- Security Basics
- Online Security
- Computer Safety
- Business Protection
- Identity Theft
- Cyber Tips Newsletter
- Provident will never ask you to respond to an email with any personal information. This includes your Social Security number (SSN) or your ATM or 24 Hour Access Plus Direct Talk Personal Identification Number (PIN) numbers
- This type of email informs you that your account will be closed if you fail to "authenticate" or verify your personal information. Provident will never ask you to confirm information in this manner.
- This type of email indicates that the bank needs you to confirm important information. The email will ask you to update your information online. Provident will never ask you to confirm information in this manner.
- This email may ask that you complete a short survey in order to receive money credited to your account. It will ask for your account(s) and bank routing number(s) in order to complete the deposit to your account. Provident will never ask for your information in this manner.
- Emails containing these issues are often an indicator of attempted fraud. Watch for typos, grammatical errors, awkward wording, and poor design.
- Many web pages and emails will display the destination URL of the link when you hover over the link with your cursor. (Please do not click the link) A URL formatted provident.suspicious.com will take you to a site that is not a part of the Provident web site even though Provident is contained within the URL.
Personal Information Request
Threat of closing an account if information is not provided
Security or system emails.
An offer that sounds "too good to be true."
Misspellings and/or grammatical errors.
Please, do not reply to any of these types of emails!
It is critical to use a highly secure password for all of your financial accounts. Never use passwords like your child's name, your pet's name, your Social Security number, your account or PIN number, or anything else that a person with the intention of performing fraud could easily discover. Passwords that are the most secure use combinations of letters, numbers, and special characters. Do not just use an address, phone number, birthdate, or worst of all, simple passwords such as 1111 or 1234. For additional security, please change your password on a regular basis and do not use the same password for multiple accounts.
If you feel you have given out any personal information in regard to your Provident account(s) (such as your account number, password, or PIN), or typed it into a website that may not be legitimate, please contact us immediately. We will take the necessary steps to help you secure your account.
- Don't give out financial information such as account numbers, credit card numbers, ATM PIN number, and especially your Social Security number over the phone unless you have initiated the call and know the person/organization you are transacting business with. Please do not give this information to a stranger even if they claim to be representing Provident.
- Report lost or stolen checks, credit cards, or ATM cards immediately.
- Don't preprint your driver's license, telephone, or Social Security numbers on your checks.
- Please notify Provident of any suspicious telephone inquiries that might ask for account information.
- Don't write your (PIN) on or with your ATM or credit cards.
Remember that protecting your financial information is often asking the question: How can I protect myself?
- In order to make your online banking experience as secure as possible we have introduced a security feature that watches for uncharacteristic or unusual behavior involving your internet banking access. If anything out of the ordinary is detected, we will ask you to verify your identity.
- In the rare case we detect any unusual or uncharacteristic activity, we will ask you to answer security questions or if there are problems with answering the questions, allow us to phone you to make sure that it is really you trying to sign on. Most of the time you will not notice that the security feature is even there, but it will still be protecting you 24 hours a day and 7 days a week.
- The security system is automatically available to all of our customers. Expect to be prompted at some point while banking online to enter additional information. This may include choosing some security questions that only you know the answers to as well as supplying phone numbers where you can be reached while banking online. Once this occurs, you have added a layer of protection to your Online Banking access and best of all, it's free!
Provident Bank's Online Banking Identity Verification feature
What is the security feature?
How does it work?
Do I need to sign up for the security system?
Frequently Asked Questions for our Identity Verification Feature
- What is this security system?
- How do I sign up for the security system?
- How much will it cost?
- When will I be asked for more information?
- What additional information will I be asked?
- What is unusual or uncharacteristic behavior?
- Will I be asked for more information all the time now?
- How are you able to detect unusual or uncharacteristic behavior?
- How do I know it is working?
- How will my phone numbers be used?
- How many phone numbers should I provide?
- What if I need to change my phone number?
- What if I cannot be contacted at any of the phone numbers listed?
- Is my personal information still safe?
- I have already set up my contact numbers, why am I being asked for them again?
- How will this help prevent online fraud?
- I check my account very often, wouldn't I know if something unusual showed up on my account?
- I share my computer with someone who has their own account. Can both of us still log in from this machine?
- I already have anti-virus and a personal firewall. Why do I need this?
- If the computer you are currently using is not protected, identity thieves and other fraudsters may be able to get access and steal your personal information.
If you are using safety measures and good practices to protect your home computer, you can protect your privacy and your family. Here are some tips Provident would like to suggest to help you lower your risk while you're online.
