Desjardins provides security measures and recommendations to protect members from fraud. They implement limits on transaction amounts and require additional authentication for certain transactions. Members should follow basic rules like keeping their PIN and passwords confidential, regularly reviewing statements, and not storing sensitive information on devices. Desjardins also uses encryption and other technologies to secure online and phone transactions. Members should be wary of fraudulent emails and never disclose sensitive details to unsolicited callers.
The information and opinions expressed in this presentation should not be used as a substitute for legal advice. This presentation is protected by copyright.
The information and opinions expressed in this presentation should not be used as a substitute for legal advice. This presentation is protected by copyright.
Dealing with the hassles of credit card fraud or identity theft can be frustrating and time consuming. This training will provide tips on how to protect yourself, your clients and your loved ones.
Secure PIN Management How to Issue and Change PINs Securely over the WebSafeNet
With 25 years of security industry leadership, SafeNet provides card issuers with a solution that
prevents disclosure of the PIN across the entire transaction, ensuring that the customer is the only person able to view their PIN online. SafeNet’s solution, ViewPIN+, allows PINs to be securely issued and managed over the Web, providing benefits
such as improved customer
service, cost savings, and peace
of mind to both the cardholder
and the card issuer.
An overview of identity theft, the tactics criminals use and how to protect yourself and prevent identity theft in Canada. Created by an IT industry expert.
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...aditi agarwal
Are you thinking about establishing your own Investment Bank or Licensed Investment Fund without a lot of bureaucratic “red tape”, with electronic payment capabilities – and for a budget you can afford? You have done your research across the world, compared service providers only to discover that they are either too expensive or simply not worth your time? Rest assured, we are highly specialized in establishing investment banks, investment funds & capital trusts for our clients across the world. This presentation is coming to you because you’ve shown an interest our services by visiting our website or other means of connection. I’d like to take this opportunity to enlighten you more about our business and the specialized services we offer.
In this webinar you will learn:
• Which benefits you gain from 3D-Secure 2.2 adaptations?
• Tips and tricks on how to make a seamless transition to 3DS 2.2 version!
• How to increase the security level and improve the user experience?
• Get an overview of 3D Secure from the expert perspective.
For more information contact us at https://3dsecure.asseco.com/
Dealing with the hassles of credit card fraud or identity theft can be frustrating and time consuming. This training will provide tips on how to protect yourself, your clients and your loved ones.
Secure PIN Management How to Issue and Change PINs Securely over the WebSafeNet
With 25 years of security industry leadership, SafeNet provides card issuers with a solution that
prevents disclosure of the PIN across the entire transaction, ensuring that the customer is the only person able to view their PIN online. SafeNet’s solution, ViewPIN+, allows PINs to be securely issued and managed over the Web, providing benefits
such as improved customer
service, cost savings, and peace
of mind to both the cardholder
and the card issuer.
An overview of identity theft, the tactics criminals use and how to protect yourself and prevent identity theft in Canada. Created by an IT industry expert.
HOW TO ESTABLISH YOUR OWN INVESTMENT BANK WITHOUT THE BUREAUCTATIC “RED TAPE”...aditi agarwal
Are you thinking about establishing your own Investment Bank or Licensed Investment Fund without a lot of bureaucratic “red tape”, with electronic payment capabilities – and for a budget you can afford? You have done your research across the world, compared service providers only to discover that they are either too expensive or simply not worth your time? Rest assured, we are highly specialized in establishing investment banks, investment funds & capital trusts for our clients across the world. This presentation is coming to you because you’ve shown an interest our services by visiting our website or other means of connection. I’d like to take this opportunity to enlighten you more about our business and the specialized services we offer.
In this webinar you will learn:
• Which benefits you gain from 3D-Secure 2.2 adaptations?
• Tips and tricks on how to make a seamless transition to 3DS 2.2 version!
• How to increase the security level and improve the user experience?
• Get an overview of 3D Secure from the expert perspective.
