SlideShare a Scribd company logo
SECURITY:
ACCESS AND
PAYMENT METHODS
By implementing simple
measures to mitigate
fraud. Thwarting fraud
by limiting the victims.
Taking further precau-
tions. And fewer risks.
Strengthening your
online security means
working together toward
a single purpose: protect-
ing your assets and your
data. That’s why we have
a few indications and
security measures to
recommend. That’s why
you should apply them.
Because at Desjardins,
we do everything in our
power to protect you.
Because you too have the
power and the responsi-
bility to protect yourself.
TABLE OF CONTENTS

Desjardins takes broad steps .................................4

Desjardins Access Card ...........................................5

   Basic security rules when you
   use your Desjardins Access Card ...........................5

At the ATM and merchants .....................................6

   Criminals want your PIN...
   and your money ...................................................6

   How can you protect yourself? .............................6

   Desjardins measures to ensure
   increased protection .............................................7

AccèsD Internet: for optimum security...................8

   How do they do it?...............................................8

   Protect yourself.....................................................8

   Desjardins strikes back ..........................................9

Fraudulent e-mail...................................................11

   Scammers are learning new tricks too... .............11

   Don’t fall into the trap........................................12

AccèsD Telephone.................................................13

Telephone solicitation............................................14

   Typical case .........................................................14

   The Desjardins way .............................................14

   Your best weapons .............................................14

Here are some important resources .....................15




                                                                         3
DESJARDINS TAKES BROAD STEPS
At Desjardins, we spare no effort to ensure your
security and confidentiality when you carry out
transactions, whether it’s at your caisse, at the ATM,
on the Internet, by telephone or at merchants when
you use direct payment.

Our online transactional services meet the highest
security standards in the financial industry and
comply with the Act Respecting the Protection
of Personal Information in the Private Sector.
Reliable, proven technologies are used to protect
your information should an alteration, loss or
unauthorized access occur.

No matter how effective, all protection systems
require a minimum of secure behaviour from the
user so that the measures in place provide their
full advantage. The indications to be followed are
generally simple and undemanding. You need only
be well-informed, which can be accomplished by
reading the following few pages. Among other
things, you will learn how to prevent criminals
from posing as you to carry out transactions with
merchants, Desjardins and other financial institutions.



As a member of the Interac Association,
Desjardins participates in awareness activities
regarding the protection of debit card PINs. That’s
why we post the new “Protect your PIN” icon.




4
DESJARDINS ACCESS CARD
Basic security rules when you use
your Desjardins Access Card
The basic rules to follow to protect your money
are very simple:

1)    Don’t lend your Access Card to anyone.

2)    If your card is lost, stolen or withheld by
      an ATM, immediately notify your caisse or
      call 1 800 CAISSES.

3)    Regularly verify your statements and balances
      to be sure that all the transactions were
      actually made by you. If you see any
      fraudulent entries, quickly contact your
      caisse or dial 1 800 CAISSES.

4)    Never give your PIN (personal identification
      number for use at ATMs and direct payment
      terminals) or your passwords (codes to enter
      AccèsD Internet and Telephone) to anyone.
      No financial institution, police officer,
      Desjardins representative or merchant
      is authorized to ask for your PIN or
      AccèsD passwords. They are yours
      and yours alone.

5)    Do not select a PIN or a password that is
      easy to guess, like your address, telephone
      number or date of birth.

6)    Memorize your PIN and passwords; do not
      write them down anywhere.

7)    Be discreet: hide the keypad with your hand
      or body when you enter your PIN.

8)    Do not enter your PIN a second time
      without first making sure the transaction
      was cancelled and getting your statement.




                                                     5
9)    Never lose sight of your card during
      a transaction.

10) Take your card and the statement at the
      end of the transaction.

11) Change your PIN and passwords right away,
      if you suspect that someone watched you
      enter any of them on the keypad. You can
      make these changes 24 hours a day at any
      Automatic Teller Machine (ATM).


AT THE ATM AND MERCHANTS
Criminals want your PIN...
and your money.
Defrauders are big on guts and imagination. How do
they do it?

Cards can be copied and cloned at ATMs or at
merchants during transactions. Then the thief tries
to obtain your PIN when you enter it on the keypad.