- Definition: A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the Internet in a similar manner as telemarketers automatically dial random phone numbers. They send out a ping (call) to thousands of computers and wait for a response. Firewalls prevent your computer from responding to these unsolicited calls. A firewall blocks communications to and from sources you don't permit. This is especially important if you have a high-speed Internet connection, like DSL or cable. Some computer operating systems have built-in firewalls that may be shipped in the "off" mode. Ensure that your firewall is on. To always be effective, your firewall must be set up correctly and updated regularly. You can check your online "Help" feature for specific instructions.
- Anti-virus software helps to protect your computer from viruses that can destroy your data, slow down/ crash your computer, or allow spammers to send email from your account. Anti-virus protection scans your computer and your incoming email for viruses, and then removes them. Anti-virus software must be updated regularly to cope with the latest "bugs" (viruses) circulating on the Internet. Most anti-virus software includes a feature to download updates automatically while you are online. Always make sure that the software is continually running and checking your system for viruses, especially if you download files from the Web or are checking your email. Set your anti-virus software to check for viruses when you first turn on your computer. You should also set the anti-virus software to scan your complete system at least twice a month.
- Spyware is software installed without your consent or knowledge that has the ability to monitor your online activities and collect your personal information while you are surfing the Web. Certain types of spyware, called keyloggers, record everything you type in - including your passwords, credit card numbers, and financial information. Signs that your computer may be infected with spyware include a sudden influx of pop-up ads, being taken to websites you don't want to go to, and slower performance.
- Spyware protection is included in some anti-virus software products. Review your anti-virus software documentation for information on how to activate the spyware protection options. You also purchase separate anti-spyware software programs. Keep your anti-spyware software up to date and run it regularly.
- To avoid spyware in the first place, download software only from sites you know and trust. Piggybacking spyware is often an unseen cost of many "free" programs. Do not click on links in pop-up windows or in spam email.
- Hackers are continually searching and trying to find flaws and holes in operating systems and browsers. In order to protect your computer and all of your information on it, set the security settings in your system and browser at medium or higher. Review the Tools or Options menus for how to do this. Install updates to your system and browser regularly. You should consider taking advantage of automatic updating if it is available. Windows Update is a service offered by Microsoft. It will automatically download and install software updates to the Microsoft Windows Operating System, Internet Explorer, Outlook Express, and will also deliver security updates to you. Software patching can also be run automatically for other systems, including the Macintosh Operating System.
- If you have a wireless network in your home, make sure you take precautions to secure it against hacking. Encrypt your home wireless communications. Select a wireless router that has an encryption feature and turn it on. WPA encryption is considered stronger than WEP. Your computer, router, and other equipment must use the same encryption type. If your router enables identifier broadcasting, be sure to disable it. Note the SSID name so you can connect your computers to the network manually. Hackers know the pre-set passwords of this kind of equipment. Be sure to change the default identifier on your router and the default administrative password. You may want to turn off your wireless network when you are not using it.
- Remember that public "hot spots" found in many stores, restaurants and hotels may not be secure. It's safest to avoid accessing or sending sensitive personal or financial information over a public wireless network.
Suggestions from Provident Bank
Install and use a firewall
Install and use anti-virus software
Install and use anti-spyware software
Update and maintain your system and browser to protect your privacy
Secure your home wireless network
- Most companies keep sensitive information in their files, whether it's names, Social Security numbers (SSN), credit cards, or other account data that identifies customers or employees. Businesses often need this information to fill orders, meet payroll, or perform other business functions. But if the information falls into the wrong hands, it can lead to fraud or identity theft. The cost of a security breach can be measured in the loss of your customers' trust and perhaps even a lawsuit, which makes safeguarding personal information just plain good business.
- Click on an item for additional details
Is your company taking the steps necessary to safeguard information?
A sound data security plan is built on five key principles:
- Take stock. Know what personal information you have in your files and on your computers.
- Scale down. Keep only what you need for your business.
- Lock it. Protect the information that you keep.
- Pitch it. Properly dispose of what you no longer need.
- Plan ahead. Create a plan for responding to security incidents.
♦ Talk with your employees and outside service providers to determine who sends personal information to your business, and how it is sent.
♦ Consider all the ways you collect personal information from customers, and what kind of information you collect.
♦ Review where you keep the information you collect, and who has access to it.
♦ Keep customer credit card information only if you have a business need for it. Change the default settings on your software that reads customers' credit cards.
♦ Don't keep information you don't need. Review the forms you use to gather data - like credit applications and fill-in-the blank web screens for potential customers - and revise them to eliminate requests for information you don't need.
♦ Truncate the account information on electronically printed credit and debit card receipts you give your customers. You may include no more than the last five digits of the credit card number, and you must delete the card's expiration date.
♦ Develop a written records retention policy, especially if you must keep information for business reasons or to comply with the law.
♦ Remind employees to put files away, log off their computers, and lock their file cabinets and office doors at the end of the day.
♦ Implement appropriate access controls for your building.
