Privacy & Security
Fraudulent emails and websites: Lost or stolen checks and debit/ATM cards:
800.554.8969 – after hours or weekends
Suspicious online transactions:
Privacy and Security
What do I do if I am a Victim?
When you sign up for online access, People’s Bank may allow you to create your own username and password, to access your accounts. This information is encrypted during transmission.
People’s Bank requires Online Banking customers to select three questions and provide answers. If we ever need to confirm your identity, your correct answers to security questions will help us verify it is you.
People’s Bank’s system will automatically log you off from People’s Bank Online Banking after 12 minutes of inactivity. This reduces the risk of others accessing your information from your unattended computer.
People’s Bank’s computer systems are protected 24 hours a day by a powerful firewall that blocks unauthorized entry. In order to gain access to authorized information, the Web browser you are using must know the proper protocol or language and even then only select information is available.
From the moment account information leaves your computer to the time it enters People’s Bank systems, all online access and Bill Pay sessions are encrypted.
During any transaction, our 128-bit encryption turns your information into a coded sequence with billions of possible variations, making it nearly impossible for unwanted intruders to decipher. People’s Bank computers possess the proper formulas to turn this code back into meaningful information and complete your transaction.
Look for a “closed lock” in the lower right hand corner (Microsoft Internet Explorer) or in the right end of the address bar (Firefox 2) or in the top right corner (Safari) of your browser to determine if encryption is being used on any Web page you are viewing. Any Web address beginning with https:// indicates the page you are viewing uses encryption. The “s” stands for “secured”.
You are responsible for protecting your password and account information by:
- Not disclosing your personal account information to others (including your ATM PIN, online username, and password) and
Promptly reporting incidents of unauthorized account access or use by calling 866.454.4735.
People’s Bank will NEVER call or email our customers and ask for account numbers.
Online Security Tips
Use a current web browser. People’s Bank recommends Internet Explorer 7.0 or newer for use with the Online Banking programs.
Avoid downloading programs from unknown sources.
Do not use your Social Security number as a username or password. Change your usernames and passwords regularly and use combinations of letters, numbers, and "special characters" such as “pound” (#) and “at” (@) signs.
If your current People’s Bank username or password is your Social Security number, change it following these directions:
Sign in to an Online Banking session
Click on the Change Options tab in consumer online banking. For Business Online Banking, place your mouse over Options then select Change Security.
Select Edit under Password, Email, or Security Data in People’s Bank Online Banking. For People’s Bank Business Online Banking, enter the security data again. All fields must be completed.
Protect your online passwords. Don’t write them down or share them with anyone.
Protect your answers to security questions. Select questions and provide answers that are easy for you to remember, but hard for anyone else to guess. Do not write down your security questions or answers or share them with anyone. If you have selected security questions on other websites, avoid using the same questions to protect your People’s Bank online account. Please note that we will never ask you to provide answers to your security questions via email.
Close your browser when you’re not using the internet.
Computer Security Tips
Keep your computer operating system up to date to ensure the highest level of protection.
Install a personal firewall on your computer.
Install, run, and keep anti-virus software updated.
Turn your computer off completely when you are finished using it – don’t leave it in sleep mode.
Conduct online banking activities on secure computers only. Public computers (computers at internet cafes, copy centers, etc.) should be used with caution, due to shared use and possible tampering. Online banking activities and viewing or downloading documents (statements, etc.) should only be conducted on a computer you know to be safe and secure.
Email Security Tips
Be wary of suspicious emails. Never open attachments, click on links, or respond to emails from suspicious or unknown senders.
If you receive a suspicious email that you think is a phish email, do not respond or provide any information. Send the email to firstname.lastname@example.org.
If you respond to a phish email with personal information, contact People’s Bank at 866.454.4735 immediately.
Bank Account Security Tips
Report lost or stolen cards and checks immediately to 866.454.4735 during banking hours or 800.554.8969 after hours or on weekends.
Review account statements carefully. Regular account review helps to quickly detect and stop fraudulent activity. Ask about suspicious charges.
With People’s Bank Online Banking or People’s Bank Business Online Banking you can monitor your account online any time and as frequently as you like.
Limit the amount of information on checks. Don’t print your Driver’s License number or Social Security number on your checks.
Store account information in a safe and secure location.
Carry your checkbook with you only when necessary.
Credit Card and Debit Card Security Tips
Always keep your credit or debit card in a safe and secure place. Treat it as you would cash or checks. Contact People’s Bank immediately at 866.454.4735 if your debit card is lost or stolen, or if you suspect unauthorized use. After hours contact 800.554.8969 to report your lost or stolen card.