How can you protect yourself?
The three best ways to protect yourself from card
cloning are simple:

• Protect your PIN by following the above
  basic rules
• Never lose sight of your card during a transaction
• Take your card and the statement after
  each transaction




6
Desjardins measures to ensure
increased protection
To reduce the amounts that can be fraudulently
withdrawn from your account, Desjardins has put
the following solutions in place:

• The default total amount for ATM withdrawals
  from other Canadian financial institutions is
  set at $300 Canadian* per day. For additional
  withdrawals, you can go to a Desjardins ATM.**
• The default total amount for ATM withdrawals
  from other financial institutions outside
  Canada is $500 Canadian* per day.
• The default direct payment purchase limit
  (including withdrawals) at merchants is set
  at $1,000 Canadian* per day.
• For certain types of transactions–withdrawals,
  deposits, transfers – at Desjardins ATMs, you
  must confirm your identity by entering your
  day and month of birth.

For further information on these limits, contact
your caisse directly.


NEVER DISCLOSE YOUR PIN,
EVEN TO A DESJARDINS EMPLOYEE.




* May change without prior notice.
** Unless you have reached an agreement to the contrary with your caisse.


                                                                       7
ACCÈSD INTERNET:
FOR OPTIMUM SECURITY
When you use AccèsD Internet, you navigate in com-
plete security. Our transactional services and online
applications meet the highest security standards. But
you must be vigilant. Despite these precautions, you
must carry out the necessary actions to secure your
computer. Here is some advice to better arm you
against cybercriminals who might attempt to steal
your identity and your assets.

How do they do it?
Defrauders use different methods to get your
confidential information:
• fraudulent e-mail or site posting a false logo
  or image of a company you know or already
  do business with
• exchanges in a discussion forum
• computer viruses and spyware

Data collected about the victim can include passwords,
credit or debit card numbers, social insurance
numbers, dates of birth and personal information.
This data is then sold to criminals or used to access
credit, chequing or savings accounts, for example.

Protect yourself
Here are steps to take to reduce your risk of
becoming a victim of Internet fraud:
• Never use the automatic entry and password
  memorization tools available in your browser.
• Change your password regularly – every month
  and IMMEDIATELY if you suspect that someone
  might know it.
• Equip yourself with known antivirus and
  anti-spyware programs and a firewall, and
  keep them up-to-date.
• Manually type www.desjardins.com and then click
  on the AccèsD logo.




8
• Make sure you see the “s” in the address bar
  on the AccèsD Website before entering your
  password.
• Be certain the address begins with
  https://accesd.desjardins.com
• Terminate your session properly by clicking on
  Log off at the top of the screen and close your
  browser; that way you destroy all copies of Web
  pages stored on your hard disk and therefore
  prevent any dishonest or accidental viewing of
  your accounts.
• Empty your memory cache (see
  www.desjardins.com/security for further
  explanation) and avoid using a public or shared
  computer.
• When you need to delete documents containing
  personal and confidential information, like your
  account or credit card statements, make sure
  they are completely deleted.

Desjardins strikes back
Desjardins uses the most advanced technologies
to ensure your security on AccèsD Internet:
• Two-way authentication
  After entering your Access Card number on the
  AccèsD home page, Desjardins systems will begin
  the computer recognition process – these systems
  recognize the computer(s) you usually use. If your
  computer is recognized, you will then be asked to
  enter your password to have access to your
  account information. However, if a connection
  attempt is made from an unrecognized computer,
  you will be asked one of the previously established
  personal questions in order for Desjardins to iden-
  tify you.


• Transaction encryption
  All operations carried out with our online
  transactional services are encrypted to 128 bits
  using the best market practices to ensure confi-
  dentiality when information circulates between
  our secure site and your PC browser.

                                                     9
• Security of online transactions
     The electronic transactions you carry out with
     Desjardins are stored on our servers. That means
     that they are secure, and none of the related
     information can be intercepted by a third party.
• Security seal
     Make sure you always navigate in a secure
     environment when you transmit confidential
     information.
     1. You must see an “s” on https://
     2. The field name must automatically begin by
        https://accesd.desjardins.com
     3. You must see the browser’s security seal
        (closed padlock)
     The security seal can appear in different
     places depending on the browser used. Visit
     www.desjardins.com/security to find out more.
     Once you’ve found the padlock, click on it to view
     the site’s security certificate. You should be able
     to read the name of the site’s owner (for AccèsD:
     https://accesd.desjardins.com/en/accesd) and the
     certificate’s validity period.