For more information contact us at https://3dsecure.asseco.com/
Cles118 - Géopolitique de l’Internet | Quel "secret d'État" dans le cyberespace?Jean-François Fiorina
PRISM, XKeyscore, Tempora, Bullrun... Depuis les premières révélations fracassantes d’Edward Snowden, les programmes d’écoutes de la NSA et de ses alliés n’en finissent pas de faire la une de l’actualité.
Cette dernière affaire en rappelle une autre: les divulgations en 2010 des War Logs et de télex diplomatiques par WikiLeaks. À chaque fois, la même marque de fabrique: des "lanceurs d’alerte"
qui portent à la connaissance d’un large public des informations classifiées, via Internet, mais avec le concours actif de grands titres de la presse écrite. "S’interroger sur le secret à l’ère numérique revient à se demander comment les invariants - anthropologiques - du secret s’articulent avec l’innovation technologique. Et les réponses peuvent surprendre: le sans précédent coexiste avec le toujours pareil", écrivent François-Bernard Huyghe et Paul Soriano en introduction du remarquable numéro que la revue Médium consacre au sujet. Malgré les apparences en effet, il n’est pas sûr que les nouvelles technologies modifient les rapports de force entre acteurs - qu'ils prêchent la "transparence" ou la défense de la "raison d’État".
Payment Card Cashiering for Local Governments 2016Donald E. Hester
Slides cover PCI compliance training for cashiers covering topics from Payment Card Industry Data Security Standard (PCI DSS), supplemental guidance provided by Payment Card Industry Security Standards Council (PCI SSC), Visa's Card Acceptance Guidelines for Visa Merchants, and MasterCard’s Security Rules and Procedures Merchant Edition 2011.
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsFit Small Business
Cyber criminals are shifting their focus to target smaller businesses that accept credit card payments, which means your business could be next. With 60% of small businesses going under within 6 months of being breached, the cyber security and PCI compliance of your business should be one of your top priorities. - See more at: http://fitsmallbusiness.com/pci-compliance-for-small-businesses/#sthash.ex1SwoaB.dpuf
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
According to the Hacked Website Report by Sucuri, the number of websites getting compromised by hackers is increasing every year. The damage related to cybercrime is expected to hit $6 trillion by the end of 2020.
If you are planning to launch an eCommerce website or already running a successful one, you must have to upgrade the security of your website regularly. Here, I am sharing some useful ways to keep your eCommerce site safe from hackers and fraudsters.
Over 40% of businesses in the UK have experienced fraud in the last year.
This practical guide gives you the information you need to help protect your business against growing threats of fraud.
We show you how and where fraud can take place throughout your business and highlight the "telltale" things to look out for.
We’ve also included key actions you should take to safeguard yourself and your business.
Taking some very basic steps can make a real difference to fraudsters’ success rates.
Whether you are a client of not I do hope that this guide helps business avoid being another statistic of crime this year.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This graphic explains what PCI compliance is, that is required for all companies that accept credit card transactions, and outlines the PCI Compliance Process.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
8 ways to protect yourself from credit card theft while travellingletzpooja
You may have had an option to connect to an unsecured internet connection.
During such occasions, it is probably a good idea to listen to your browser’s warning and steer clear from connections such as these since it can not only harm your device with malicious software, but it can also give hackers access to confidential Credit Card data.
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...Quotidiano Piemontese
Turin Startup Ecosystem 2024
Una ricerca de il Club degli Investitori, in collaborazione con ToTeM Torino Tech Map e con il supporto della ESCP Business School e di Growth Capital
how to sell pi coins on Bitmart crypto exchangeDOT TECH
Yes. Pi network coins can be exchanged but not on bitmart exchange. Because pi network is still in the enclosed mainnet. The only way pioneers are able to trade pi coins is by reselling the pi coins to pi verified merchants.