♦ Encrypt sensitive information if you must send it over public networks.
♦ Regularly run up-to-date anti-virus and anti-spyware programs on individual computers.
♦ Require employees to use strong passwords.
♦ Caution employees against transmitting personal information via email.
♦ Create a laptop security policy, for within your office and when your employees are traveling.
♦ Use a firewall to protect your computers and your network.
♦ Set "access controls" to allow only trusted employees with a legitimate business need to access the network.
♦ Monitor incoming Internet traffic for signs of security breaches.
♦ Check references and do background checks before hiring employees who will have access to sensitive data.
♦ Create a procedure to make sure that workers who leave your organization or transfer to another part of the company no longer have access to sensitive information.
♦ Educate employees about how to avoid phishing and phone pretexting scams.
♦ Visit OnGuardOnline.gov for computer security tips, tutorials, and quizzes.
♦ Dispose of paper records by shredding, burning, or pulverizing them.
♦ Defeat dumpster divers by encouraging your staff to separate the stuff that's safe to trash from sensitive data that needs to be discarded with care.
♦ Make shredders available throughout the workplace, including next to the photocopier.
♦ Use wipe utility programs when disposing of old computers and portable storage devices.
♦ Give business travelers and employees who work from home a list of procedures for disposing of sensitive documents, old computers, and portable devices.
♦ Draft contingency plans for how your business will respond to different kinds of security incidents. Some threats may come out of left field; others - a lost laptop or a hack attack, to name just two - are unfortunate, but foreseeable.
♦ Investigate security incidents immediately.
♦ Create a list of who to notify - inside or outside your organization - in the event of a security breach.
♦ Immediately disconnect a compromised computer from the Internet.
- Identity theft happens when a person uses your name, Social Security number (SSN), or some other personal, financial, or medical information without your permission to commit fraud and/or other crimes. Online threats like phishing, malware, or hacking may also lead to identity theft.
If your personal information is lost, stolen, or compromised, you can reduce the potential damage from identity theft.
- Protect Your Identity
- Do not give out personal or account information over the phone, by mail, emails or through the Internet unless you initiated the contact or you are sure you know who you are dealing with.
- Never respond to unsolicited requests for your SSN, or requests to verify your financial information.
- Secure your personal information in your home, especially if you have roommates, employ outside help or are having service work done in your home.
- Guard your mail and trash from theft. Before discarding, shred all documents containing personal information. (Receipts, statements, etc.)
- Check all credit card and bank statements monthly for accuracy.
- Never open an email or click on the link provided in an email if you think it is fraudulent or is a request for personal information. Internet pages and email links may look like the official site. Call the institution or type in the site address you are familiar with instead of using the link provided in the email.
- Obtain a copy of your credit report yearly and check it for accuracy. You can obtain a free copy of your credit report annually from the three major credit bureaus.
- Report suspicious emails or calls to the Federal Trade Commission at:(877) IDTHEFT (438-4338)
- If you Become a Victim
- Contact one of the three nationwide credit reporting companies, so they can put a fraud alert on your credit report:
- Equifax: (800) 525-6285 / Experian: (888) 397-3742 / TransUnion: (800) 680-7289
- The one company you call is required to contact the others to place fraud alerts on your file.
- A fraud alert may make it more difficult for an identity thief to open any accounts in your name. The alert is maintained on your credit report for at least 90 days. After you create an Identity Theft Report, you may request an extended alert on your file.
Review Your Credit Reports
- After you place a fraud alert on your credit reports, you are entitled to one free copy of your credit report from each of the three credit reporting companies. Read and review the reports; verify that your name, address, SSN, accounts, and other information are correct.
- If the report reflects accounts that you did not open or debts that are not yours, contact the credit reporting companies to report the fraud and have them corrected. You should also contact the security or fraud department of each company where an account was misused or opened without your consent. Ask the company to send you proof that the problem accounts have been corrected or closed.
Create an Identity Theft Report
- An Identity Theft Report will help resolve issues with the credit reporting companies, debt collectors, and businesses that allowed the identity thief to open new accounts in your name. The Report can help you:
- Have fraudulent information permanently removed from your credit report
- Prevent a company from collecting debts that result from identity theft or selling the debts to other companies for collection
- Get an extended fraud alert placed on your credit report
- Three steps are required to create an Identity Theft Report:
- 1. File an identity theft complaint with the FTC. - Online: http://ftc.gov/idtheft / Phone: (877) 438-4338
- 2. When you file your complaint with the FTC, obtain a copy of the FTC affidavit that shows the details of your complaint. The online complaint site describes how you can print your completed affidavit. If your complaint is filed by phone, ask the counselor how to get a copy of your affidavit.
- 3. Take your completed FTC identity theft affidavit to your local police, or to the police where the theft occurred, and file a police report. Obtain a copy of the police report or the report number.
