Member Education Center

Similar documents
Preventing Identity Theft

Identity fraud and theft

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan (616) REPORTING IDENTITY THEFT

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

First Global Data Corp.

Data Protection Policy & Procedure

Lost or stolen wallet or checkbook

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

Internet and Policy User s Guide

KIK s GUIDE FOR LAW ENFORCEMENT

Table of Contents. Welcome to Employee Self Service... 3 Who Do I Call For Help?... 3

Data Protection Act Data security breach management

In addition to assisting with the disaster planning process, it is hoped this document will also::

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

Presentation Overview. *What is identity theft? *How does identity theft happen? *What can you do? Deter Detect Defend. What is Identity Theft?

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

iphone Mobile Application Guide Version 2.2.2

Sergeant Rob Choquette Economic Crimes Unit

Online Banking Agreement

ITRC Fact Sheet 117 Identity Theft and the Deceased: Prevention and Victim Tips

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

Account Switch Kit. Locations. HACKLEBURG PO DRAWER A US HWY 43 HACKLEBURG, AL Phone: (205) Fax: (205)

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

How to put together a Workforce Development Fund (WDF) claim 2015/16

State Bank Virtual Card FAQs

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Plus500CY Ltd. Statement on Privacy and Cookie Policy

WRHA Health Interpreter Guidelines 1 for Message Relay, Reminder Call and Conference Call

Service Desk Self Service Overview

Annuities and Senior Citizens

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated

Personal Data Security Breach Management Policy

Corporate Account Takeover & Information Security Awareness

Outlook Web Access Training Light Version: Using a browser other than Internet Explorer 6.0 or later. A NWOCA Training Session

IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS

Customers FAQs for Webroot SecureAnywhere Identity Shield

UNIVERSAL MUSIC GROUP PRIVACY POLICY. Universal Music AB ("We") are committed to protecting and respecting your privacy.

Treasury Gateway Getting Started Guide

Accessing SpringBoard Online Table of Contents: Websites, pg 1 Access Codes, 2 Educator Account, 2 How to Access, 3 Manage Account, 7

PRIVACY POLICY Last revised: April 2015

New Chip Card Technology Released Across the U.S.

CREDIT REPORTING USER GUIDE

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Setup O365 mailbox access on MACs

Key Steps for Organizations in Responding to Privacy Breaches

Internet and Social Media Solicitations: Wise Giving Tips

Using PayPal Website Payments Pro UK with ProductCart

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

Credit Work Group Recommendation

Internet Banking Agreement and Disclosure Statement

FAQs regarding our system upgrade

HIPAA HITECH ACT Compliance, Review and Training Services

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide

VCU Payment Card Policy

The Ohio Board of Regents Credit When It s Due process identifies students who

PIC Online Application Help Document

Consumer Complaint Roadmap

CSAT Account Management

e-qip Online Checklist

learndirect Test Information Guide The National Test in Adult Numeracy

QBT - Making business travel simple

To discuss Chapter 13 bankruptcy questions with our bankruptcy attorney, please call us or fill out a Free Evaluation form on our website.

FAQs for Webroot SecureAnywhere Identity Shield

FAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup

Employees - recruitment, records and monitoring

GETTING STARTED With the Control Panel Table of Contents

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

For students to participate in BYOD please follow these two steps

Installation Guide Marshal Reporting Console

FNB Cellphone Banking. Frequently Asked Question

FundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs

Merchant Management System. New User Guide CARDSAVE

Net Conferencing User Guide: Advanced and Customized Net Conference with Microsoft Office Live Meeting Event Registration

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

Helpdesk Support Tickets & Knowledgebase

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

:: ADMIN HELP AT A GLANCE Contents

User Guide Version 3.9

AT&T U-verse App ios FAQs

SDES Service Desk Portal: Opening a Service Ticket

Title: How Do You Handle Exchange Mailboxes for Employees Who Are No Longer With the Company

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation User Guide

The Importance of Market Research

esupport Quick Start Guide

Employee Self Service (ESS) Quick Reference Guide ESS User

Service Request Form

Website Design Worksheet

P a g e 1. Banner Workflow: Teaching Effort Approver Procedure Guide. Teaching Effort Approver Procedures

FINRA Regulation Filing Application Batch Submissions

Workers Compensation Employee Packet

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

Privacy Plicy Welcme, Sensati & JHI

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

How much life insurance do I need? Wrong question!

