Identity Theft and Electronic Fraud
How to Protect Yourself
American Community Bank & Trust has identity theft procedures in place to protect the
safety and security of your identity and your accounts.
Today thieves use sophisticated computer technology to steal from bank accounts. Account
hijacking, a form of identity theft is the fastest growing scam.
While some identity theft victims can resolve their problem quickly, others spend hundreds
of dollars and many hours repairing damage to their good name and credit record.
Take precautions before this happens.
Account hijackers want your personal banking information so they can take over your bank account. If this happens, it could take weeks or months to discover. Identity thieves need your personal information to perpetuate their theft. When a thief uses your name, address, social security number, driver’s license number or credit card number to commit fraud, you are a victim of identity theft. It can start with a lost or stolen wallet, pilfered mail, a data breach, a computer virus, phishing, a scam, or paper documents you throw away.
Protect your personal information and financial identity:
American Community Bank & Trust is committed to Confidentiality. Protecting the integrity
of your private financial information is our priority.
- Never reply to an e-mail or pop-up message asking for personal or confidential information. Do not reply or click on a link in an e-mail warning that your account will be closed or interest suspended unless you reconfirm your billing information. If you have concerns, contact the legitimate company cited in the e-mail using a telephone number or web address you know to be genuine.
- E-mail messages are generally not secure and not encrypted. Never include account
numbers, debit card numbers, personal account information or passwords in e-mails sent
to the bank.
- Report lost or stolen debit cards immediately.
- Report stolen/lost checks and credit cards immediately.
- Never provide your personal information in response to an unsolicited call, fax, letter,
e-mail or internet advertisement.
- Shred old documents (i.e. canceled checks, tax returns, receipts, bank statements)
- Use Direct Deposit wherever possible.
- Use American Community Bank & Trust Online Bill Pay.
- Reconcile your monthly bank statements. Contact the bank within 30 days with any discrepancies or unauthorized activity.
- Utilize eStatements to eliminate paper.
- Review your credit report with each of the three major credit bureaus each year to ensure the accuracy of the information being reported.
Experian 1-888-397-3742 or www.Experian.com
Equifax 1-800-685-1111 or www.Equifax.com
Trans Union 1-800-916.8800 or www.transunion.com
- Visit the following websites to learn more about identity theft schemes:
Protect Your System
- Use secure passwords. Avoid family names, pet names, your home address, and other
- Install and keep up-to-date an anti-virus program
- Obtain anti-spyware software and frequently run online updates.
- Install a firewall and check regularly for online updates. This protective wall between
your computer and the internet helps prevent unauthorized access to your computer.
The two methods account hijackers currently use to collect your personal data are phishing and spyware.
1. Phishing – Ignore the bait. Don’t bite.
Account hijackers may send deceptive e-mails claiming to be your bank or the government.
This e-mail typically tells you that there is a problem with your account and asks
you to click on the included hyperlink to fix the problem. When you click on the link, you
are taken to a fraudulent website (one that may look nearly identical to the original website).
Here you are asked to update your personal information such as your password,
credit card number, social security number and bank account information. The goal is
to trick you into divulging sensitive information in order to hijack your account.
2. Spyware – Beware of malicious software that secretly collects information.
Account hijackers may attempt to get you to unknowingly install spyware software on
your computer. When you open a seemingly harmless e-mail attachment or click on a
pop-up advertisement, spyware can be downloaded to your computer. Once installed, it
collects selected information and can track where you go on the internet.