A verified merchant is someone who buys pi network coins and resell it to exchanges looking forward to hold till mainnet launch.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
Even tho Pi network is not listed on any exchange yet.
Buying/Selling or investing in pi network coins is highly possible through the help of vendors. You can buy from vendors[ buy directly from the pi network miners and resell it]. I will leave the telegram contact of my personal vendor.
@Pi_vendor_247
what is the best method to sell pi coins in 2024DOT TECH
The best way to sell your pi coins safely is trading with an exchange..but since pi is not launched in any exchange, and second option is through a VERIFIED pi merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and pioneers and resell them to Investors looking forward to hold massive amounts before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade pi coins with.
@Pi_vendor_247
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...beulahfernandes8
Role in Financial System
NBFCs are critical in bridging the financial inclusion gap.
They provide specialized financial services that cater to segments often neglected by traditional banks.
Economic Impact
NBFCs contribute significantly to India's GDP.
They support sectors like micro, small, and medium enterprises (MSMEs), housing finance, and personal loans.
how to sell pi coins at high rate quickly.DOT TECH
Where can I sell my pi coins at a high rate.
Pi is not launched yet on any exchange. But one can easily sell his or her pi coins to investors who want to hold pi till mainnet launch.
This means crypto whales want to hold pi. And you can get a good rate for selling pi to them. I will leave the telegram contact of my personal pi vendor below.
A vendor is someone who buys from a miner and resell it to a holder or crypto whale.
Here is the telegram contact of my vendor:
@Pi_vendor_247
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
Currently pi network is not tradable on binance or any other exchange because we are still in the enclosed mainnet.
Right now the only way to sell pi coins is by trading with a verified merchant.
What is a pi merchant?
A pi merchant is someone verified by pi network team and allowed to barter pi coins for goods and services.
Since pi network is not doing any pre-sale The only way exchanges like binance/huobi or crypto whales can get pi is by buying from miners. And a merchant stands in between the exchanges and the miners.
I will leave the telegram contact of my personal pi merchant. I and my friends has traded more than 6000pi coins successfully
Tele-gram
@Pi_vendor_247
Introduction to Indian Financial System ()Avanish Goel
The financial system of a country is an important tool for economic development of the country, as it helps in creation of wealth by linking savings with investments.
It facilitates the flow of funds form the households (savers) to business firms (investors) to aid in wealth creation and development of both the parties
where can I find a legit pi merchant onlineDOT TECH
Yes. This is very easy what you need is a recommendation from someone who has successfully traded pi coins before with a merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi network coins and resell them to Investors looking forward to hold thousands of pi coins before the open mainnet.
I will leave the telegram contact of my personal pi merchant to trade with
@Pi_vendor_247
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfpchutichetpong
The U.S. economy is continuing its impressive recovery from the COVID-19 pandemic and not slowing down despite re-occurring bumps. The U.S. savings rate reached its highest ever recorded level at 34% in April 2020 and Americans seem ready to spend. The sectors that had been hurt the most by the pandemic specifically reduced consumer spending, like retail, leisure, hospitality, and travel, are now experiencing massive growth in revenue and job openings.
Could this growth lead to a “Roaring Twenties”? As quickly as the U.S. economy contracted, experiencing a 9.1% drop in economic output relative to the business cycle in Q2 2020, the largest in recorded history, it has rebounded beyond expectations. This surprising growth seems to be fueled by the U.S. government’s aggressive fiscal and monetary policies, and an increase in consumer spending as mobility restrictions are lifted. Unemployment rates between June 2020 and June 2021 decreased by 5.2%, while the demand for labor is increasing, coupled with increasing wages to incentivize Americans to rejoin the labor force. Schools and businesses are expected to fully reopen soon. In parallel, vaccination rates across the country and the world continue to rise, with full vaccination rates of 50% and 14.8% respectively.