Scotiabank Group Privacy Agreement

Chapter - 3. Cable Connections

The ADVANTAGE of Cloud Based Computing:

Electronic Data Interchange (EDI) Requirements

Transcription:

Member Educatin Center Prtect yurself by becming infrmed abut fraud and identity theft. Fraudulent email (als called phishing, spfing r impster email) and fraudulent Web sites are used t trick peple int prviding persnal infrmatin that can be used fr identity theft. Read a newspaper r watch the evening news and chances are there will be smething abut identity theft r ther types f Internet fraud. As Internet usage has grwn, s has Internet-related crime, especially fraud. 10 Tips Fr Accessing Yur Accunts Safely Online T help prtect yu against ID Theft as well as ther Internet fraud, we have develped a checklist: We recmmend that yu fllw each f these steps t ensure yu are taking the necessary safety precautins t prtect yur accunt infrmatin. Since this will cntinue t be a grwing issue f cncern fr cnsumers and the financial services industry alike, Huntingtnized FCU is taking aggressive steps t prtect yur infrmatin nline. We ve als develped a checklist t help yu prtect yurself. We recmmend that yu implement each f these safety precautins t prtect yur accunt infrmatin. 1. Update Yur Online Banking Passwrd. This is perhaps the easiest precautin! Althugh changing yur passwrd is nt required, we strngly recmmend that yu change it n a regular basis. This will help keep yur accunts secure shuld smene btain yur user ID and passwrd. Chse passwrds that are nt bvius and that wuld be difficult t guess. T strengthen security, chse a passwrd cnsisting f bth alphabetic and numeric characters. And remember never share yur passwrd with anyne else. T change yur passwrd: Lg in t CU Click. Select Change Passwrd tab. Fllw the remaining instructins t change yur passwrd. 2. Security Phrase. Yu can keep yur Online Banking accunts mre secure every time yu lgn. If yu recgnize yur Security Phrase, yu'll knw fr sure that yu are at the valid Huntingtnized FCU site. Cnfirming yur Security Phrase is als hw yu'll knw that it's safe t enter yur Passwrd. If yu feel that the infrmatin may be inaccurate, please call us immediately at 304-528-2400 weekdays, 8:00 a.m. t 4:00 p.m. ET. 3. Dn t Open Links In Emails. Hackers frequently try t get infrmatin frm individuals by sending emails asking fr verificatin f accunt infrmatin. These deceptive emails may say that yur bank accunt has been clsed due t fraudulent activity r that it needs t be verified. If yu ever receive an email f this nature, d nt pen the attached files, and d nt prvide any persnal infrmatin. Huntingtnized FCU will never slicit yur persnal r accunt infrmatin thrugh email. If yu receive any email frm Huntingtnized FCU r frm anyne else requesting persnal r accunt infrmatin, please treat it as fraudulent and frward it t us at hfcu@huntingtnized.cm

Or, yu can call us at 304-528-2400 weekdays, 8:00 a.m. t 6:00 p.m. 4. Install A Firewall. A firewall is yur cmputer s first line f defense, because it prtects yur machine frm hackers and intruders. A firewall is a sftware prgram that guards the entrance t yur private netwrk and keeps ut unauthrized r unwanted traffic. It acts as a buffer between yur cmputer and the utside wrld, allwing yu t determine what traffic may access yur cmputer. Yu can purchase a firewall prgram frm yur lcal cmputer stre. Mst firewall prgrams allw yu t set the level f security prtectin that yu desire. A gd rule f thumb is t start with the highest prtectin setting and then relax the settings as necessary. The price f a firewall prgram starts at abut $40 and includes features such as email attachment prtectin, advertisement blcking, pp-up-windw prtectin and ther autmatic functins. 5. Use Anti-Virus Sftware. Anti-virus sftware prtects yur cmputer against viruses unauthrized cmputer cdes that attach t a prgram r prtins f a cmputer system. Viruses reprduce and spread frm ne cmputer t anther, destrying stred infrmatin and interrupting peratins. An anti-virus prgram detects and destrys these unauthrized cdes. With new viruses emerging daily, yu need t have yur anti-virus prgram updated regularly. Sftware manufacturers ften sell their anti-virus prgrams with their firewall as a package, since they re natural cmplements. 6. Use Anti-Spyware Sftware. Spyware is any sftware prgram that aids in gathering infrmatin electrnically abut peple r rganizatins withut their knwledge r cnsent. It then relays that infrmatin t an unauthrized third party. Users mst ften pen the dr t spyware unwittingly by dwnlading free sftware indiscriminately r by clicking n pp-ups r dialgue bxes. Sme kinds f spyware will redirect yur brwser t a new hme page (nt f yur chsing). Others generate multiple pp-up ads that can make web surfing a chre. Anther type f spyware knwn as a keystrke lgger can cause the mst damage, because this type f prgram recrds a cpy f each character yu type (such as user names and passwrds t secure web sites) and sends that infrmatin t an unauthrized party wh can steal yur persnal infrmatin. Amng the antispyware prgrams n the market tday, sme are free, but mst cst abut $25. 7. Read Yur User Licensing Agreements. It s pssible fr yu t inadvertently agree t accept spyware with a prgram yu're dwnlading. S be sure t thrughly read any agreement included with applicatins r sftware yu re abut t dwnlad. Cmplete the dwnlad nly if yu recgnize the additinal prgrams included and yu knw they are safe. Always deal with reliable surces prducts r cmpanies yu knw r that are recmmended by thers yu trust. 8. Examine Brwser Security Settings. Make sure the security settings in yur brwser (Internet Explrer, fr example) are set t prvide an apprpriate level f prtectin. Brwser-based attacks can ccur when a user visits a web page cntaining hidden cde intended t sabtage a cmputer r cmprmise ne s privacy. Use the Help feature f yur Internet brwser prgram t familiarize yurself with the security features available fr yur particular brwser, r visit the brwser manufacturer s web site fr mre infrmatin. T edit yur security settings fr Internet Explrer: Click n Tls n the menu bar. Select Internet Optins frm the pull-dwn menu. Click n Security. 9. Take Advantage Of Security Updates. Yur Internet service prvider (AOL, fr example) and yur Internet brwser sftware manufacturer (fr example, Micrsft) peridically issue security updates. These updates are ften created t patch hles that allw viruses t get thrugh. Many reputable sftware manufacturers dedicate sectins f their web sites t security updates f this kind. If yu dn't have r dn t use aut-

