• Monday - Friday 8:00am - 9:00pm

Account Security

Standard Global InternationalAccount Security

image

Security Information

This Privacy Policy and legal notice for Consumers supplements the information contained in the Privacy Statement of Standard Global InternationalInc, and its subsidiaries (collectively, “we,” “us,” or “our”) and applies solely to consumers who bank with Standard Global International(“consumers” or “you”). Any terms defined in UK Consumer Privacy Act of 2018, as amended, and its implementing regulations (the “EUA”) have the same meaning when used in this notice.

Information We Collect

Your security is important to us. Here at Standard Global Internationalwe want to provide tools and resources to help prevent identity theft and educate you on security. For information on the safety features Standard Global Internationalhas implemented for your protection, please review our Security Statement. We offer training videos on many of the common issues we see with regards to protecting your account information.

Information about:
Phishing
Spoofing
Identity Theft
Credit Bureaus
Recommended Actions
Credit Card Loss or Fraudulent Charges
ATM or Debit Card Loss or Fraudulent Transfers
If You Have Given Out Your Bank Account Information
If You Have Downloaded a Virus or ‘Trojan Horse’
If You Have Given Out Your Personal Identification Information
Additional Actions
How to Practice Safe Computing
What is “Phishing”? Phishing (FISHing)Phishing is a high-tech scam that uses spam or pop-up messages to attempt to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, and/or other sensitive information.
Example Citations Phishing is the term coined by hackers who imitate legitimate companies in e-mails to entice people to share passwords or credit card numbers. What is “Spoofing”? Pretending to be something it is not, on the Internet, usually e-mail or a Web site. How to report Phishing:
We suggest reporting phishing e-mails or spoofed Web sites to the following groups:
Forward the e-mail to reportphishing@finexcapitalbank.com.
Forward the e-mail to the “abuse” e-mail address at the company that is being spoofed
When forwarding spoofed messages, always include the entire original e-mail with its original header information intact
Recommended Actions if you have become a Victim of a Phishing Scam:
If You Have Given Out Your Credit, Debit, or ATM Card Information:
Report the incident to the card issuer as quickly as possible.
Report using toll-free numbers and 24-hour service that many companies have established to deal with such emergencies.
Request your card issuer close your compromised account number and reissue you a new card with a different number.
Monitor your account activity and review account statements carefully after the information loss.
If any unauthorized charges appear, call the card issuer immediately and follow up with a hard copy letter via a traditional delivery service such as the U. S. Postal Service (keep a copy for yourself) describing each questionable charge.
Don’t Be an On-line Victim: How to Guard Against Internet Thieves and Electronic Scams
Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.
You risk unlimited loss if you fail to report an unauthorized transfer within 30 days after your bank statement containing unauthorized use is mailed to you for transactions made after that 60-day period. If You Have Given Out Your Bank Account Information:
Report the theft of this information to the bank as quickly as possible.

Request your bank close the compromised account and re-open a like account with a different number.

If You Have Downloaded a Virus or ‘Trojan Horse’:

Some phishing attacks use viruses and/or “Trojan Horses” to install programs called “key loggers” on your computer. These programs capture and send out any information that you type to the phishers, including credit card numbers, user names and passwords, Social Security numbers, etc. If this happens, it is likely you may not be aware of it until you notice unusual transactions on your account.
To minimize this risk, you should:
Install and/or update anti-virus and personal firewall software.
Update all virus definitions and run a full scan.
If your system appears to have been compromised, repair it and then change your password again, since you may well have transmitted the new one to the hacker.
Check your other accounts! The fraudsters may have helped themselves to many different accounts: eBay account, PayPal, your e-mail ISP, online bank accounts, online trading accounts and other e-commerce accounts, and everything else for which you use online passwords.
If You Have Given Out Your Personal Identification Information
If you believe you have given out personal information such as your name, address, and Social Security number to someone who may use it for fraud:
Request that the agencies place a fraud alert and a victim’s statement in your file.
Request a free copy of your credit report to check whether any accounts were opened without your consent.
Request that the agencies remove inquires and/or fraudulent accounts stemming from the theft.
Additional Actions
If bank accounts were set up without your consent, close them.
Contact your local police department to file a criminal report.
Contact the Social Security Administration’s Fraud Hotline to report the unauthorized use of your personal identification information.
Notify the Department of Motor Vehicles of your identity theft.
Check to see whether an unauthorized driver’s license number has been issued in your name.
Notify the passport office to be on the lookout for anyone ordering a passport in your name.
File a complaint with the Federal Trade Commission. Ask for a free copy of “Take Charge: Fighting Back Against Identity Theft” a guide that will help you guard against and recover from your theft – and guard against it in the future.
File a complaint with the Internet Crime Complaint Center (IC3) by visiting their Web site:
www.IC3PuertoRico.gov. IC3 is a partnership between the Federal Bureau of Investigation (FBI) and the National White-Collar Crime Center (NW3C), with a mission to address fraud committed over the Internet. For victims of Internet fraud, the Center provides a convenient and easy-to-use reporting mechanism that alerts authorities of a suspected criminal or civil violation.
Document the names and phone numbers of everyone you speak to regarding the incident. Follow up your phone calls with letters. Keep copies of all correspondence.
How To Practice Safe Computing The number and sophistication of phishing and spoofing scams sent out to consumers is continuing to increase dramatically. While online banking is widely considered to be as safe as or safer than in-branch or ATM banking, as a general rule you should be careful about giving out your personal financial information over the Internet. Remember, Heritage Bank will never request your personal information via e-mail.
Here is a list of recommendations to follow in order to avoid becoming a victim of scams:
Be suspicious of any e-mail with urgent request for personal financial information. Phishers have been known to include upsetting or enticing (but false) statements in their e-mails to get people to react immediately. More recently, some phishers have toned down their language, as e-mail recipients have become more aware of the use of this tactic. Either way, the e-mail typically asks for information such as user names, passwords, credit card numbers, Social Security numbers, etc.
Be careful of e-mails that are not personalized and/or may contain spelling errors and/or awkward syntax and phrasing. Many phishing e-mails are sent in great bulk and, therefore, are not personalized. If you are suspicious of an e-mail claiming to be from your institution that is not personalized, call your institution before responding. Many also are being sent from other countries from individuals for whom English is a foreign language, thus resulting in misspelled words and awkward syntax and phrasing.
Be careful of personalized e-mails that ask for personal financial information. Be suspicious of any e-mail that contains some personal financial information, such as a bank account number and asks for other information, such as a PIN. Heritage Bank will never ask for or send you personal financial information by e-mail.
Do not use links in an e-mail to get to any Web page. Instead, call the bank on the telephone to confirm the address, or log onto the Web site directly by typing in the Web address in your browser.
Do not complete forms in e-mail messages that ask for personal financial information. Heritage Bank would never ask you to complete such a form within an e-mail message.
Only communicate information, such as credit card numbers or account information, via a secure Web site or the telephone. When submitting financial information to Web site, look for the padlock or key icon at the bottom of your browser, and make sure the Internet address begins with “https,” A secure Web server designation can be found by checking the beginning of the Web address in your browser’s address bar – the address should begin “https://…” rather than just “http://” While you cannot be completely sure that a Web site is secure when its address starts with “https”, you can be sure the Web site is not secure when it does not start with “https”.
Regularly log on to your online accounts and check your bank, credit and debit card statements to ensure that all transactions are legitimate. One of the real advantages of banking online is being able to regularly review your account for unauthorized or unusual activity. If anything is suspicious, contact Heritage Bank and all card issuers immediately.
Ensure that your browser is up to date and security patches applied. Always visit your browser’s home page to download the latest security updates even if they do not alert you to do so. Use online statements to reduce the volume of paper mailed. Paper today is the cause of more actual instances of identity fraud than are electronic thefts.