• Confirmation number
     A confirmation number is given after each
     transaction. It confirms that the transaction
     was carried out or that Desjardins has received
     your request.

• Automatic storing of all transactions
     All transactions you carry out on AccèsD Internet
     are saved and appear on your monthly statement
     of account. That way, you can keep an eye on
     your account activity.


NEVER GIVE YOUR ACCÈSD PASSWORDS
TO ANYONE, EVEN A POLICE OFFICER.




10
FRAUDULENT E-MAIL
Criminals quickly recognized the power of e-mail.
It has even become a well-known tactic to incite
Internet users to reveal personal and confidential
information.

Fraudulent e-mail messages, which look like
legitimate messages, suggest users click on a link
or attachment for reasons such as:

• to change or update personal information
• to register as a finalist in a contest
• to avoid a possible suspension of their card
  or account
• to apply for a product or service
• to deal with an expired account
• to deal with a fraud or an error in their account

After accepting this invitation, users are then
directed to a false Web site where they are asked
to provide information such as:

• ATM card number
• credit card number
• AccèsD password
• social insurance number
• date of birth
• e-mail address




                                                      11
Don’t fall into the trap
• Never disclose your personal identification
  numbers (PIN), AccèsD passwords, social insurance
  number, date of birth or any other personal
  information, whether related to your AccèsD
  file or not.
• To access AccèsD, manually type
  www.desjardins.com and then click on the
  AccèsD logo. Never click on a link in an
  e-mail message.
Have you received an e-mail you believe to be fraud-
ulent? Forward it to us at phishing@desjardins.com.
Please note that you will receive an automatic
response to e-mails sent to this address. Caution: do
not include any confidential information in this e-
mail.

Important
Desjardins has implemented a 24-hour, 7-day
active surveillance system to ensure quick
reaction if fraudulent e-mail is detected.
Furthermore, Desjardins is doing everything
possible to protect its Internet service users
from all types of fraud.

It is not Desjardins’ practice to solicit Internet
service users through e-mail to their personal
address or by other means to obtain their
confidential information. However, it is possible
that your caisse or a Desjardins subsidiary
contacts you via your AccèsD message box.
Because they are protected by the AccèsD
secure environment, these messages are
highly secure.




12
ACCÈSD TELEPHONE
To avoid fraud by means of AccèsD Telephone,
Desjardins set up the following procedures:

• telephone numbers exclusive to Desjardins:
  1 800 CAISSES and (514) JACCÈSD (522-2373)
• measures to authenticate members when
  information is exchanged:
  When you call, a recorded voice asks you to
  choose among various options, each of which
  has a corresponding number. By pressing 1, you
  are in autonomous mode: the audio response
  unit indicates the steps to take for a simple
  transaction, such as a transfer or bill payment;
  the system will ask for your Access Card number
  and password. If you pressed 2, 3 or 4 for more
  complex transactions, the system directs you
  to the specialized agent who can best meet
  your needs.
• Confirmation number
  A confirmation number is given after each
  transaction. It confirms that the transaction
  was carried out or that Desjardins has received
  your request.
• Automatic storing of all transactions
  All transactions you carry out on AccèsD are saved
  and appear on your monthly statement of
  account. That way, you can keep an eye on
  your account activity.
• Security of telephone transactions
  The electronic transactions you carry out with
  Desjardins are stored on our servers. That means
  that they are secure, and none of the related
  information can be intercepted by a third.

You can talk directly to an officer at any time by
dialing 0. All calls are recorded.




                                                     13
TELEPHONE SOLICITATION
When someone solicits you by phone, be vigilant
and watch out for people who pretend to be
representatives of a company that you do business
with or a known organization that you support.

Typical case
Telephone con artists are very good at making
people believe they are someone else. Some go
as far as using the telephone number of a trusted
company on the call display! They use excuses such
as a financial emergency, a contest won by the
victim or missing data in a file to obtain personal
information. Once they get this information, they
try, and often succeed, to pull off a scam.

The Desjardins way
A Desjardins telemarketing agent may very well
contact you one day to explain the benefits of
one of our products. Stick to the following recom-
mendations so you can be alert and give no
chances to criminals.

Your best weapons
No agent will ever ask you to disclose your
personal identification number (PIN) or your AccèsD
passwords (Internet or Telephone) or other personal
information such as your date of birth and social
insurance number.
Reminder: No financial institution, police officer,
Desjardins representative or merchant is authorized to
ask you for your PIN or AccèsD passwords. Passwords
are intended to be verified by automated systems,
not by people.