update mechanisms in yur sftware, it s a gd idea t visit the manufacturers websites regularly t make sure yu have the latest fixes. 10. Use A Cmputer That Is Secured At All Times, Even When Yu re Traveling. Even if yu fllw all the steps utlined here fr yur hme cmputer, nne f it will matter if yu use a different cmputer that isn t secured. Be especially aware f this if yu are traveling, fr instance, r whenever yu re using a wrk r persnal cmputer that yu typically dn t use. If yu must use a cmputer ther than yur wn, first make sure that it has all f the items n this checklist installed and updated n its system. Fr the same reasns, it is als a gd rule f thumb t avid letting unfamiliar peple have access t yur cmputer. And, whenever yu re nt using the Internet, we recmmend discnnecting yur Internet access. Sme Things Yu Can D If Yu Are A Victim Of Identity Theft Fllwing are sme ptins that may be helpful if yu are a victim f identity theft. 1. Cntact Us: If yu are a victim f identity theft with respect t any f yur accunts r transactins with us, please ntify us at: Huntingtnized FCU 304-528-2400 (HTGN) 304-528-3400 (WAYNE) 304-716-9159 (MILTON) Please prvide as much detail as pssible abut the accunts r transactins in questin, including any dates and accunt r transactin numbers that apply. We will cntact yu t discuss additinal infrmatin necessary t reslve the matter. 2. Cntact One Of The Majr Credit Reprting Cmpanies: Equifax...1-888-766-0008 Experian...1-888-397-3742 TransUnin...1-800-680-7289 If yu call ne f these cmpanies, they will pass n yur infrmatin t the ther tw cmpanies, saving yu time. Each cmpany will fllw a standardized three-step prcess t pst a security alert n the credit file, pt yu ut f pre-apprved ffers f credit r insurance and mail yu a cpy f yur file. Here is what the prcess will lk like in mre detail nce yu make the call: The cmpany receiving the initial call will ntify yu f the ID fraud initiative and will electrnically ntify the ther tw credit reprting cmpanies f the crime. A fraud alert will be put n yur credit reprt at all three natinwide credit reprting cmpanies within 24 hurs. Yu will be pted ut f all pre-apprved ffers f credit and insurance fr tw years. Yur request fr a cpy f yur credit reprt will be handled in n mre than three business days. Each f the three natinal credit reprting cmpanies will wrk with yu t verify the infrmatin in their respective reprts and t delete any fraudulent data. If yu file a plice reprt, the prcess is even quicker. The Cnsumer Data Industry Assciatin's natinal credit reprting cmpany members will vluntarily expedite services fr yu by immediately deleting fraudulent data withut the usual reinvestigatin prcedure.

