Raymond James uses the latest technology safeguards 24 hours a day, 365 days a year, to help keep unauthorized outside users from gaining access to internal or private networks and services. In addition to technology, security awareness training facilitates employee understanding of security and privacy policies and procedures to protect your personal information.
Raymond James’ financial advisors develop long-term trust relationships with their clients in order for each client to reach their goals. Branch associates have processes in place to verify account holder authentication prior to execution of any client transactions. Raymond James home office associates have an additional layer of protection to supplement branch verification of client accounts.
Raymond James will never initiate contact with you via e-mail or phone asking for your personal information. We may ask you for pieces of personal information when you contact us to verify that you are who you say you are, but otherwise we already have your personal information.
Personal information or personally identifiable information is information that can be linked to an individual or can be used to uniquely identify an individual. Your first name or first initial and last name, in combination with any of the following data, can be used to transact business on your behalf:
-Social Security number
-Driver’s license or identification card number
-Financial account number
-Credit or debit card number
-Home address or e-mail address
-Medical or health information
Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver’s license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise and services in the name of the victim, or to provide the thief false credentials. In addition to running up debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen. (from: Identity Theft Resource Center)
-Your personal information is stolen from a business or other institution
-Mail is stolen from your mailbox
-Dumpster diving – retrieving personal paperwork and discarded mail from trash dumpsters
-Social engineering – posing as landlord, potential employer, etc. to get your personal credit information
-Stealing your wallet or purse
-Filling out a change of address form to reroute your mail
-Stealing information from your home, your car or from your hotel room when you are traveling
-Online theft of personal or account information
-Shoulder surfing – the identity thief simply stands next to someone at a public office, such the department of motor vehicles, and watches as the person fills out personal information on a form
Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking e-mail in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well-known and trustworthy websites. Websites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo![PC1] , BestBuy and America Online. A phishing expedition, like the fishing expedition it’s named for, is a speculative venture: the phisher puts out the lure hoping to fool at least a few of the prey that encounter the bait. (from: Whatis.com)
A strong password helps to prevent a hacker from guessing or cracking your password and gaining access to your account:
-Use combinations of upper- and lowercase characters, as well as symbols and numbers. Most hackers focus on commonly used words in dictionary databases.
-Pick long words. The more characters, the harder it is to hack. Combine two unusual, long words around a special character, such as declension:riparian.
-Use the first letter of each word from a favorite saying, song lyric or poem. So "I Heard It Through the Grapevine" becomes IHITTG or IhIttG (mixing upper- and lowercase letters).
-Use foreign language words. Combining a foreign language word and an English word is even more effective.
Internet cafés and kiosks make it convenient to access your e-mail and other online accounts. However, when you log on to a PC in a public location, you may be unknowingly compromising confidential information. You have no way of knowing what malicious applications may be installed on the PC, and even a strong password won’t protect you from this danger. The safest way to avoid the risk is to simply steer clear of using Internet cafés and kiosks to access your Raymond James network account or financial sites such as your bank or brokerage account.
Although no technology is foolproof, you should only exchange personal information with “secure” sites, which provide a visual indicator that they take measures to secure your personal information when you are transmitting it over the Internet. To determine whether the site is secure, look for these signs:
-The website address begins with https:// instead of http://. The "s" means the site is secure.
-An unbroken key symbol or locked padlock icon at the bottom of your screen. If the padlock is unlocked, the site may not be secure.
-Shred or tear up unwanted documents that contain personal information before discarding them.
-Place all outgoing mail in a U.S. Postal Service mail collection box, or give directly to your mail carrier.
-Do not leave mail in your mailbox overnight.
-Never give out personal information over the phone or the Internet unless you initiated contact.
-Know when to expect bills and statements to arrive in the mail. If they don’t arrive within three days, contact the business.
-Do not bring your checkbook or documents you don’t need, such as bills or statements.
-Call your credit card company and let them know where you will be going.
-Use your room safe to store valuables.
-Use a credit card and avoid using debit or ATM cards.
-Avoid performing any financial transactions or accessing personal information in kiosks, hot spots or Internet cafés.
-Contact the three credit bureaus to place a freeze on your credit reports:
-Keep detailed notes of all phone and mail contacts regarding your case
-Contact your local police department to file a report
-Contact your Raymond James broker
-Contact all creditors – by phone and by mail to report the fraud
-Contact the following government agencies:
-United States Postal Inspection Service: postalinspectors.uspis.gov
-Better Business Bureau: us.bbb.org
-FTC File a Complaint: ftccomplaintassistant.gov