Due to continuous growth of internet and mobile banking, fraudsters have developed and deployed more sophisticated, effective, and malicious methods to compromise authentication mechanisms and gain unauthorized access to customer’s online accounts. These methods can include mail theft, telephone solicitations, and email scams, which have one purpose in mind; they all are seeking your personal information.
Tennessee Bank & Trust will never ask for your personal or financial information, such as social security or account number or password in an e-mail message. Cybercriminals use this method, often called “phishing”, in order to steal your information. They will masquerade as a trustworthy entity and try to convince you to provide your personal information. These types of attempts may include links within an e-mail, that when clicked on, will automatically install malicious software on your electronic device.
Don’t let the lack of knowledge in this ever changing electronic environment target you as a victim to identity theft. Tennessee Bank and Trust wants to help armor you with knowledge so that you are more alert and aware of the dangers of cybercriminals. We understand that security of your personal and account information is important to you. Listed below are controls we have implemented to properly authenticate your identity when you access these services and protect your information.
Protections Tennessee Bank & Trust Provides
- An Access ID and Password is required to access accounts through Internet Banking.
- If you log into your account from a different PC, you must answer a personal security question to help verify your identity.
- Authentication of Tennessee Bank and Trust’s website can be evidenced by the presence of a green bar in the URL address bar. This gives our customers visual confirmation that they are on a valid website.
- Accounts are locked after 3 invalid logon attempts. Resetting your password is possible via telephone if your identity can be verified via security questions. If we are unable to verify your identity, you must come into the bank with proper ID to reset.
- Tennessee Bank and Trust’s Internet Banking will sign off automatically after 10 minutes of inactivity.
- Tennessee Bank and Trust limits internet banking transfers between your authorized accounts only.
- Unused accounts are deleted after 180 days of inactivity.
- All information transferred through Internet Banking has at least 128-bit encryption.
- Our website uses firewalls to protect our computer system and your information.
Limitation of Liability for Internet Banking Services
You can help safeguard your account information by protecting your Access ID and Password. Do not share this with anyone. If you permit other persons to use your Access ID, you are responsible for any transactions they authorize or conduct on any of your accounts. Notify us immediately at the address and phone number listed on this site if you believe your Access ID or Password has been lost or stolen or that someone has used them without your permission. Contacting us by phone immediately (within 2 business days) is the best way of reducing your possible losses. Remember you have 60 days after your statement was mailed to you to report unauthorized transactions and keep your liability to a minimum.
Mobile Banking and Bill Payment Services
The Bank uses the same security precautions for mobile and bill payment services as for online banking. The Bank will never request your PIN or other sensitive information over the mobile channel. Usernames/userIDs, passwords, or personally identifiable information should not be stored on mobile devices, and Mobile Banking PIN’s are disguised with asterisks to prevent a fraudster from viewing the PIN. In addition, you may only log into Mobile Banking if you also have the correct Internet Banking User Name and the password that is sent via Short Message Service (SMS) each time you sign in. Carrier Message and Data rates may apply. You will have the option to opt out of the message program at any time. For help, text “HELP” to 99588. To cancel, text “STOP” to 99588.
Protecting Your Own Personal Information
The Federal Trade Commission has many good tips on how to lower your risk of identity theft. For your convenience we have listed a few these below:
- Lock your financial documents and records in a safe place at home, and lock your wallet or purse in a safe place at work. Keep your information secure from roommates or workers who come into your home.
- Limit what you carry. When you go out, take only the identification, credit, and debit cards you need. Leave your Social Security card at home. Make a copy of your Medicare card and black out all but the last four digits on the copy. Carry the copy with you – unless you know you are going to need your card at that time.
- Before you share information at your workplace, a business, your child’s school, or a doctor’s office, ask why they need it, how they will safeguard it, and the consequences of not sharing.
- Shred receipts, credit offers, credit applications, insurance forms, physician statements, checks, bank statements, expired charge cards, and similar documents when you don’t need them any longer.
- Destroy labels on prescription bottles before you throw them out.
- Take outgoing mail to post office collection boxes or the post office. Promptly remove mail that arrives in your mailbox. If you won’t be home for several days, request a vacation hold on your mail.
- Consider opting out of prescreened offers of credit and insurance by mail. You can opt out for 5 years or permanently. To opt out, call 1-800-567-8688 or go to http://www.optoutprescreen.com. The 3 nationwide credit reporting companies operate the phone number and website. Prescreened offers can provide many benefits. If you opt out, you may miss out on some offers of credit.