However, it is not completely smooth sailing from here. According to M Capital Group, the main risks that threaten the continued growth of the U.S. economy are inflation, unsettled trade relations, and another wave of Covid-19 mutations that could shut down the world again. Have we learned from the past year of COVID-19 and adapted our economy accordingly?
“In order for the U.S. economy to continue growing, whether there is another wave or not, the U.S. needs to focus on diversifying supply chains, supporting business investment, and maintaining consumer spending,” says Grace Feeley, a research analyst at M Capital Group.
While the economic indicators are positive, the risks are coming closer to manifesting and threatening such growth. The new variants spreading throughout the world, Delta, Lambda, and Gamma, are vaccine-resistant and muddy the predictions made about the economy and health of the country. These variants bring back the feeling of uncertainty that has wreaked havoc not only on the stock market but the mindset of people around the world. MCG provides unique insight on how to mitigate these risks to possibly ensure a bright economic future.
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the world’s largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
how can i use my minded pi coins I need some funds.DOT TECH
If you are interested in selling your pi coins, i have a verified pi merchant, who buys pi coins and resell them to exchanges looking forward to hold till mainnet launch.
Because the core team has announced that pi network will not be doing any pre-sale. The only way exchanges like huobi, bitmart and hotbit can get pi is by buying from miners.
Now a merchant stands in between these exchanges and the miners. As a link to make transactions smooth. Because right now in the enclosed mainnet you can't sell pi coins your self. You need the help of a merchant,
i will leave the telegram contact of my personal pi merchant below. 👇 I and my friends has traded more than 3000pi coins with him successfully.
@Pi_vendor_247
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
How to get verified on Coinbase Account?_.docxBuy bitget
t's important to note that buying verified Coinbase accounts is not recommended and may violate Coinbase's terms of service. Instead of searching to "buy verified Coinbase accounts," follow the proper steps to verify your own account to ensure compliance and security.
2. By implementing simple
measures to mitigate
fraud. Thwarting fraud
by limiting the victims.
Taking further precau-
tions. And fewer risks.
Strengthening your
online security means
working together toward
a single purpose: protect-
ing your assets and your
data. That’s why we have
a few indications and
security measures to
recommend. That’s why
you should apply them.
Because at Desjardins,
we do everything in our
power to protect you.
Because you too have the
power and the responsi-
bility to protect yourself.
3. TABLE OF CONTENTS
Desjardins takes broad steps .................................4
Desjardins Access Card ...........................................5
Basic security rules when you
use your Desjardins Access Card ...........................5
At the ATM and merchants .....................................6
Criminals want your PIN...
and your money ...................................................6
How can you protect yourself? .............................6
Desjardins measures to ensure
increased protection .............................................7
AccèsD Internet: for optimum security...................8
How do they do it?...............................................8
Protect yourself.....................................................8
Desjardins strikes back ..........................................9
Fraudulent e-mail...................................................11
Scammers are learning new tricks too... .............11
Don’t fall into the trap........................................12
AccèsD Telephone.................................................13
Telephone solicitation............................................14
Typical case .........................................................14
The Desjardins way .............................................14
Your best weapons .............................................14
Here are some important resources .....................15
3
4. DESJARDINS TAKES BROAD STEPS
At Desjardins, we spare no effort to ensure your
security and confidentiality when you carry out
transactions, whether it’s at your caisse, at the ATM,
on the Internet, by telephone or at merchants when
you use direct payment.
Our online transactional services meet the highest
security standards in the financial industry and
comply with the Act Respecting the Protection
of Personal Information in the Private Sector.
Reliable, proven technologies are used to protect
your information should an alteration, loss or
unauthorized access occur.
No matter how effective, all protection systems
require a minimum of secure behaviour from the
user so that the measures in place provide their
full advantage. The indications to be followed are
generally simple and undemanding. You need only
be well-informed, which can be accomplished by
reading the following few pages. Among other
things, you will learn how to prevent criminals
from posing as you to carry out transactions with
merchants, Desjardins and other financial institutions.