The fraud alert will be displayed by each natinal credit reprting agency t all lenders r ther users that access the reprts in the future. 3. Reprt The Crime T Yur Lcal Plice & Sheriff s Departments. Even if the plice can t catch the identity thief, having a plice reprt can help yu in clearing up yur credit recrds later n. Get a cpy f yur plice reprt. Yu may need t prvide a cpy f the plice reprt t the creditrs. 4. File A Cmplaint With The Federal Trade Cmmissin (FTC) File a cmplaint with the Federal Trade Cmmissin (FTC) at www.cnsumer.gv/idtheft r call their tll-free htline 1-877-IDTHEFT (438-4338). 5. If Required, Fill Out An Identity Theft Affidavit. Credit Unins, Banks, credit reprting agencies and ther credit grantrs may require yu t cmplete an identity theft affidavit r ther frms. Ask each credit unin, bank r agency fr its specific requirements. 6. Ntify Yur Lcal Pstal Inspectr Of A Fraudulent Change Of Address. Ntify yur lcal Pstal Inspectr if yu suspect an identity thief has filed a change f yur address with the pst ffice r has used the mail t cmmit credit r bank fraud. (Call yur lcal Pstmaster t btain the phne number.) Find ut where fraudulent credit cards were sent. Ntify the lcal Pstmaster fr that address t frward all mail in yur name t yur wn address. FTC www.cnsumer.gv 1-877-IDTHEFT (438-4338) Equifax Equifax 1-888-766-0008 RESOURCES Experian Experian 1-888-397-3742 TransUnin TransUnin 1-800-680-7289 Hw T Recgnize Fraudulent Email Be wary f any seemingly legitimate email request fr accunt infrmatin, ften under the guise f asking yu t verify r recnfirm cnfidential persnal infrmatin such as accunt number, Scial Security Numbers, passwrds r ther sensitive infrmatin. It s ften hard t detect a fraudulent email. That s because the email address f the sender ften seems genuine (such as supprt@yurbank.cm), as d the design and graphics. But there are clear signs t be aware f. Fr example, fraudulent emails ften try t extract persnal infrmatin frm yu in ne f tw ways: By luring yu int prviding it n the spt (e.g., by replying t the email), r Including links t a Web site that tries t get yu t disclse persnal data Like the email, a fraudulent Web site is designed t trick yu int believing it belngs t a cmpany yu knw by using its brands as dmain names and/r its graphics. The ultimate gal f this fraud is t use yur infrmatin t gain unauthrized access t yur bank r financial accunts r t engage in ther illegal acts. D nt reply t any email requesting yur persnal infrmatin, r ne that sends yu persnal infrmatin and asks yu t update r cnfirm it. If yu receive an email yu are suspicius f, cntact the cmpany thrugh an address r telephne number yu knw t be genuine. HUNTINGTONIZED FCU will never send yu any email that requests yur accunt infrmatin r asks yu t verify a statement. If yu suspect yu have prvided cnfidential accunt r persnal infrmatin t a fraudulent Web site, change yur passwrd immediately, mnitr yur accunt activity frequently and reprt any suspicius activity t the cmpany.

What Yu Can D Abut Phishing Schemes The Department f Justice recmmends fllwing three simple rules when yu see emails r Web sites that may be part f a phishing scheme: Stp, Lk, & Call. Stp. Phishers typically include upsetting r exciting (but false) statements in their emails with ne purpse in mind. They want peple t react immediately t that false infrmatin, by clicking n the link and inputting the requested data befre they take time t think thrugh what they are ding. Resist that impulse t click immediately. N matter hw upsetting r exciting the statements in the email may be, there is always enugh time t check ut the infrmatin mre clsely. Lk. Lk mre clsely at the claims made in the email, think abut whether thse claims make sense, and be highly suspicius if the email asks fr numerus items f yur persnal infrmatin such as accunt numbers, usernames, r passwrds. Fr example: If the email indicates that it cmes frm a bank r ther financial institutin where yu have a bank r credit card accunt, but tells yu that yu have t enter yur accunt infrmatin again, that makes n sense. Legitimate banks and financial institutins already have their custmers' accunt numbers in their recrds. Even if the email says a custmer's accunt is being terminated, the real bank r financial institutin will still have that custmer's accunt number and identifying infrmatin. If the email says that yu have wn a prize r are entitled t receive sme special "deal," but asks fr financial r persnal data, there is gd reasn t be highly suspicius. Legitimate cmpanies that want t give yu a real prize dn t ask yu fr extensive amunts f persnal and financial infrmatin befre yu're entitled t receive it. Call. If the email r Web site purprts t be frm a legitimate cmpany r financial institutin, call r email that cmpany directly and ask whether the email r Web site is really frm that cmpany. T be sure that yu are cntacting the real cmpany r institutin where yu have accunts, credit card accunthlders can call the tll-free custmer numbers n the backs f yur cards, and bank custmers can call the telephne numbers n yur bank statements