Protect Your Personal Information When Online
If you share your information online, know who you are sharing it with. Don’t give your information out on the phone, mail, or especially the internet, unless you made the contact or you know who you are giving it to. Here are a few suggested guidelines to follow when trying to protect your personal or financial information online:
- Refrain from clicking on any links in an email. By doing so, you may be downloading a computer virus or spyware. Delete emails with attachments from unknown sources. This attempt to gain access to your device to steal your personal information is called “phishing”.
- Never share passwords or codes and change your passwords or codes on a regular basis. Be sure to use passwords/codes that no one could decipher. Use a combination of numbers, lower and upper case letters, and special characters.
- Use encryption software that scrambles information you send over the internet. Look for the “lock” icon on your status bar. This will reassure you that your information will be safe when it’s transmitted.
- Consider using a personal firewall to prevent hackers from invading your personal computer, especially if you are using DSL or a cable modem to access the Internet.
- Install virus protection software and scan all downloaded software, as well as all diskettes and flash drives, before use.
- When completing a transaction, always click on the Logoff button on the Web site to prevent further access to your account.
- Limit what you share on social networking sites. It only takes a little information from someone’s profile to begin a search of that individual.
- Remember: Tennessee Bank and Trust will never contact any customer and request electronic banking credentials. If you get a call asking for your credentials, hang up and call us!
Safe Disposal of Personal Information
At some point, you will update to a new computer or other electronic device and knowing how to get rid of all your personal and financial information from your old device is very important. All you have to do is use a wipe utility program to overwrite the entire hard drive. On a mobile device, always check your owner’s manual or manufacturer’s website for information on how to permanently delete, save or transfer your information. Remove the memory or subscriber identity module (SIM) card from a mobile device. Remove the address book, lists of calls made and received, voicemails, messages sent and received, organizer folders, web search history, and photos.
Forensic Computer Preservation
This is a process of preserving, identifying, analyzing, and documenting computer evidence stored in the form of magnetically encoded information (data) with the objective of uncovering evidence. Relying on this method assists organizations in combating corporate fraud and cybercriminals. Computer forensics and electronic discovery may be used to assist and support criminal case development. There are many steps to an investigation of this nature but the first few steps are the most important in order to successfully uncover electronic evidence:
- Make a Bit Stream Backup
Bit Stream Backups should be completed on all hard disk drives and floppy disks before any evidence is processed. This replicates all areas on a storage device, therefore, all files and data storage are copied. This should be done on a restored copy of the bit stream backup instead of the original computer system for the purpose of leaving the primary evidence untouched.
- Shutting Down the Computer
Time is critical. Shutting down as quickly and efficiently as possible after backup is completed will lessen the chance of critical information being illegally obtained.
- Assignment of Responsibility
A specific person should be responsible for preserving evidence. This includes logging names of individuals who had control of the evidence at any point, securing the computer in a safe location, and taking pictures of the computer to document system hardware components and its connections.
Additional information can be found in the Department of Justice search and seizure manual, Searching and Seizing Computers and Obtaining Electronic Evidence.
Take Quick Action if you are a victim of Identity Theft
If you suspect that someone has been using your personal and/or financial information:
- Notify law enforcement immediately.
- Call us immediately to report any lost or stolen cards, checks and account information so we may block those items.
- Tennessee Bank & Trust – Cool Springs Office – (615) 771-7802
- Tennessee Bank & Trust – Green Hills Office – (615) 298-8000
- Contact the fraud department of the three major credit bureaus.
- Contact the creditors of any accounts that have been misused.
Federal Trade Commission
Visit their website for more helpful suggestions at Deterring, Detecting and Defending against Identity Theft: http://www.ftc.gov/bcp/edu/microsites/idtheft.
Anti-Phishing Working Group
Learn how to avoid phishing scams, what to do if your personal financial information has been given out, and how to report phishing at their website: http://www.Antiphishing.org.
Other tips and suggestions on e-scams, warnings, reporting internet crime and common fraud schemes can be found under the section “Be Crime Smart” at http://www.fbi.gov.
Federal Deposit Insurance Corporation
The FDIC’s Consumer News page has great tips on how to prevent and react to the threat of identity Theft. Visit at: http://fdic.gov/consumers/consumer/news/cnsum13/.
Spotting a Fake Check
Visit http://www.fakechecks.org to learn how to spot a fake check. It’s great for those wanting to learn about checks and for those who have written checks for years.
Credit Bureau Reporting Agencies
Everyone is allowed one free credit report every 12 months from each of the nationwide consumer credit reporting companies. Those companies are: Equifax, TransUnion and Experian. You can request this report through the Annual Credit Report website: http://www.AnnualCreditReport.com.