FDIC-Insured - Backed by the full faith and credit of the U.S. Government
Learn to protect yourself from Identity Theft. American Plus Bank can help. Your identity is one of the most valuable things you own. It’s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft occurs when someone uses your name, address, Social Security Number, credit card or financial account numbers, passwords, and other personal information without your knowledge to commit fraud or other crimes. While the words may sound like a foreign language -- Phishing, Pharming, Vishing, Spyware, Dumpster Diving — they are actually techniques used by thieves to put your identity and finances at risk. And their attacks grow more frequent and sophisticated every year. Identity theft is the fastest growing crime in the United States. According to US Department of Justice statistics, it’s now passing drug trafficking as the number one crime in America.
The simple fact is you can protect yourself against most forms of identity theft. The first step is education. To make it easier to understand, we’ve divided identity theft into the five “Danger Zones.” Take a few moments to learn about each of the Danger Zones and the steps you can take to avoid being a victim.
Phishing is an email scam used to steal your personal information. Email similar to the one pictured may appear in your inbox, claiming to be from your financial institution, credit card company, or another source. It may appear authentic, but be careful - any email requesting personal information or to "verify" account information is usually a scam. Do not respond to this and do not click on any link from this email.
How to spot Phishing and other email scams
Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
The email may instruct you to click on a link, or call a phone number to update your account or even claim a prize.
The message will often threaten a dire consequence if you don’t respond immediately, such as closing your account.
These are clear signs that someone is "Phishing" for your information.
Never respond to any email asking for confidential information, even if it appears urgent. Chances are it is a fraudulent email.
Never click on a link from an email. Instead, type the known Website address into your Internet browser.
Do not call any phone number provided in a suspicious email. It could be a fake phone number.
Always use anti-virus and anti-spyware software on your computer, and keep them up-to-date.
Remember, email is not a secure form of communication. So feel free to use your email, but don’t use it to send or receive confidential information. And if you follow the four basic steps listed, you can protect yourself from most phishing and other email scams.
The Internet is a great place to browse and do business. But it can also be a Danger Zone for identity theft if you don’t know what to watch for or how to protect yourself.
There are several types of Malware – which means malicious software – that can infect your computer as you surf the web including:
These programs are becoming more sophisticated and ingenious in their ability to infect your computer. Many are designed to steal your personal information.
Learn how to practice safe surfing
Follow these steps to protect your computer from the majority of Internet crime:
Following these steps will help protect you from the most common forms of identity theft while surfing the Internet.
The telephone is one of the most often used sources for criminal activity. Here’s how it works. Your phone rings. The caller claims to be from your financial institution, or any other source. They begin asking questions about you and your account. This could be a telephone scam called Vishing. Someone is attempting to steal your identity. And it happens to millions of Americans every year.
Protect yourself from telephone scams
Follow these steps to protect yourself from most types of identity theft telephone scams:
As a general guideline, be highly suspicious anytime you are requested to provide personal information over the phone.
Payment fraud happens when someone uses information from your checks, credit and debit cards, or any other form of payment without your knowledge to commit fraud or other crimes. But this, and other forms of identity theft, can be avoided if you know how to protect yourself.
Avoid being a victim of payment fraud
Don’t make it easy for criminals to steal your personal information. Here are some common sense tips to protect your identity:
Reducing your risk of identity theft starts with protecting your personal information. Keep it from getting into the wrong hands. Always be diligent about protecting your identity.
The simple act of sending and receiving mail, and putting your trash out at night can put your personal information at risk. Financial information, checks, bank account and credit card statements, and monthly bills can be stolen from your home, mailbox or even from your trash, and used to access your accounts and steal your identity. Watch the Video
Follow these steps to protect against identity theft in your home
By following these steps you are on the right track to protecting your identity. Learning about all the identity theft danger zones and the simple steps you can take to avoid being a victim, is the best way to protect your good name.
If your identity has been stolen, you need to take immediate action to limit the damage and protect your good name.
Contact American Plus Bank and other related vendors immediately. Close any accounts that may have been tampered with or opened fraudulently.
Place a fraud alert on your credit report with one of the three major credit bureaus. Also request to review your credit report for suspicious activity. A copy of your credit report of is available free each year from www.annualcreditreport.com.
Equifax: (888) 766-0008
Experian: (888) 397-3742
Trans Union (800) 680-7289
File a complaint with the Federal Trade Commission at www.ftc.gov.
File a report with local police.
Protect yourself against fraudulent transactions
Consumers are protected in a number of ways against unauthorized electronic transactions, but it’s very important to do your part. These protections do not apply to business accounts:
Report lost or stolen debit/ATM cards within two business days.