14
HERE ARE SOME
IMPORTANT RESOURCES:
• Competition Bureau, 1 800 348-5358,
  www.bc-cb.gc.ca
• RCMP – Reporting Economic Crime On-Line,
  1 888 495-8501, www.recol.ca

These credit bureaus and other organizations
will register a fraud indicator in your file:
• Equifax: 1 800 465-7166
• TransUnion:
  - in Québec: 1 877 713-3393
  - outside Québec: 1 877 525-3823
• Local police authorities, companies that issue
  credit cards, banks and provincial archives




For more details,
visit www.desjardins.com/security.


Or


Call 1-800-CAISSES.

                                                   15
If…
You are a victim of identity
theft or fraud...
You are a victim of phishing...
Call Desjardins Card Services
right away.

Montréal and surrounding area: 514-397-4415
Canada and the United States: 1-800-363-3380
Other countries: 514-397-4610 (collect) or
contact VISA’s world-wide customer service
department




      Committed to sustainable development, Desjardins Group favours
      the use of paper that is manufactured in Canada in accordance
30%   with recognized environmental standards.
                                                                       33050144 (01-09)

More Related Content

What's hot

Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
Mikael Wagner
 
Cyber cash
Cyber cashCyber cash
Tokenization
Tokenization Tokenization
Tokenization
Sholly Inglis
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
Dilip Kumar
 
Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackChip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attack
- Mark - Fullbright
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
Ujwal Tamminedi
 
Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
Shaillender (Bob) Mittal, CPSP
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...
Ainsley Ward
 
Secure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the WebSecure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the Web
SafeNet
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
Silly Beez
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)DCIT, a.s.
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminardlinehan2
 
Identity theft
Identity theftIdentity theft
Identity theft
Nick Chandi
 
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...
aditi agarwal
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Ivona M
 

What's hot (18)

Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
Tokenization
Tokenization Tokenization
Tokenization
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackChip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attack
 
Atm theft
Atm theftAtm theft
Atm theft
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
 
Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...
 
Malware mitigation
Malware mitigationMalware mitigation
Malware mitigation
 
Secure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the WebSecure PIN Management How to Issue and Change PINs Securely over the Web
Secure PIN Management How to Issue and Change PINs Securely over the Web
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminar
 
Identity theft
Identity theftIdentity theft
Identity theft
 
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
 

Viewers also liked

Exemple facebook pontivyjournal
Exemple facebook pontivyjournalExemple facebook pontivyjournal
Exemple facebook pontivyjournaltdeszpot
 
Renungan hidup
Renungan hidupRenungan hidup
Renungan hidupSnchs V
 
الشباب و إصلاح المؤسسات التعليمية
 	  الشباب و إصلاح المؤسسات التعليمية  	  الشباب و إصلاح المؤسسات التعليمية
الشباب و إصلاح المؤسسات التعليمية PDPTunisie
 
Patrice Ribaut --- Portfolio
Patrice Ribaut --- PortfolioPatrice Ribaut --- Portfolio
Patrice Ribaut --- Portfolio
Patrice Ribaut
 
Bebob 3D remote
Bebob 3D remoteBebob 3D remote
Bebob 3D remoteAVNed
 
Motorola solutions ap621 access point installation guide (part no. 72 e 15545...
Motorola solutions ap621 access point installation guide (part no. 72 e 15545...Motorola solutions ap621 access point installation guide (part no. 72 e 15545...
Motorola solutions ap621 access point installation guide (part no. 72 e 15545...Advantec Distribution
 
Martí Ribot, Xavi Pozo, Gerard Melis, preguntas antología
Martí Ribot, Xavi Pozo, Gerard Melis, preguntas antologíaMartí Ribot, Xavi Pozo, Gerard Melis, preguntas antología
Martí Ribot, Xavi Pozo, Gerard Melis, preguntas antología4esopalamos
 
Beer Me Up Scotty - CS5551 Enterprise Computing
Beer Me Up Scotty - CS5551 Enterprise ComputingBeer Me Up Scotty - CS5551 Enterprise Computing
Beer Me Up Scotty - CS5551 Enterprise Computing
Vincent Li
 
Trix eros
Trix erosTrix eros
Trix erosAVNed
 
Swit S-1051C/H + S-1071C
Swit S-1051C/H + S-1071CSwit S-1051C/H + S-1071C
Swit S-1051C/H + S-1071CAVNed
 
