnion: or Subscribe to a daily credit monitoring service. Promptly retrieve incoming mail and place outgoing mail in a U.S. Postal Service mailbox, instead of your home mailbox, to reduce the chance of mail theft. Consider paperless options for your bills and financial statements. Know your billing and statement cycles. Contact the company's customer service department if you stop receiving your regular bill or statement. Checking Account Security Tips Report lost or stolen cards and checks immediately. Review account statements carefully. Regular account review helps to quickly detect and stop fraudulent activity. Ask about suspicious charges. Limit the amount of information on checks. Don't print your driver license number or Social Security number on your checks. Store new and cancelled checks in a safe and secure location. Carry your checkbook with you only when necessary. Use tamper-resistant checks. Credit Card and Debit Card Security Tips Always keep your credit or debit card in a safe and secure place. Treat it as you would cash or checks. Do not send your card number through , as it is typically not secure. Do not give out your card number over the phone unless you initiated the call. Regularly review your account statements as soon as you receive them to verify transactions. When selecting a PIN, don't use a number or word that appears in your wallet, such as name, birth date, or phone number. Ensure no one sees your PIN when you enter it. Memorize your PIN. Don't write it down anywhere, especially on your card, and never share it with anyone. Cancel and cut up unused credit and other cards. If you receive a replacement card, destroy your old card. Shop with merchants you know and trust. Make sure any internet purchase is secured with encryption to protect your account information. Look for secure transaction symbols such as a lock symbol in the lower right-hand corner of your web browser, or " " in the address bar of the website. The "s" indicates "secured" and means the web page uses encryption.

6 Always log off from any website after a purchase transaction is made with your credit or debit card. If you cannot log off, shut down your browser to prevent unauthorized access to your account information. Safe-keep or securely dispose of your transaction receipts. Be safe online and on your mobile device Whether you're sending s, shopping online, using social media, or just surfing the Web, it's important to keep your account information and identity secure. Follow these tips to avoid compromising your information. Online Security Tips Do not use your Social Security number as a username or password. Change your password regularly and use a combination of letters and numbers. Do not use your retirement website credentials for other online accounts. To change your password: o From your login screen, select Change Your Password o Follow the instructions on the page Protect your online passwords. Don't write them down or share them with anyone. Protect your answers to security questions. Do not write down or share your answers with anyone. We will never ask you to provide answers to security questions via . Use secure websites for transactions and shopping. Shop with merchants you trust. Make sure internet purchases are secured with encryption to protect your account. Look for secure transaction signs like a lock symbol in the lower right-hand corner of your browser or "https" in the address bar. Social media is increasingly popular, but it's a good idea to keep certain personal information private. Avoid sharing personal details that are used by financial institutions to identify you, such as your birth date, home address, mother's maiden name, schools attended/mascots and pet's name. Fraudsters may use this type of information to help gain access to an account since they are common answers to security questions. Always carefully review the privacy options for any social network you join. The privacy options and tools for social networks can be complex and should be reviewed carefully so that there is no disclosure of information you meant to remain private. Keep your browser current The browser software you use to connect to the Internet is an important link in protecting your security online. We recommend that you use one of the supported browsers listed below. Desktop Browser Website Supported Version(s) (as of m-dd-yy) Microsoft Internet Explorer 8.x 11.x Mozilla Firefox Apple Safari Not Supported Google Chrome Up to 29.x

7 Security Tips Be wary of suspicious s. Never open attachments, click on links, or respond to s from suspicious or unknown senders. If you receive a suspicious that you think is a phish, do not respond or provide any information. Delete it. If you respond to a phish with personal or account information, contact the number on your statement or website or you can call the general number at Mobile Security Tips When you use a mobile device for browser or text-based account access, keep these tips in mind: Use the keypad lock or phone lock function on your mobile device when it is not in use. These functions password-protect your device to make it more difficult for someone else to view your information. Frequently delete text messages from your financial institution, especially before loaning out, discarding, or selling your mobile device. Keep your account numbers, passwords, Social Security number and date of birth private. Never share your personal or financial information in a text message, phone call or . If you lose your mobile device or change your mobile phone number, sign on to your retirement account to remove the old number from your Delivery Preferences under My Settings, or call the number on your statement or website or call the general number at Avoid storing your banking password or other sensitive information on your smartphone or in an app where it could be discovered if your phone is stolen. When you finish an online session, always log off. This reduces the risk of others accessing your information from your device. Keep your mobile operating system up to date to ensure the highest level of protection. Before downloading an update to your mobile device be sure to go to the company's website to confirm the update is legitimate. Be cautious when using public hotspots. Carefully consider your Wi-Fi and Bluetooth connection settings, even at a trusted retailer, as fraudsters can spoof the name of reputable hotspots. Applications are programs you can download to your mobile device. Applications or "apps" that let you monitor your finances and conduct certain transactions are increasing in popularity. Download banking applications from reputable sources only to ensure the safety of your account information. For your security, sign off when you finish using an app rather than just closing it. QR codes (quick response codes) are two-dimensional barcodes that can be scanned with a mobile device to provide easy access to online information. Much like links in , QR codes can be used by fraudsters to send you to websites that may request your personal and financial information or could corrupt your mobile device.