As a member of the Interac Association,
Desjardins participates in awareness activities
regarding the protection of debit card PINs. That’s
why we post the new “Protect your PIN” icon.
4
5. DESJARDINS ACCESS CARD
Basic security rules when you use
your Desjardins Access Card
The basic rules to follow to protect your money
are very simple:
1) Don’t lend your Access Card to anyone.
2) If your card is lost, stolen or withheld by
an ATM, immediately notify your caisse or
call 1 800 CAISSES.
3) Regularly verify your statements and balances
to be sure that all the transactions were
actually made by you. If you see any
fraudulent entries, quickly contact your
caisse or dial 1 800 CAISSES.
4) Never give your PIN (personal identification
number for use at ATMs and direct payment
terminals) or your passwords (codes to enter
AccèsD Internet and Telephone) to anyone.
No financial institution, police officer,
Desjardins representative or merchant
is authorized to ask for your PIN or
AccèsD passwords. They are yours
and yours alone.
5) Do not select a PIN or a password that is
easy to guess, like your address, telephone
number or date of birth.
6) Memorize your PIN and passwords; do not
write them down anywhere.
7) Be discreet: hide the keypad with your hand
or body when you enter your PIN.
8) Do not enter your PIN a second time
without first making sure the transaction
was cancelled and getting your statement.
5
6. 9) Never lose sight of your card during
a transaction.
10) Take your card and the statement at the
end of the transaction.
11) Change your PIN and passwords right away,
if you suspect that someone watched you
enter any of them on the keypad. You can
make these changes 24 hours a day at any
Automatic Teller Machine (ATM).
AT THE ATM AND MERCHANTS
Criminals want your PIN...
and your money.
Defrauders are big on guts and imagination. How do
they do it?
Cards can be copied and cloned at ATMs or at
merchants during transactions. Then the thief tries
to obtain your PIN when you enter it on the keypad.
How can you protect yourself?
The three best ways to protect yourself from card
cloning are simple:
• Protect your PIN by following the above
basic rules
• Never lose sight of your card during a transaction
• Take your card and the statement after
each transaction
6
7. Desjardins measures to ensure
increased protection
To reduce the amounts that can be fraudulently
withdrawn from your account, Desjardins has put
the following solutions in place:
• The default total amount for ATM withdrawals
from other Canadian financial institutions is
set at $300 Canadian* per day. For additional
withdrawals, you can go to a Desjardins ATM.**
• The default total amount for ATM withdrawals
from other financial institutions outside
Canada is $500 Canadian* per day.
• The default direct payment purchase limit
(including withdrawals) at merchants is set
at $1,000 Canadian* per day.
• For certain types of transactions–withdrawals,
deposits, transfers – at Desjardins ATMs, you
must confirm your identity by entering your
day and month of birth.
For further information on these limits, contact
your caisse directly.
NEVER DISCLOSE YOUR PIN,
EVEN TO A DESJARDINS EMPLOYEE.
* May change without prior notice.
** Unless you have reached an agreement to the contrary with your caisse.
7
8. ACCÈSD INTERNET:
FOR OPTIMUM SECURITY
When you use AccèsD Internet, you navigate in com-
plete security. Our transactional services and online
applications meet the highest security standards. But
you must be vigilant. Despite these precautions, you
must carry out the necessary actions to secure your
computer. Here is some advice to better arm you
against cybercriminals who might attempt to steal
your identity and your assets.
How do they do it?
Defrauders use different methods to get your
confidential information:
• fraudulent e-mail or site posting a false logo
or image of a company you know or already
do business with
• exchanges in a discussion forum
• computer viruses and spyware
Data collected about the victim can include passwords,
credit or debit card numbers, social insurance
numbers, dates of birth and personal information.
This data is then sold to criminals or used to access
credit, chequing or savings accounts, for example.
Protect yourself
Here are steps to take to reduce your risk of
becoming a victim of Internet fraud:
• Never use the automatic entry and password
memorization tools available in your browser.