Do not send your card number through email, as it is typically not secure.
Do not give out your card number over the phone unless you initiated the call.
Regularly review your account statements as soon as you receive them to verify transactions. Contact People’s Bank immediately if you identify any discrepancies.
If you have forgotten your PIN please visit your nearest People’s Bank location or access your password through online banking with our “Forgot Password” button on the password screen.
Cancel and cut up unused credit and other cards.
If you receive a replacement card, destroy your old card.
When selecting a Personal Identification Number (PIN) don’t use any number or word that appears in your wallet (such as name, birth date, or phone number).
Memorize your PIN. Don’t write it down anywhere, especially on your card, and never share it with anyone.
Shop with merchants you know and trust.
Make sure any internet purchase activity you engage in is secured with encryption to protect your account information. Look for “secure transaction” symbols like a lock symbol in the lower right-hand corner of your web browser window, or “https://…” in the address bar of the website. The “s” indicates "secured" and means the web page uses encryption.
Always log off from any website after a purchase transaction made with your credit or debit card. If you cannot log off, shut down your browser to prevent unauthorized access to your account information.
Safe-keep or securely dispose of your transaction receipts.
When using your card at an ATM:
Be aware of your surroundings and exercise caution when withdrawing funds.
Watch for suspicious persons or activity around the ATM. If you notice anything out of the ordinary, come back later or use an ATM elsewhere. If you observe suspicious persons or circumstances, do not use the ATM at that time. If you are in the middle of a transaction, cancel the transaction, take your card and leave the area, and come back at another time or use an ATM at another location.
Report all crimes immediately to the operator of the ATM or local law enforcement.
Consider having someone accompany you when using an ATM after dark.
Ensure no one sees your PIN when you enter it.
Refrain from displaying cash, and put it away as soon as your transaction is completed. Wait to count your cash until you’re in the safety of a locked enclosure, such as a car or home.
Safe-keep or securely dispose of your ATM receipts.
Your Security is important to us at People’s Bank. We want to educate and provide you with tools and resources that will assist you in preventing identity theft.
To minimize the chances that you fall victim to identity theft and financial fraud, it is vital that you recognize the various types of fraud and learn how to protect yourself against them. The following information will help you safeguard your identity and protect your financial assets from fraud. Identity theft is more extensive than fraud, which is usually limited to an isolated attempt to steal money from an existing account. Fraud and identity theft can be easily confused.
What is Identity Theft?
The crime of identity theft occurs when someone, without your knowledge, acquires a piece of your personal information and uses it to commit fraud. Personal information such as your social security number, bank account number, or other identification, and uses it repeatedly to open new accounts or initiate transactions in your name. For example, someone might do a combination of the following: open new credit cards, open new bank accounts, forge checks, and even apply for loans using your name and personal information. This can cause financial loss and damage your credit, which can lead to a lengthy resolution process.
Keep in mind however, that even if you think your security has been compromised it does not automatically mean that you are a victim of identity theft. It might be an incorrect entry or an isolated incident of theft from your account that is quickly resolved by calling People’s Bank at 866.454.4735.
How does Identity Theft happen?
Identity theft is portrayed as a high-tech crime affecting only those people who shop, communicate, or do business online. However, while thieves can obtain personal information via online methods, the majority of identity theft occurs offline. Stealing wallets and purses, intercepting or rerouting your mail, and rummaging through your garbage are some of the common tactics that thieves can use to obtain personal information. The good news is that the more information you have on identity theft the better your defense.
What is “Phishing”?
Phishing (pronounced “fishing”) is a form of online scam where “phishers” attempt to gain customer account information such as user names, passwords, PINs (personal identification numbers), or social security numbers. This is accomplished by creating official looking emails with pop-ups or links that appear to be from your bank, online retailer, or government agency. These deceptive communications are the tools the “phishers” use to attempt to gain your confidential information.
How does “Phishing” work?
These phony emails often use phrases such as “your account may have been compromised”, “your account is in violation”, “we need you to verify your account information” and other variations. These emails will then usually offer a link where you can access your account to prevent adverse actions such as account closure or a freeze on an account’s assets. These links will then connect you to a site that will often look identical to the business site the email refers to. These sites, however, are forgeries created to trick users into logging into the sites with their genuine user ID and password. Once the “phishers” have obtained this information, they can then go to the real website and transfer, withdraw, or redirect the funds to another location. Then when the customer logs into their account again (on the real business website) they are surprised to find all of their assets are gone. In addition to loss of funds, there can also be adverse credit affects which may take weeks or months to resolve.