8 Treat QR codes with the same suspicion as you would any URL or link you find in an . Use caution on which QR codes to scan, as some may have been tampered with if placed in a public place. Use a QR code scanner from a reputable source that will check links for malicious content. This capability can be found in the app description before downloading. Computer Security Tips Avoid downloading programs from unknown sources. Ensure your computer operating system, software, browser version and plug-ins are current. Before downloading an update to your computer program, first go to the company's website to confirm the update is legitimate. Install a personal firewall on your computer and keep anti-virus software installed and updated. Be wary of conducting online financial activities on computers that are shared by others. Public computers should be used with caution. Online financial activities and viewing or downloading documents (statements, etc.) should be conducted, when possible, on a computer you know to be safe and secure. Configure your devices to prevent unauthorized users from remotely accessing your devices or home network. For example, if you use a home wireless router for your home internet connection, follow the manufacturer's recommendations to configure the router with appropriate security settings. How to Report Identity Theft To report lost or stolen information, or if you have entered personal information in response to a suspicious , pop-up window, or phony Website claiming to be affiliated with us, call the Retirement Service Center listed on your statement or website or call the general number at immediately. The Retirement Service Center is open Monday through Friday, excluding New York Stock Exchange and other holidays. Contact the major credit bureaus You can request that the three main credit bureaus place a short or long-term fraud alert on your credit file. This alert requires creditors to verify your identity before opening any new accounts in your name or changing any existing accounts. You will only need to contact one bureau, which will notify the others. Credit bureaus must provide victims of identity theft a free copy of their credit report. You should request one from each bureau, as the information can differ. Review your credit reports

9 carefully for fraudulent activity. If fraud has occurred, notify the credit bureau and the companies where accounts were opened to report the fraud directly. Once a dispute has been resolved, the credit bureaus you contacted will send you another copy of your credit report. Review the report to make sure that all fraudulent activity has stopped and your file has been corrected. For more information about the steps to take and for credit reports, contact: Equifax: or Experian: or TransUnion: or Contact other creditors Contact your other creditors, including credit card and phone companies, banks, and other lenders, to notify them of potential fraud or identity theft. Consider following up your telephone conversations with a letter. Close any accounts that have been breached and reopen them with new account numbers and passwords. Do not use your Social Security number as a username or password. File a report with the local police Contact your local police department if you suspect that your personal or financial information was stolen. A police report may lend credibility to your case when dealing with creditors, who may require proof of criminal activity. Report the criminal activity to the Federal Trade Commission (FTC) Call the FTC hotline at ID THEFT ( ) to speak with a trained identity theft counselor or you can submit a complaint to the FTC on their website, Contact other agencies as appropriate Postal Inspection Service: If you believe your mail was stolen or redirected, notify your local post office. Social Security Fraud Hotline: If you suspect someone is using your Social Security number for fraudulent purposes, call the hotline. Department of Motor Vehicles (DMV): If you believe someone is trying to get a driver's license or identification card using your name and information, contact your local DMV. Carefully review all your accounts Since identity theft takes time to resolve, you should continue to review all charges and transactions appearing on account statements and online. Immediately report any discrepancies. More information on identity theft and fraud