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?
Jean-François Fiorina
 

Viewers also liked (20)

Bilan economie emploi
Bilan economie emploiBilan economie emploi
Bilan economie emploi
 
Exemple facebook pontivyjournal
Exemple facebook pontivyjournalExemple facebook pontivyjournal
Exemple facebook pontivyjournal
 
André
AndréAndré
André
 
Renungan hidup
Renungan hidupRenungan hidup
Renungan hidup
 
الشباب و إصلاح المؤسسات التعليمية
 	  الشباب و إصلاح المؤسسات التعليمية  	  الشباب و إصلاح المؤسسات التعليمية
الشباب و إصلاح المؤسسات التعليمية
 
Investment
InvestmentInvestment
Investment
 
Patrice Ribaut --- Portfolio
Patrice Ribaut --- PortfolioPatrice Ribaut --- Portfolio
Patrice Ribaut --- Portfolio
 
Ouvrir
OuvrirOuvrir
Ouvrir
 
Bebob 3D remote
Bebob 3D remoteBebob 3D remote
Bebob 3D remote
 
Motorola solutions ap621 access point installation guide (part no. 72 e 15545...
Motorola solutions ap621 access point installation guide (part no. 72 e 15545...Motorola solutions ap621 access point installation guide (part no. 72 e 15545...
Motorola solutions ap621 access point installation guide (part no. 72 e 15545...
 
The Spanish Martin
The Spanish MartinThe Spanish Martin
The Spanish Martin
 
Sida
SidaSida
Sida
 
Martí Ribot, Xavi Pozo, Gerard Melis, preguntas antología
Martí Ribot, Xavi Pozo, Gerard Melis, preguntas antologíaMartí Ribot, Xavi Pozo, Gerard Melis, preguntas antología
Martí Ribot, Xavi Pozo, Gerard Melis, preguntas antología
 
Beer Me Up Scotty - CS5551 Enterprise Computing
Beer Me Up Scotty - CS5551 Enterprise ComputingBeer Me Up Scotty - CS5551 Enterprise Computing
Beer Me Up Scotty - CS5551 Enterprise Computing
 
Trix eros
Trix erosTrix eros
Trix eros
 
spain 2
spain 2spain 2
spain 2
 
Swit S-1051C/H + S-1071C
Swit S-1051C/H + S-1071CSwit S-1051C/H + S-1071C
Swit S-1051C/H + S-1071C
 
Planificacion De Proyectos de SW
Planificacion De Proyectos de SWPlanificacion De Proyectos de SW
Planificacion De Proyectos de SW
 
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?
 
Paris
ParisParis
Paris
 

Similar to Security access and payments methods

Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Donald E. Hester
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
- Mark - Fullbright
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
Fit Small Business
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
WebSitePulse
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
David Atkinson
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
Mohd. Ahmad Siddiqi
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
BluePayProcessing
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
- Mark - Fullbright
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
Jermaine Smith
 
8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling
letzpooja
 
Asto card into
Asto card intoAsto card into
Asto card into
IB Kang
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
Tri-State Better Business Bureau
 
Hsbc E business
Hsbc E businessHsbc E business
Hsbc E business
Namit Sahai
 
Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)azmatmengal
 

Similar to Security access and payments methods (20)

Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Skimming is a Scam
Skimming is a ScamSkimming is a Scam
Skimming is a Scam
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling8 ways to protect yourself from credit card theft while travelling
8 ways to protect yourself from credit card theft while travelling
 
Asto card into
Asto card intoAsto card into
Asto card into
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Hsbc E business
Hsbc E businessHsbc E business
Hsbc E business
 
Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)Final eb ch 09 encryption and e payments modes (2)
Final eb ch 09 encryption and e payments modes (2)
 

Recently uploaded

Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
DOT TECH
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
DOT TECH
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
beulahfernandes8
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
morearsh02
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
DOT TECH
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
Avanish Goel
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
How to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docxHow to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docx
Buy bitget
 

Recently uploaded (20)

Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
 
how can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securelyhow can I sell/buy bulk pi coins securely
how can I sell/buy bulk pi coins securely
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf655264371-checkpoint-science-past-papers-april-2023.pdf
655264371-checkpoint-science-past-papers-april-2023.pdf
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
How to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docxHow to get verified on Coinbase Account?_.docx
How to get verified on Coinbase Account?_.docx
 