How can I protect myself from “Phishing” attacks?
The most important thing to remember is that no reputable business will send you an email requesting your personal account information. Any email you receive asking for this information should be considered phony and brought to the attention of the business being “phished”. Another way to further protect yourself is to keep your Operating System and Internet Browser software up to date. “Phishers” often use software vulnerabilities to further mask their appearance on their fake websites. Also, antivirus software can often detect methods used by “phishers” attempting to steal your information. But it is imperative that your antivirus software be updated as frequently as possible. Finally, if you are unsure as to whether or not an email or message is legitimate, call the company directly. This will ensure that you are speaking with a representative of that company and that your personal information will not be compromised.
What is “Spoofing”?
Spoofing is pretending to be something it is not, on the Internet, usually an e-mail or a Web site.
What if you downloaded a Virus or “Trojan Horse”?
Some phishing attacks use viruses and/or “Trojan Horses” to install programs called “Key logger” on your computer. These programs capture and send out any information that you type to the phisher, including credit card numbers, user names and passwords, social security numbers, etc. If this happens, it is likely you may not be aware of it until you notice unusual transactions on your account.
To minimize this risk, you should:
Install and/or update anti-virus and personal firewall software. (Several products are available online or through computer retail stores).
Update your anti-virus programs often and all virus definitions and run a full scan.
If your system appears to have been compromised, repair it, and then change your password again, since you may have transmitted the new one to the hacker.
Check your other accounts. eBay account, PayPal, your e-mail ISP, online bank accounts, online trading accounts and other e-commerce accounts, and everything else for which you use online passwords, to ensure they remain secure and have not been compromised by unauthorized access.
What is “Skimming” (ATM Tampering)?
Thieves tamper with ATMs by using a special storage device, which steals credit/debit card numbers when processing your card.
Other Forms of Identity Theft
Stealing checking/savings account statements, credit card statements, preapproved credit offers, new checks, and tax information from your mailbox.
Obtaining your credit report by posing as your landlord, employer, or someone else who may have a right to such information.
Stealing wallets or purses.
Imprinting your credit or debit card, or swiping it on a skimming device, while the card is out of your sight at a restaurant or retail establishment.
Completing “change of address” forms to send your mail to another address.
Hacking into retail store’s computer system and collecting debit or credit card information, such as card and PIN numbers.
How can I protect myself?
Do not open or respond to online solicitations or phone calls asking for personal information. People’s Bank will never require customers to send personal information via e-mail or pop-up windows.
If you initiate an online transaction and are required to provide personal data, look for indicators that the Web site is secure, like the “https” in the URL or padlock icon.
Carry only necessary identification. In particular, do not carry your social security card.
When a social security number is requested to sign up for a service, confirm that it is actually needed rather than some other identifier. Make photocopies of all the information you carry daily, and store them in a secure location like a safety deposit box.
Shred financial or personal documents before discarding. Most fraud and identity theft incidents happen as a result of mail and garbage theft.
Do not let your debit card out of sight when purchasing goods and services. Debit cards pose a greater risk because they are associated with your checking account.
Checking your account balances and transactions online can help you regularly monitor your account activity and more quickly detect any fraudulent transactions.
Do not use an obvious password like your birth date, your mother’s maiden name, or the last four digits of your Social security number. Change your passwords frequently.
People’s Bank may force password changes on electronic products.
Always put outgoing mail in a U.S. Postal Service mailbox, which is more secure than your home mailbox.
Collect your mail promptly each day.
To report a suspicious email that uses the People’s Bank name, forward it to us immediately at email@example.com.
How can I detect fraud?
Be aware of bills that do not arrive as expected.
Receipt of unexpected credit cards or account statements.
Denial of credit for no apparent reason.
Calls or letters about purchases you did not make.
Monitor your accounts online for any unauthorized transactions.
First and foremost, use common sense. If it sounds too good to be true, it probably is.
Never give personal information to a stranger who contacts you, whether by telephone, email, or other means.
Don’t accept payments for more than the amount of the service with the understanding that you send the buyer the difference.
Don’t accept checks from individuals you’ve only met online.
Don’t accept jobs in which you are paid or receive commission for facilitating money transfers through your account.
No matter how urgent someone claims a deal is, you can always wait a few days to research and confirm legitimacy. Time is on your side, not the fraudster's.
You are ultimately responsible and liable for all deposits made into your account, whether they are a check, money order, transfer, etc.
General Fraud Prevention Tips
Replace paper invoices, statements and checks with electronic versions, if offered by your employer, bank, utility provider or merchant.