10 Federal Trade Commission Stop. Think. Connect. Financial Fraud Enforcement Task Force How to Contact Us You may contact the Retirement Service Center listed on your statement or website or call the general number at , Monday through Friday, excluding New York Stock Exchange and other holidays. Fraud Information and Security Updates and Effective Date If we make updates to this Security Statement, we will update the Fraud Information and Security page with the changes and revise the "date of most recent update" posted at the top of this statement. Any updates to the Fraud Information and Security page become effective when we post the updates on the Site or as of the effective date indicated. Your use of the Site following the update to the Fraud Information and Security page means that you accept the updated statements. WySTAR Global Retirement Solutions, a business unit of Wells Fargo Bank, N.A. Links to third-party sites are provided for your convenience. Such sites are not within our control and may not follow the same privacy, security, or accessibility standards as ours. WySTAR Global Retirement Solutions, a business unit of Wells Fargo Bank, N.A., neither endorses nor guarantees offerings of the third party providers, nor are we responsible for the security, content or availability of third-party sites, their partners, or advertisers. Contact Us: WySTAR Global Retirement Solutions WySTAR Global Retirement Solutions Work 9210 Corporate Blvd Suite 300 Rockville, MD PhonePhone: (800) :00am - 5:00pm ET Monday - Friday rsmarketing@wystar.com "Our commitment to excellent service keeps us consistently at the top of our industry in terms of customer satisfaction."

11

Fraud Prevention Tips

Fraud Prevention Tips Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft. IDENTITY THEFT IDENTITY THEFT Identity theft is a serious crime with serious costs for victims. ID theft occurs when someone obtains your personal information such as your Social Security Number, credit

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Identity Theft. Protecting Your Credit Identity 1.3.1.G1

Identity Theft. Protecting Your Credit Identity 1.3.1.G1 Identity Theft Protecting Your Credit Identity Identity Theft IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

suntrust.com 800.SUNTRUST

suntrust.com 800.SUNTRUST suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally

More information

Guide to Identity Theft

Guide to Identity Theft Guide to Identity Theft 1 Receive a free copy of your credit report. Visit www.annualcreditreport.com to get a copy of your credit report from all three credit reporting agencies. Review your credit report

More information

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you

the first ACNB Bank transactionss in ACNB Bank will work number. Information on Thank you Identity theft is a terrible problem in this Information Age. You have already taken the first important step by contacting ACNB Bank immediately. ACNB Bank will work with you every step of the way to

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

Dear Concerned Consumer,

Dear Concerned Consumer, Dear Concerned Consumer, Identity theft is a growing problem of the Information Age. You have already taken the first important step in combating the problem by contacting HomeStar Bank & Financial Services.

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH...

SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... SECURITY BREACH INCIDENT RESPONSE AND CONSUMER NOTIFICATION PLAN TABLE OF CONTENTS PROGRAM OVERVIEW... DEFINITIONS... REPORTING A SECURITY BREACH... CONTAINMENT AND CONTROL... INVESTIGATING A SECURITY

More information

Identity Theft. Protecting Your Credit Identity 1.3.1.G1

Identity Theft. Protecting Your Credit Identity 1.3.1.G1 Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity

More information

How To Get Help From The Police Department

How To Get Help From The Police Department IDENTITY THEFT A Quick Reference Guide Hawthorne Police Department Identity theft is when somebody uses your personal identifying information such as your name, address, telephone number, taxpayer identification

More information

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail

U.S. Postal Inspection Service. Ensuring Confidence in the U.S. Mail U.S. Postal Inspection Service Ensuring Confidence in the U.S. Mail Identity theft involves acquiring key pieces of someone s identifying information, such as name, address, date of birth, social security

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

Identity Theft. Emergency Repair Kit

Identity Theft. Emergency Repair Kit Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair

More information

About the Federal Reserve

About the Federal Reserve About the Federal Reserve The Federal Reserve Bank of Philadelphia is one of 12 regional Reserve Banks in the United States that, along with the Board of Governors in Washington, D.C., make up the Federal

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call 877-441-6943.