Security access and payments methods

  • 2. By implementing simple measures to mitigate fraud. Thwarting fraud by limiting the victims. Taking further precau- tions. And fewer risks. Strengthening your online security means working together toward a single purpose: protect- ing your assets and your data. That’s why we have a few indications and security measures to recommend. That’s why you should apply them. Because at Desjardins, we do everything in our power to protect you. Because you too have the power and the responsi- bility to protect yourself.
  • 3. TABLE OF CONTENTS Desjardins takes broad steps .................................4 Desjardins Access Card ...........................................5 Basic security rules when you use your Desjardins Access Card ...........................5 At the ATM and merchants .....................................6 Criminals want your PIN... and your money ...................................................6 How can you protect yourself? .............................6 Desjardins measures to ensure increased protection .............................................7 AccèsD Internet: for optimum security...................8 How do they do it?...............................................8 Protect yourself.....................................................8 Desjardins strikes back ..........................................9 Fraudulent e-mail...................................................11 Scammers are learning new tricks too... .............11 Don’t fall into the trap........................................12 AccèsD Telephone.................................................13 Telephone solicitation............................................14 Typical case .........................................................14 The Desjardins way .............................................14 Your best weapons .............................................14 Here are some important resources .....................15 3
  • 4. DESJARDINS TAKES BROAD STEPS At Desjardins, we spare no effort to ensure your security and confidentiality when you carry out transactions, whether it’s at your caisse, at the ATM, on the Internet, by telephone or at merchants when you use direct payment. Our online transactional services meet the highest security standards in the financial industry and comply with the Act Respecting the Protection of Personal Information in the Private Sector. Reliable, proven technologies are used to protect your information should an alteration, loss or unauthorized access occur. No matter how effective, all protection systems require a minimum of secure behaviour from the user so that the measures in place provide their full advantage. The indications to be followed are generally simple and undemanding. You need only be well-informed, which can be accomplished by reading the following few pages. Among other things, you will learn how to prevent criminals from posing as you to carry out transactions with merchants, Desjardins and other financial institutions. As a member of the Interac Association, Desjardins participates in awareness activities regarding the protection of debit card PINs. That’s why we post the new “Protect your PIN” icon. 4
  • 5. DESJARDINS ACCESS CARD Basic security rules when you use your Desjardins Access Card The basic rules to follow to protect your money are very simple: 1) Don’t lend your Access Card to anyone. 2) If your card is lost, stolen or withheld by an ATM, immediately notify your caisse or call 1 800 CAISSES. 3) Regularly verify your statements and balances to be sure that all the transactions were actually made by you. If you see any fraudulent entries, quickly contact your caisse or dial 1 800 CAISSES. 4) Never give your PIN (personal identification number for use at ATMs and direct payment terminals) or your passwords (codes to enter AccèsD Internet and Telephone) to anyone. No financial institution, police officer, Desjardins representative or merchant is authorized to ask for your PIN or AccèsD passwords. They are yours and yours alone. 5) Do not select a PIN or a password that is easy to guess, like your address, telephone number or date of birth. 6) Memorize your PIN and passwords; do not write them down anywhere. 7) Be discreet: hide the keypad with your hand or body when you enter your PIN. 8) Do not enter your PIN a second time without first making sure the transaction was cancelled and getting your statement. 5
  • 6. 9) Never lose sight of your card during a transaction. 10) Take your card and the statement at the end of the transaction. 11) Change your PIN and passwords right away, if you suspect that someone watched you enter any of them on the keypad. You can make these changes 24 hours a day at any Automatic Teller Machine (ATM). AT THE ATM AND MERCHANTS Criminals want your PIN... and your money. Defrauders are big on guts and imagination. How do they do it? Cards can be copied and cloned at ATMs or at merchants during transactions. Then the thief tries to obtain your PIN when you enter it on the keypad. How can you protect yourself? The three best ways to protect yourself from card cloning are simple: • Protect your PIN by following the above basic rules • Never lose sight of your card during a transaction • Take your card and the statement after each transaction 6