If you have free online account access with People’s Bank Online Banking or People’s Bank Business Online Banking, you can reduce paper statements by signing up for Bill Pay and free Online Statement notification.
Review your credit report at least once a year, looking for suspicious or unknown transactions. You can get a free credit report once a year from each of the three major credit bureaus at www.annualcreditreport.com.
Place outgoing mail in a U.S. Postal Service mailbox to reduce the chance of mail theft.
Promptly retrieve incoming mail to limit the opportunity for theft.
Know your billing and statement cycles. Contact the company’s customer service department if you stop receiving your regular bill or statement.
Using your ATM or debit card is a simple, hassle-free way to get cash, make deposits, check account balances, transfer funds, make purchases and more. To enjoy the many conveniences debit cards offer, make protecting your card a priority. Here are some important safety tips.
Treat your card like cash
Always store your card in a safe place.
Use your Debit Card as a Credit Card
Your Debit Card includes the MasterCard logo, which enables purchases to run as a credit card purchase at most locations. Once you swipe your card, select the Credit key or the cancel key depending on location. Please make sure to tell the merchant to run your card as a credit card. This can be a safer option when using your debit card since you are not typing a PIN for any wondering eyes to see.
Keep your PIN to yourself... shhh it's a secret
No company or individual needs to know your PIN; not even your financial institution. Memorize your PIN, and never write it on your card or store it with your card. Never let a cashier, teller or other stranger enter your PIN for you.
Always be aware of your surroundings
When using an outdoor ATM such as in a parking lot, look for suspicious activity before you begin your transaction.
Shop carefully online
If you initiate an online transaction and must provide personal data, look for indicators that the site is secure, like "https" in the Web address or the closed padlock icon in the bottom frame of your browser. It is also wise to conduct financial transactions on wired Internet connections only. Wireless connections can be more vulnerable to attack.
Enroll your Card in MasterCard SecureCode®
Go to our website and link on the MasterCard SecureCode® icon to register your cards. MasterCard SecureCode delivers added protection for your card when you shop online.
Protect your card's magnetic stripe
Exposing your card's magnetic stripe to other magnetic objects can cause damage that will make your card unusable.
Report a lost or stolen card at once
Call the bank right away if your card is lost or stolen to reduce the chance that it will be used improperly. Immediate notice of lost or stolen cards also will limit your potential liability for unauthorized transactions.
Review account statements regularly
Verify all transactions matching receipts to account statements. Frequently reviewing activity online helps identify unauthorized activity between monthly statements. Sign up for eAlerts in online banking and you will receive email, text, or secure message notifications for routine account activity, as well as for unusual transactions.
Never respond to an unsolicited request
The Internet, text and calling is a common channels for fraud perpetration. Never provide your debit card number, PIN or any other non-public information to anyone in response to an unsolicited email, pop-up message, text or phone request. As a reminder, we will NEVER ask for your PIN.
What is Ransomware?
Ransomware is a malware that, once it infects your computer, encrypts all the files on your computer, denying you access to them. Most often, the ransoms must be paid in some form of digital currency, such as Bitcoin. Ransomware spreads like many other types of malware. The most common method involves emailing victims’ malicious email, where cyber criminals trick you into opening an infected attachment or clicking on a link that takes you to the attacker’s website.
Should You Pay the Ransom?
Paying a ransom becomes a business decision and may not be an option if you have no other way to get your files back. Be warned though, even if you do pay the ransom, there is no guarantee you will get your files back.
- Back Up Your Files – this way, even if you get infected with ransomware, you have a way of recovering files after rebuilding or cleaning up your computer.
- Don’t Get Infected – make sure you have up-to-date anti-virus software from a trusted vendor. Such tools, sometimes called anti-malware software, are designed to detect and stop malware.
- Automatically Install Updates – the more current your software is, the fewer unknown vulnerabilities your systems have and the harder it is for cyber criminals to infect them.
- Awareness – training family or employees to recognize which emails should be avoided.
Business Email Compromise (BEC) – Sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. Three of the most common BEC schemes include the compromise of email accounts belonging to:
- Business Executives: An email account belonging to a business executive with the authority to request wire transfers, such as a CEO or CFO, is compromised and subsequently used to send wire transfer instructions to an employee with the ability to conduct wire transfers.
- Vendors: An email account belonging to a vendor that receives payments through wire transfers is compromised and subsequently used to send messages to clients, instructing them to send all future wire transfers to a new bank account that is under the cyber criminal’s control.