- Your FTC identity theft affidavit plus your police report create an Identity Theft Report. Send a copy of the Identity Theft Report to each company where you report fraud. Request that they remove or correct fraudulent information on your accounts.
- To learn more about how to protect your personal information and respond to identity theft go to https://identitytheft.gov
Put a Fraud Alert on Your Credit Reports
At Provident Bank, protecting the privacy and security of your personal information is important to us. We collect, retain, and use information about you in order to administer our business and to provide quality products and services that may be of benefit to you. We consider safeguarding your financial information a fundamental part of our business philosophy.
- Information We Collect
- When you visit our website, we may collect the following information in order to service your accounts:
- Information we receive from you on applications or other forms (such as your name, address, Social Security number, assets and income)
- Information about your online transactions with us, as well as information about our online communications with you. Examples include your online bill payments and your activity on the website, such as collecting information on product information reviewed.
- Visitors to Our Website
- Web Browser Settings and Control of Personally Identifiable Information Collection
- You may have the ability to activate web browser tracking settings or other mechanisms that give you the option to control the collection of personally identifiable information about your online activities over time and across third-party websites or online services. Our response to these settings and mechanisms will depend on the setting and mechanism and the impact on our collection and tracking practices. At this time, our website only tracks your activities while on our website and, unless you register with us for a service, we do not collect any personally identifiable information about you. The tracking is facilitated using 'cookies' that we place on your computer. If you choose not to accept cookies or remove locally stored cookies, we will not track your activity on our website; however, some features and services on our website may not be available to you. For more information regarding cookies, refer to 'Visitors to Our Website' in this policy.
- Third Parties
- When you use our website or online service, third parties acting on our behalf may collect the personally identifiable information and website activity identified above. This may include the personally identifiable information collected when you register with us for a service. Depending on the third party websites you visit, as well as any preferences and authorizations you have provided to others, your activity on our website and across other websites, including personally information you provide, may be tracked and collected by third parties. Also, third parties may offer services on our website from time to time. If you access their websites or provide them with information, these third parties may track your activity across websites and collect your personally identifiable information, all subject to the third party's privacy and security practices. For further details, refer to 'Links to Other Web Sites' and 'Services and Advertisements by Third Parties' in this policy.
- Disclosure Of Non-Public Personal Information
- We do not disclose non-public personal information about our customers to non-affiliated third parties, except as permitted by law. You do not have to take any action or instruct us to keep your information confidential. We will protect your privacy automatically. If you end your relationship with the Bank, we will continue to adhere to the information policies and practices described in this policy.
There are instances when information about you may be provided to others. For example, we are permitted by law to share information:
- Within the Bank in order to service your accounts or to market other products or services we may offer.
- With non-financial companies that perform services on our behalf, such as check printers, data processing companies, companies that prepare or mail account statements, or companies that perform marketing services on our behalf.
- With credit bureaus about loans we make, whether or not they are handled properly, and about deposit accounts that are not handled properly.
- In order to comply with a number of laws and regulations we are required to furnish various reports to federal, state, and/or local government officials regarding certain transactions or accounts.
- To comply with subpoenas and other legal processes that require us to provide information about your accounts or other business with the Bank.
- If we suspect that a crime involving you or your loan or deposit account may have been committed.
- With our regulatory agencies and agents of the Bank or its affiliated companies, such as our independent auditors, consultants or attorneys, all of who will be bound to protect the information as we do.
- With others that you, or any other person with signing authority over your account, have given us oral or written permission to do so.
- Maintaining accurate Information
- We have procedures in place that help us to maintain the accuracy of the personally identifiable information that we collect. Please contact us at the number or address set forth below if you believe that our information about you is incomplete, out-of-date, or incorrect. If you are an online banking customer, sign-on to Online Banking to review and correct information about yourself, such as a change in your address or email address.
- Links to Other Web Sites
- Our web site may feature links to third party web sites that offer goods, services or information. Some of these sites may appear as windows-within-windows at this site. When you click on one of these links, you will be leaving our site and will no longer be subject to this policy. We are not responsible for the information collection practices of the other web sites that you visit and urge you to review their privacy policies before you provide them with any personally identifiable information. Third party sites may collect and use information about you in a way that is different from this policy.
- Services and Advertisements by Third Parties
- We feel strongly about protecting the privacy of children and teenagers. As such, we do not knowingly collect personally identifiable information from such individuals through our web site.
- Changes to This Policy
- If you have any questions or concerns about the integrity of your account information, or any other aspect of our business operations, please do not hesitate to telephone or come in to talk to our staff. You may also write to:
- Provident Bank
- Attention: Compliance Officer
- 3756 Central Ave.
- Riverside, CA 92506
- (800) 442-5201
We value your business and hope you will continue banking with us for many years to come.