  • 7. Desjardins measures to ensure increased protection To reduce the amounts that can be fraudulently withdrawn from your account, Desjardins has put the following solutions in place: • The default total amount for ATM withdrawals from other Canadian financial institutions is set at $300 Canadian* per day. For additional withdrawals, you can go to a Desjardins ATM.** • The default total amount for ATM withdrawals from other financial institutions outside Canada is $500 Canadian* per day. • The default direct payment purchase limit (including withdrawals) at merchants is set at $1,000 Canadian* per day. • For certain types of transactions–withdrawals, deposits, transfers – at Desjardins ATMs, you must confirm your identity by entering your day and month of birth. For further information on these limits, contact your caisse directly. NEVER DISCLOSE YOUR PIN, EVEN TO A DESJARDINS EMPLOYEE. * May change without prior notice. ** Unless you have reached an agreement to the contrary with your caisse. 7
  • 8. ACCÈSD INTERNET: FOR OPTIMUM SECURITY When you use AccèsD Internet, you navigate in com- plete security. Our transactional services and online applications meet the highest security standards. But you must be vigilant. Despite these precautions, you must carry out the necessary actions to secure your computer. Here is some advice to better arm you against cybercriminals who might attempt to steal your identity and your assets. How do they do it? Defrauders use different methods to get your confidential information: • fraudulent e-mail or site posting a false logo or image of a company you know or already do business with • exchanges in a discussion forum • computer viruses and spyware Data collected about the victim can include passwords, credit or debit card numbers, social insurance numbers, dates of birth and personal information. This data is then sold to criminals or used to access credit, chequing or savings accounts, for example. Protect yourself Here are steps to take to reduce your risk of becoming a victim of Internet fraud: • Never use the automatic entry and password memorization tools available in your browser. • Change your password regularly – every month and IMMEDIATELY if you suspect that someone might know it. • Equip yourself with known antivirus and anti-spyware programs and a firewall, and keep them up-to-date. • Manually type www.desjardins.com and then click on the AccèsD logo. 8
  • 9. • Make sure you see the “s” in the address bar on the AccèsD Website before entering your password. • Be certain the address begins with https://accesd.desjardins.com • Terminate your session properly by clicking on Log off at the top of the screen and close your browser; that way you destroy all copies of Web pages stored on your hard disk and therefore prevent any dishonest or accidental viewing of your accounts. • Empty your memory cache (see www.desjardins.com/security for further explanation) and avoid using a public or shared computer. • When you need to delete documents containing personal and confidential information, like your account or credit card statements, make sure they are completely deleted. Desjardins strikes back Desjardins uses the most advanced technologies to ensure your security on AccèsD Internet: • Two-way authentication After entering your Access Card number on the AccèsD home page, Desjardins systems will begin the computer recognition process – these systems recognize the computer(s) you usually use. If your computer is recognized, you will then be asked to enter your password to have access to your account information. However, if a connection attempt is made from an unrecognized computer, you will be asked one of the previously established personal questions in order for Desjardins to iden- tify you. • Transaction encryption All operations carried out with our online transactional services are encrypted to 128 bits using the best market practices to ensure confi- dentiality when information circulates between our secure site and your PC browser. 9
  • 10. • Security of online transactions The electronic transactions you carry out with Desjardins are stored on our servers. That means that they are secure, and none of the related information can be intercepted by a third party. • Security seal Make sure you always navigate in a secure environment when you transmit confidential information. 1. You must see an “s” on https:// 2. The field name must automatically begin by https://accesd.desjardins.com 3. You must see the browser’s security seal (closed padlock) The security seal can appear in different places depending on the browser used. Visit www.desjardins.com/security to find out more. Once you’ve found the padlock, click on it to view the site’s security certificate. You should be able to read the name of the site’s owner (for AccèsD: https://accesd.desjardins.com/en/accesd) and the certificate’s validity period. • Confirmation number A confirmation number is given after each transaction. It confirms that the transaction was carried out or that Desjardins has received your request. • Automatic storing of all transactions All transactions you carry out on AccèsD Internet are saved and appear on your monthly statement of account. That way, you can keep an eye on your account activity. NEVER GIVE YOUR ACCÈSD PASSWORDS TO ANYONE, EVEN A POLICE OFFICER. 10