- Employees: A personal email account belonging to an employee that sends invoice payment requests is compromised and subsequently used to send instructions to vendors identified through the employee’s contact list requesting payments be made to accounts under the cyber criminal’s control.
WHAT DO I DO IF I AM A VICTIM?
If you have given out your credit or debit card information
Report the incident to the card issuer as quickly as possible:
Debit Card - Call 866.454.4735 during banking hours or 800.554.8969 after hours or during weekends.
Credit Card - Call 800.556.5678 anytime.
Request your card issuer close your compromised account number and reissue you a new card with a different number.
Monitor your account activity and review account statements carefully after the information loss.
If any unauthorized charges appear, call the card issuer immediately and follow up with a hard copy letter via a traditional delivery service such as U.S. Postal Service describing each questionable charge (keep a copy for yourself).
Credit or Debit Card Loss or Fraudulent Transactions
As a consumer you are protected by Federal law and by many card protection programs if you exercise reasonable care and report any unauthorized transactions promptly. It is very important that you continually monitor your monthly statements to identify any unauthorized transactions. Call us immediately at 866.454.4735 if you identify any unautorized transactions on your statement.
If you notice fraudulent activity, promptly notify your financial institution or card issuer to report it. If you have given out your bank account information contact the bank as quickly as possible and request the bank close the compromised account and reopen a like account with a different account number.
If you have given out your personal identification information
If you believe you have given out personal information such as your name, address, and social security number to someone who may use it for fraud: Contact the three major credit reporting agencies – Experian, Equifax, and TransUnion and do the following:
Request a free copy of your credit report to check whether any accounts were opened without your consent.
Request that the agencies place a fraud alert and a victim’s statement in your file.
Request that the agencies remove inquiries and or fraudulent accounts stemming from the theft.
Major Credit Bureaus
Equifax – http://www.equifax.com/
To order your report call: 800.685.1111 or write: P.O. Box 74024, Atlanta, GA 30374-0241
To report fraud call: 800.525.6285 and write: P.O. Box 740241, Atlanta, GA 30374-0241
Hearing impaired call 800.255.0056 and ask the operator to call the Auto Disclosure Line at 800.685.1111 to request a copy of your report
Experian – http://www.experian.com/
To order your report, call: 888.EXPERIAN (397.3742) or write: P.O. Box 2002, Allen, TX 75013
To report fraud, call: 888.EXPERIAN (397.3742) TDD: 877.553.7803 and write: P.O. Box 9530, Allen, TX 75013
TransUnion – http://www.transunion.com/
To order your report, call: 800.888.4213 or write: P.O. Box 1000, Chester, PA 19022
To report fraud, call: 800.680.7289 TDD: 877.553.7803 and write: Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92634
Additional Actions to take if you believe that you are a victim of identity theft:
If bank accounts were set up without your consent, close them immediately.
Contact your local police department to file a criminal report.
Contact the Social Security Administration’s Fraud Hotline to report the unauthorized use of your personal identification information at 800.269.0271.
Contact the department of Motor Vehicles to see whether an unauthorized driver’s license number has been issued in your name and to notify them of the identity theft.
Notify the passport office to be on the lookout for anyone ordering a passport in your name.
File a complaint with the Federal Trade Commission. Online at http://www.ftc.gov/idtheft Or call the FTC’s Identity Theft Hotline, toll free at 877.IDTHEFT (438.4338); TTY: 866.653.4261Or write: Identity Theft Clearinghouse, Federal Trade Commission, 600 Pennsylvania Ave, NW Washington DC 20580.
File a complaint with the Internet Crime Complaint center (IC3) by visiting their web site: http://www.ic3.gov/. IC3 is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), with a mission to address fraud committed over the Internet. For victims of Internet fraud, the Center provides a convenient and easy to use reporting mechanism that alerts authorities of a suspected criminal or civil violation.
Document the names and phone numbers of everyone you speak to regarding the incident. Follow up your phone calls with letters. Keep copies of all correspondence.
Lost or stolen ATM card or Debit Card
Report your lost or stolen ATM card or Debit Card immediately by calling us at 866.454.4735 or call the lost or stolen card service center at 800.554.8969 after hours or on weekends.
Lost or stolen checkbook
Report your lost or stolen checkbook immediately by calling us at 866.454.4735.
If possible, provide the check number for the last check that was written, or the name of the person or business to whom it was written. (Image copies of your checks can be found through Online Banking.)
Alert a credit bureau with your concerns
If you suspect you might be a victim of identity theft, contact the three major credit bureaus listed below to place a fraud alert on your credit file. You also can order a credit report to identify any unauthorized activity.
Trans Union 800.680.7289