If you lose your debit/ATM card (or other access device) report it immediately.
By contacting your financial institution within two business days of discovering the loss, you limit your liability to $50. Waiting more than two business days to report the loss increases your liability up to $500.
Important! Review your statement every month.
If you find an unauthorized electronic transaction, you have 60 days to report it to your financial institution in order to limit the amount for which you are liable. If you wait more than 60 days you become liable for the unauthorized transactions. So review your statements every month and report any suspicious activity immediately.
The most important step in Mobile Banking security is treating your mobile device like a portable computer. A few common-sense precautions will help protect you from fraud and I.D. Theft:
Set the phone to require a password to power on the handset or awake it from sleep mode. If it's lost or stolen any personal information stored on the device will be more difficult to access.
Whether you're using the mobile Web or a mobile client, don't let it automatically log you in to your bank account. Otherwise, if your phone is lost or stolen, someone will have free access to your money.
Don't save your password, account number, PIN, answers to secret questions or other such information on the mobile device.
Immediately tell your bank or mobile operator if you lose your phone. The sooner you report the loss, the better protected you are from fraudulent transactions.
Download and install antivirus software for your mobile device, according to the manufacturer's recommendations.
Be careful when downloading Apps. Downloads should always be from a trusted and approved source and endorsed by your mobile device provider.
Avoid "free offers" and "free ringtones." An email or instant message that offers free software downloads, such as ringtones, may contain viruses or malware.
Be cautious of e-mails or text messages from unknown sources asking you to update, validate or confirm your personal details including password and account information. Don't reply to text messages from people or places that you do not know.
Treat your mobile device as carefully as you would for your wallet, cash or credit cards.
Keep track of account transactions. Review your bank statements as regularly as possible to rule out the chances of fraudulent transactions. If you notice discrepancies, contact your bank immediately.
Only use Wi-Fi on your device when connected to password protected hotspots. Turn-off any auto-connect features. They might cause your phone to log into insecure wireless networks without your knowledge.
Make sure you log out of social networking sites and online banking when you’ve finished using them.
Install operating system updates for your device as they become available - they often include security updates.
Before you upgrade or recycle your device, delete all personal/business details. Mobile Banking is a useful tool that can simplify your life and make managing your money incredibly convenient. By using common sense, it can also be a safe and secure part of your daily life.
“Social Engineering” is any method of theft that manipulates your human nature in order to gain access to your online financial accounts. Here are a few ways you can protect yourself from thieves using Social Engineering techniques:
The thieves are smart and very good at exploiting your honesty and natural cooperation. They can send email that looks like it came from a family member, or hijack your best friend's social network account. Don't let your good nature become your downfall.
The best way to avoid Social Engineering schemes is to be cautious and suspicious of ANY request for money.
If you have questions or concerns about Identity Theft Prevention, please visit your local branch during normal banking hours.
Are you taking steps to protect personal information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on five key principals:
Take stock. Know what personal information you have in your files and on your computers.
Scale down. Keep only what you need for your business.
Lock it. Protect the information in your care.
Pitch it. Properly dispose of what you no longer need.
Plan ahead. Create a plan to respond to security incidents.
Good practices can keep your information secure.
Corporate Account Takeover is a form of identity theft in which criminals steal your valid online banking credentials. The attacks are usually stealthy and quiet. Malware introduced into your systems may be undetected for weeks or months. Account-draining transfers using stolen credentials may happen at a time when they are not noticed for a day or two.
The good news is, if you follow sound business practices, you can protect your company:
Manage the security of online banking with a single, dedicated computer used exclusively for online banking and cash management. The computer should not be connected to your business network, should not retrieve any email messages, and should not be used for any online purpose except banking.
Educate your employees about cybercrimes. Make sure your employees understand that just one infected computer can lead to an account takeover. Make them very conscious of the risk, and teach them to ask the question: "Does this email or phone call make sense?" before they open attachments or provide information.
Block access to unnecessary or high-risk websites. Prevent access to any website that features adult entertainment, online gaming, social networking and personal email. All such sites can inject files into your network.
Establish separate user accounts for every employee accessing financial information and limit administrative rights. If your user permissions for online banking include administrative rights, don't use those credentials for day-to-day processing.
Use approval tools in cash management to create dual control on payments. Requiring two people to issue a payment - one to set up the transaction and a second to approve the transaction - doubles the chance of stopping a criminal from draining your account.
Review or reconcile accounts online daily. The sooner you find suspicious transactions, the sooner the theft can be investigated.
The most important step in Mobile Banking security is treating your company mobile devices like portable computers.
A few common-sense precautions will help protect you from fraud and theft:
Set the phone to require a password to power on the handset or awake it from sleep mode. If it's lost or stolen, any confidential information stored on the device will be more difficult to access.