• Change your password regularly – every month
and IMMEDIATELY if you suspect that someone
might know it.
• Equip yourself with known antivirus and
anti-spyware programs and a firewall, and
keep them up-to-date.
• Manually type www.desjardins.com and then click
on the AccèsD logo.
8
9. • Make sure you see the “s” in the address bar
on the AccèsD Website before entering your
password.
• Be certain the address begins with
https://accesd.desjardins.com
• Terminate your session properly by clicking on
Log off at the top of the screen and close your
browser; that way you destroy all copies of Web
pages stored on your hard disk and therefore
prevent any dishonest or accidental viewing of
your accounts.
• Empty your memory cache (see
www.desjardins.com/security for further
explanation) and avoid using a public or shared
computer.
• When you need to delete documents containing
personal and confidential information, like your
account or credit card statements, make sure
they are completely deleted.
Desjardins strikes back
Desjardins uses the most advanced technologies
to ensure your security on AccèsD Internet:
• Two-way authentication
After entering your Access Card number on the
AccèsD home page, Desjardins systems will begin
the computer recognition process – these systems
recognize the computer(s) you usually use. If your
computer is recognized, you will then be asked to
enter your password to have access to your
account information. However, if a connection
attempt is made from an unrecognized computer,
you will be asked one of the previously established
personal questions in order for Desjardins to iden-
tify you.
• Transaction encryption
All operations carried out with our online
transactional services are encrypted to 128 bits
using the best market practices to ensure confi-
dentiality when information circulates between
our secure site and your PC browser.
9
10. • Security of online transactions
The electronic transactions you carry out with
Desjardins are stored on our servers. That means
that they are secure, and none of the related
information can be intercepted by a third party.
• Security seal
Make sure you always navigate in a secure
environment when you transmit confidential
information.
1. You must see an “s” on https://
2. The field name must automatically begin by
https://accesd.desjardins.com
3. You must see the browser’s security seal
(closed padlock)
The security seal can appear in different
places depending on the browser used. Visit
www.desjardins.com/security to find out more.
Once you’ve found the padlock, click on it to view
the site’s security certificate. You should be able
to read the name of the site’s owner (for AccèsD:
https://accesd.desjardins.com/en/accesd) and the
certificate’s validity period.
• Confirmation number
A confirmation number is given after each
transaction. It confirms that the transaction
was carried out or that Desjardins has received
your request.
• Automatic storing of all transactions
All transactions you carry out on AccèsD Internet
are saved and appear on your monthly statement
of account. That way, you can keep an eye on
your account activity.
NEVER GIVE YOUR ACCÈSD PASSWORDS
TO ANYONE, EVEN A POLICE OFFICER.
10
11. FRAUDULENT E-MAIL
Criminals quickly recognized the power of e-mail.
It has even become a well-known tactic to incite
Internet users to reveal personal and confidential
information.
Fraudulent e-mail messages, which look like
legitimate messages, suggest users click on a link
or attachment for reasons such as:
• to change or update personal information
• to register as a finalist in a contest
• to avoid a possible suspension of their card
or account
• to apply for a product or service
• to deal with an expired account
• to deal with a fraud or an error in their account
After accepting this invitation, users are then
directed to a false Web site where they are asked
to provide information such as:
• ATM card number
• credit card number
• AccèsD password
• social insurance number
• date of birth
• e-mail address
11
12. Don’t fall into the trap
• Never disclose your personal identification
numbers (PIN), AccèsD passwords, social insurance
number, date of birth or any other personal
information, whether related to your AccèsD
file or not.
• To access AccèsD, manually type
www.desjardins.com and then click on the
AccèsD logo. Never click on a link in an
e-mail message.
Have you received an e-mail you believe to be fraud-
ulent? Forward it to us at phishing@desjardins.com.
Please note that you will receive an automatic
response to e-mails sent to this address. Caution: do
not include any confidential information in this e-
mail.