Activate ProtectMyID Now in Three Easy Steps. If you have questions or need an alternative to enrolling online, please call 877-441-6943. Mid Atlantic Professionals, Inc. DBA / SSI ( SSI ) had a data breach incident that occurred on or before March 7, 2014. As a result of this incident, some personal identifiable information was exposed

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law Protecting Yourself From Identity Theft And Fake Check Scams Satellite Conference and Live Webcast Wednesday, July 16, 2008 2:00-4:00 p.m. (Central Time) Faculty Monica S. Sheeler Consumer Specialist Office

More information

What You Need to Know About Identity Theft. Identity Theft Prevention Tips

What You Need to Know About Identity Theft. Identity Theft Prevention Tips What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION @ What Is Identity Theft? IDENTITY THEFT

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

Identity Theft. Prevention and Recovery Information Kit

Identity Theft. Prevention and Recovery Information Kit Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IDENTITY THEFT IT S POSSIBLE@ PROTECT YOUR IDENTITY protection center LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION IT S POSSIBLE @ What Is Identity Theft? According to the FBI, identity theft is the fastest

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

Fraud Prevention Guide

Fraud Prevention Guide Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls

More information

General Q&A Northland Pioneer Personal Data Security Incident

General Q&A Northland Pioneer Personal Data Security Incident General Q&A Northland Pioneer Personal Data Security Incident 1. What happened? On May 2, 2016, W-2 information for 2015 was forwarded to a fraudulent email address by a college employee. Current and former

More information

IDENTITY THEFT and YOU

IDENTITY THEFT and YOU IDENTITY THEFT and YOU IDENTITY THEFT The Criminal Code was amended in 2010 to make identity fraud and identity theft criminal offences. With today s proliferation of technology, stealing innocent people

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

How To Protect Yourself From Identity Theft

How To Protect Yourself From Identity Theft Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

azag.gov PROTECT YOURSELF AGAINST IDENTITY THEFT Office of Arizona Attorney General TERRY GODDARD For more information, contact:

azag.gov PROTECT YOURSELF AGAINST IDENTITY THEFT Office of Arizona Attorney General TERRY GODDARD For more information, contact: For more information, contact: Office of Arizona Attorney General Terry Goddard 1275 West Washington Street Phoenix, Arizona 85007 602-542-5763 400 West Congress, Suite 315 Tucson, Arizona 85701 520-628-6504

More information

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to

IDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.

More information

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain. Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

MOBILE BANKING. Why should I use Mobile Banking?

MOBILE BANKING. Why should I use Mobile Banking? MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data

More information

Fraud. Spot it.stop it. Keep Your Finances Safe

Fraud. Spot it.stop it. Keep Your Finances Safe Fraud Spot it.stop it. Keep Your Finances Safe 2003 MasterCard International Incorporated. All rights reserved. MasterCard is a registered trademark of MasterCard International. DON T PAY A HIGH PRICE

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Power Against Identity Theft

Power Against Identity Theft Power Against Identity Theft What is Your Identity Theft Probability Score? 1. I pay bills with checks and place them in my mailbox or in a corner postal box. 2. I do not use direct deposit or electronic

More information

Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants.

Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants. Credit and Debit Card Security Tips Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants. Be careful with your PIN Always

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

Office of the Privacy Commissioner of Canada. Identity Theft and You

Office of the Privacy Commissioner of Canada. Identity Theft and You Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

More information

Identity Theft Grade Level 10-12

Identity Theft Grade Level 10-12 Identity Theft Grade Level 10-12 Take Charge of Your Finances Materials provided by: Karen Dawson, Family and Consumer Sciences Educator, Skyview High School, Billings, Montana Time to complete: 75 minutes

More information

Regions Identity Theft Kit

Regions Identity Theft Kit Regions Identity Theft Kit How to protect yourself from identity theft, and what to do if you suspect you may be a victim. 2015 Regions Bank. Member FDIC. Index Introduction... 2 What Is Identity Theft?...

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

Crime Prevention Tips

Crime Prevention Tips Crime Prevention Tips The suggests the following crime prevention techniques to avoid becoming a victim of Identity Theft: 1. To minimize the amount of information an identity thief can steal, do not carry

More information

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft PRACTICAL MONEY GUIDES IDENTITY THEFT How to safeguard your identity and financial information from theft SHIELD YOUR PERSONAL FINANCIAL INFORMATION TO AVOID CARD FRAUD AND IDENTITY THEFT When your personal

More information

Cobblestone Capital Advisors. Identity Theft: What You Should Know

Cobblestone Capital Advisors. Identity Theft: What You Should Know Cobblestone Capital Advisors Identity Theft: What You Should Know WHAT YOU SHOULD KNOW: Identity theft the stealing and fraudulent use of a person s personal or financial information has been a hot topic

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment

More information

Identity Theft: Informational Workshop

Identity Theft: Informational Workshop Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer

More information