hereʼs a new type of Internet Here’s how works: How to Protect Yourself piracy called “phishing.” Itʼs n a typical case, youʼll receive an e-mail that Never provide your personal pronounced “fishing,” and appears to come from a reputable company information in response to an thatʼsT exactly what these thieves are that you recognize and do business with, unsolicited request, whether it is over the Isuch as your financial institution. In some 1phone or over the Internet. E-mails and Internet doing: “fishing” for your personal cases, the e-mail may appear to come from a pages created by phishers may look exactly financial information. What government agency, including one of the federal like the real thing. They may even have a fake financial institution regulatory agencies. padlock icon that ordinarily is used to denote they want are account numbers, The e-mail will probably warn you of a serious a secure site. If you did not initiate the , Social Security problem that requires your immediate attention. communication, you should not provide any numbers, and other confidential It may use phrases, such as “Immediate attention information. information that they can use to loot required,” or “Please contact us immediately If you believe the contact may be about your account.” The e-mail will then legitimate, contact the financial your checking account or run up encourage you to click on a button to go to the institution yourself. You can find bills on your credit cards. institutionʼs Web site. phone2 numbers and Web sites on the monthly statements you receive from your financial In a phishing scam, you could be redirected In the worst case, you could find institution, or you can look the company up in to a phony Web site that may look exactly a phone book or on the Internet. The key is that yourself a victim of identity . like the real thing. Sometimes, in fact, it may you should be the one to initiate the contact, be the companyʼs actual Web site. In those With the sensitive information using contact information that you have verified cases, a pop-up window will quickly appear yourself. obtained from a successful phishing for the purpose of harvesting your financial scam, these thieves can take out information. Never provide your over the phone or in response to an unsolicited loans or obtain credit cards and In either case, you may be asked to update your Internet request. A financial institution account information or to provide information even driverʼs licenses in your name. 3would never ask you to verify your account for verification purposes: your Social Security They can do damage to your information online. Thieves armed with this number, your account number, your password, information and your account number can help financial history and personal or the information you use to verify your themselves to your savings. reputation that can take years identity when speaking to a real financial institution, such as your motherʼs maiden name Review account statements regularly to unravel. But if you understand or your place of birth. to ensure all charges are correct. If how phishing works and how to your account statement is late in arriving, If you provide the requested information, you call4 your financial institution to find out why. protect yourself, you can help stop may find yourself the victim of . If your financial institution offers electronic this crime. account access, periodically review activity online to catch suspicious activity. What to do if you fall victim: You Can Fight Identity Theft WARNING • Contact your fi nancial institution immediately and alert it to the situation. Here’s How: Never provide personal fi nancial Internet Pirates • If you have disclosed sensitive information in information, including your Social Security a phishing attack, you should also contact one number, account numbers or passwords, over are Trying to of the three major credit bureaus and discuss the phone or the Internet if you did not initiate SteaSteall whether you need to place a alert on the contact. your fi le, which will help prevent thieves from opening a new account in your name. Never click on the link provided in an e-mail YOUR Personal Here is the contact information for each you believe is fraudulent. It may contain a virus bureauʼs fraud division: that can contaminate your computer. Financial Information Do not be intimidated by an e-mail or Equifax caller who suggests dire consequences if 800-525-6285 you do not immediately provide or verify P.O. Box 740250 fi nancial information. Here’s the Atlanta, GA 30374 If you believe the contact is legitimate, go Experian to the companyʼs Web site by typing in the Good News: 888-397-3742 site address directly or using a page you have P.O. Box 1017 previously book marked, instead of a link Allen, TX 75013 provided in the e-mail. YOU have If you fall victim to an attack, act TransUnion immediately to protect yourself. Alert your 800-680-7289 the Power to fi nancial institution. Place fraud alerts on P.O. Box 6790 your credit fi les. Monitor your credit fi les and Fullerton, CA 92634 account statements closely. Stop Them • Report all suspicious contacts to the Federal Report suspicious e-mails or calls to the Trade Commission through the Internet at through the Internet www.consumer.gov/idtheft, or by calling at www.consumer.gov/idtheft, or by calling 1-877-IDTHEFT. 1-877-IDTHEFT.

A message from the federal bank, thrift and credit union regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation National Credit Union Administration Office of the Comptroller of the Currency Office of Thrift Supervision