Important
Desjardins has implemented a 24-hour, 7-day
active surveillance system to ensure quick
reaction if fraudulent e-mail is detected.
Furthermore, Desjardins is doing everything
possible to protect its Internet service users
from all types of fraud.
It is not Desjardins’ practice to solicit Internet
service users through e-mail to their personal
address or by other means to obtain their
confidential information. However, it is possible
that your caisse or a Desjardins subsidiary
contacts you via your AccèsD message box.
Because they are protected by the AccèsD
secure environment, these messages are
highly secure.
12
13. ACCÈSD TELEPHONE
To avoid fraud by means of AccèsD Telephone,
Desjardins set up the following procedures:
• telephone numbers exclusive to Desjardins:
1 800 CAISSES and (514) JACCÈSD (522-2373)
• measures to authenticate members when
information is exchanged:
When you call, a recorded voice asks you to
choose among various options, each of which
has a corresponding number. By pressing 1, you
are in autonomous mode: the audio response
unit indicates the steps to take for a simple
transaction, such as a transfer or bill payment;
the system will ask for your Access Card number
and password. If you pressed 2, 3 or 4 for more
complex transactions, the system directs you
to the specialized agent who can best meet
your needs.
• Confirmation number
A confirmation number is given after each
transaction. It confirms that the transaction
was carried out or that Desjardins has received
your request.
• Automatic storing of all transactions
All transactions you carry out on AccèsD are saved
and appear on your monthly statement of
account. That way, you can keep an eye on
your account activity.
• Security of telephone transactions
The electronic transactions you carry out with
Desjardins are stored on our servers. That means
that they are secure, and none of the related
information can be intercepted by a third.
You can talk directly to an officer at any time by
dialing 0. All calls are recorded.
13
14. TELEPHONE SOLICITATION
When someone solicits you by phone, be vigilant
and watch out for people who pretend to be
representatives of a company that you do business
with or a known organization that you support.
Typical case
Telephone con artists are very good at making
people believe they are someone else. Some go
as far as using the telephone number of a trusted
company on the call display! They use excuses such
as a financial emergency, a contest won by the
victim or missing data in a file to obtain personal
information. Once they get this information, they
try, and often succeed, to pull off a scam.
The Desjardins way
A Desjardins telemarketing agent may very well
contact you one day to explain the benefits of
one of our products. Stick to the following recom-
mendations so you can be alert and give no
chances to criminals.
Your best weapons
No agent will ever ask you to disclose your
personal identification number (PIN) or your AccèsD
passwords (Internet or Telephone) or other personal
information such as your date of birth and social
insurance number.
Reminder: No financial institution, police officer,
Desjardins representative or merchant is authorized to
ask you for your PIN or AccèsD passwords. Passwords
are intended to be verified by automated systems,
not by people.
14
15. HERE ARE SOME
IMPORTANT RESOURCES:
• Competition Bureau, 1 800 348-5358,
www.bc-cb.gc.ca
• RCMP – Reporting Economic Crime On-Line,
1 888 495-8501, www.recol.ca
These credit bureaus and other organizations
will register a fraud indicator in your file:
• Equifax: 1 800 465-7166
• TransUnion:
- in Québec: 1 877 713-3393
- outside Québec: 1 877 525-3823
• Local police authorities, companies that issue
credit cards, banks and provincial archives
For more details,
visit www.desjardins.com/security.
Or
Call 1-800-CAISSES.
15
16. If…
You are a victim of identity
theft or fraud...
You are a victim of phishing...
Call Desjardins Card Services
right away.
Montréal and surrounding area: 514-397-4415
Canada and the United States: 1-800-363-3380
Other countries: 514-397-4610 (collect) or
contact VISA’s world-wide customer service
department
Committed to sustainable development, Desjardins Group favours
the use of paper that is manufactured in Canada in accordance
30% with recognized environmental standards.
33050144 (01-09)