Whether you're using the mobile Web or a mobile client, don't let it automatically log you in to company bank accounts. Otherwise, if your phone is lost or stolen, someone will have free access to your money.
Don't save your password, account number, PIN, answers to secret questions or other such information on the mobile device.
Immediately tell your bank and mobile operator if you lose your phone. The sooner you report the loss, the better protected you are from fraudulent transactions.
Download and install antivirus software for your mobile device, according to the manufacturer's recommendations.
Be careful when downloading Apps. Downloads should always be from a trusted and approved source, and endorsed by your mobile device provider.
Avoid "free offers" and "free ringtones". An email or instant message that offers free software downloads, such as ringtones, may contain viruses or malware.
Be cautious of e-mails or text messages from unknown sources asking you to update, validate or confirm your personal details including password and account information. Don't reply to text messages from people or places that you do not know.
Treat your mobile device as carefully as you would for your wallet, cash or credit cards.
Keep track of account transactions. Review your bank statements as regularly as possible to rule out the chances of fraudulent transactions. If you notice discrepancies, contact your bank immediately.
Only use Wi-Fi on your device when connected to password protected hotspots. Turn-off any auto-connect features. They might cause your phone to log into insecure wireless networks without your knowledge.
Make sure you log out of social networking sites and online banking when you've finished using them.
Install operating system updates for your device as they become available - they often include security updates.
Before you upgrade or recycle your device, delete all personal/business details.
Mobile Banking is a useful tool for your business, and can make managing your money incredibly convenient. By using common sense, it can also be a safe and secure part of your daily operations.
"Social Engineering" is any method of theft that manipulates human nature in order to gain access to your online financial accounts. No business is immune to the risks of Social Engineering attacks, and thieves will go to great lengths to lower your guard. Here are a few ways you can protect yourself from thieves using Social Engineering techniques:
The best way to avoid Social Engineering schemes is to be cautious about any unknown visitor, and any request for money, passwords, account numbers or other confidential information - no matter where it seems to be coming from.
Know what personal information you have in your files and on your computers.
Keep only what you need for your business.
Properly dispose of what you no longer need.
Protect yourself against fraudulent transactions
Important! Review your statement every month.
If you find an unauthorized electronic transaction, you have 60 days to report it to your financial institution in order to limit the amount for which you are liable. If you wait more than 60 days you become liable for the unauthorized transactions. So review your statements every month and report any suspicious activity immediately.
Perform a risk assessment and controls evaluation
You can perform a risk assessment and controls evaluation periodically by using the below "Internet Security Assessment" questions.
INTERNET SECURITY ASSESSMENT
Rev. 6/2017
Facts | What does AMERICAN PLUS BANK, N.A. do with your personal information? |
Why? | Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do. |
What? | The types of personal information we collect and share depend on the product or service you have with us. This information can include:
When you are no longer our customer, we continue to share your information as described in this notice. |
How? | All financial companies need to share customers’ personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customers’ personal information; the reasons American Plus Bank, N.A. chooses to share; and whether you can limit this sharing. |
Reasons we can share your personal information | Does American Plus Bank, N.A. share? | Can you limit this sharing? |
For our everyday business purposes— such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus | Yes | No |
For our marketing purposes — to offer our products and services to you | No | No |
For joint marketing with other financial companies | No | We don't share |
For our affiliates’ everyday business purposes — information about your transactions and experiences | No | We don't share |
For our affiliates’ everyday business purposes — information about your creditworthiness | No | We don't share |
For our affiliates to market to you | No | We don't share |
For non-affiliates to market to you | No | We don’t share |
Questions? | Call (626) 821-9188 or go to www.bankaplus.com |
Who We Are | |
Who is providing this notice? | American Plus Bank N.A. |
What we do | |
How does American Plus Bank, N.A. protect my personal information? | To protect your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings. |
How does American Plus Bank, N.A. collect my personal information? | We collect your personal information, for example, when you
We also collect your personal information from others, such as credit bureaus, or other companies. |
Why can’t I limit all sharing? | Federal law gives you the right to limit only
State laws and individual companies may give you additional rights to limit sharing. See below for more on your rights under state law |
Definitions | |
Affiliates | Companies related by common ownership or control. They can be financial and nonfinancial companies.
|
Non-affiliates | Companies not related by common ownership or control. They can be financial and nonfinancial companies.
|
Joint Marketing | A formal agreement between non-affiliated financial companies that together market financial products or services to you.
|
Other Important Information
Under California law, we will not share information we collect about you with companies outside of American Plus Bank, N.A., unless the law allows. |