  • 11. FRAUDULENT E-MAIL Criminals quickly recognized the power of e-mail. It has even become a well-known tactic to incite Internet users to reveal personal and confidential information. Fraudulent e-mail messages, which look like legitimate messages, suggest users click on a link or attachment for reasons such as: • to change or update personal information • to register as a finalist in a contest • to avoid a possible suspension of their card or account • to apply for a product or service • to deal with an expired account • to deal with a fraud or an error in their account After accepting this invitation, users are then directed to a false Web site where they are asked to provide information such as: • ATM card number • credit card number • AccèsD password • social insurance number • date of birth • e-mail address 11
  • 12. Don’t fall into the trap • Never disclose your personal identification numbers (PIN), AccèsD passwords, social insurance number, date of birth or any other personal information, whether related to your AccèsD file or not. • To access AccèsD, manually type www.desjardins.com and then click on the AccèsD logo. Never click on a link in an e-mail message. Have you received an e-mail you believe to be fraud- ulent? Forward it to us at phishing@desjardins.com. Please note that you will receive an automatic response to e-mails sent to this address. Caution: do not include any confidential information in this e- mail. Important Desjardins has implemented a 24-hour, 7-day active surveillance system to ensure quick reaction if fraudulent e-mail is detected. Furthermore, Desjardins is doing everything possible to protect its Internet service users from all types of fraud. It is not Desjardins’ practice to solicit Internet service users through e-mail to their personal address or by other means to obtain their confidential information. However, it is possible that your caisse or a Desjardins subsidiary contacts you via your AccèsD message box. Because they are protected by the AccèsD secure environment, these messages are highly secure. 12
  • 13. ACCÈSD TELEPHONE To avoid fraud by means of AccèsD Telephone, Desjardins set up the following procedures: • telephone numbers exclusive to Desjardins: 1 800 CAISSES and (514) JACCÈSD (522-2373) • measures to authenticate members when information is exchanged: When you call, a recorded voice asks you to choose among various options, each of which has a corresponding number. By pressing 1, you are in autonomous mode: the audio response unit indicates the steps to take for a simple transaction, such as a transfer or bill payment; the system will ask for your Access Card number and password. If you pressed 2, 3 or 4 for more complex transactions, the system directs you to the specialized agent who can best meet your needs. • Confirmation number A confirmation number is given after each transaction. It confirms that the transaction was carried out or that Desjardins has received your request. • Automatic storing of all transactions All transactions you carry out on AccèsD are saved and appear on your monthly statement of account. That way, you can keep an eye on your account activity. • Security of telephone transactions The electronic transactions you carry out with Desjardins are stored on our servers. That means that they are secure, and none of the related information can be intercepted by a third. You can talk directly to an officer at any time by dialing 0. All calls are recorded. 13
  • 14. TELEPHONE SOLICITATION When someone solicits you by phone, be vigilant and watch out for people who pretend to be representatives of a company that you do business with or a known organization that you support. Typical case Telephone con artists are very good at making people believe they are someone else. Some go as far as using the telephone number of a trusted company on the call display! They use excuses such as a financial emergency, a contest won by the victim or missing data in a file to obtain personal information. Once they get this information, they try, and often succeed, to pull off a scam. The Desjardins way A Desjardins telemarketing agent may very well contact you one day to explain the benefits of one of our products. Stick to the following recom- mendations so you can be alert and give no chances to criminals. Your best weapons No agent will ever ask you to disclose your personal identification number (PIN) or your AccèsD passwords (Internet or Telephone) or other personal information such as your date of birth and social insurance number. Reminder: No financial institution, police officer, Desjardins representative or merchant is authorized to ask you for your PIN or AccèsD passwords. Passwords are intended to be verified by automated systems, not by people. 14
  • 15. HERE ARE SOME IMPORTANT RESOURCES: • Competition Bureau, 1 800 348-5358, www.bc-cb.gc.ca • RCMP – Reporting Economic Crime On-Line, 1 888 495-8501, www.recol.ca These credit bureaus and other organizations will register a fraud indicator in your file: • Equifax: 1 800 465-7166 • TransUnion: - in Québec: 1 877 713-3393 - outside Québec: 1 877 525-3823 • Local police authorities, companies that issue credit cards, banks and provincial archives For more details, visit www.desjardins.com/security. Or Call 1-800-CAISSES. 15
  • 16. If… You are a victim of identity theft or fraud... You are a victim of phishing... Call Desjardins Card Services right away. Montréal and surrounding area: 514-397-4415 Canada and the United States: 1-800-363-3380 Other countries: 514-397-4610 (collect) or contact VISA’s world-wide customer service department Committed to sustainable development, Desjardins Group favours the use of paper that is manufactured in Canada in accordance 30% with recognized environmental standards. 33050144 (01-09)