Current location - Quotes Website - Personality signature - Financial Consumer Rights Protection Tip 2: Personal financial information security is very important
Financial Consumer Rights Protection Tip 2: Personal financial information security is very important

01

Why the security of personal financial information is very important

Personal financial information mainly refers to banks Personal identity information, property information, account information, credit information, financial transaction information and their derivative information generated by other financial institutions when providing financial services to individual customers. Personal financial information is highly related to an individual's assets and credit status. Once leaked, it may pose a great threat to the security of personal property. For example, criminals may use the personal financial information they have to carry out precise fraud. Personal financial information security is the basis for property security. Therefore, relevant laws, regulations and regulatory provisions issued by the state clearly require financial institutions to take effective measures to protect the security of personal financial information.

Financial consumers should also keep in mind the "three don'ts" and "three musts" to protect the security of financial information.

"Three Don'ts": First, do not lend your identity documents, bank cards, etc. to others; second, do not disclose bank card numbers and account numbers to others at will. Passwords, SMS verification codes and other personal financial information; third, do not entrust unfamiliar people or intermediaries to handle personal financial services to prevent personal information from being stolen.

"Three Musts": First, when providing a copy of your identity document to handle various businesses, be sure to indicate the purpose of use on the copy to prevent it from being used for other purposes. Second, when downloading the APP or logging in to the website, be sure to carefully fill in personal information, especially personal financial information; third, before discarding financial business documents such as credit card purchase orders, withdrawal receipts, credit card statements, etc., be sure to completely tear them up. Shred or destroy with a shredder.

02

Why should you update the identity information reserved in the bank in time?

Customer identity information changes dynamically, and the customer identity information obtained for each identity recognition only reflects the customer's identity information at the moment of identification. Continuous identification of customer identities is the need to dynamically grasp customer transactions, provide a basic assessment basis for customer risk rating and transaction monitoring, and is conducive to combating the use of bank accounts to engage in telecommunications network fraud, money laundering and other illegal and criminal activities, and to prevent criminals from opening accounts under false names. , protect the legitimate rights and interests of customers.

If the identity document or identity document previously submitted by the customer has expired, or the identity information is invalid, the bank will suspend the customer's account or close it. Control measures such as counter business.

Currently, the channels through which banks support individual customers to update their identity information usually include: branch counters, smart self-service machines, mobile banking, WeChat banking, direct banking and other mainstream channels; corporate customers update The identity information is mainly on the counter. After the customer completes the supplementary entry of information, the control measures will be lifted simultaneously to facilitate customers to update their information and use their accounts normally.

03

How to prevent new telecommunications network fraud

In recent years In recent years, telecom network fraud has been repeatedly banned. Scammers are extremely cunning and constantly innovate their fraud methods, making it difficult for the general public to guard against them. In order to prevent fraudsters from taking advantage of the opportunity, please stay alert to common fraud techniques:

1. Identity impersonation fraud: Fraudsters often pretend to be leaders, relatives, friends, Staff members of the public security organs, civil affairs, education and other agencies, pretend to be staff of banks, securities companies and other units to commit fraud. They also forge identity fraud, such as pretending to be "Bai Fumei" or "Tall, rich and handsome", and acting as friends to defraud each other's affection and trust. After that, he immediately defrauded money through various methods such as financial constraints, high-yield project investment, and inducement to invest money in fake gambling websites.

2. Shopping fraud: Scammers often commit fraud through fake purchasing agents, low-price shopping, setting up fake shopping websites, fake returns, etc. For example, during the epidemic, illegal Under the guise of selling masks and other anti-epidemic materials through WeChat and other channels, after the victim pays the price, they find various reasons not to deliver the goods or block the victim.

3. Fictional danger fraud: Scammers often make up stories about relatives and friends who have suffered car accidents, kidnappings, surgeries, etc., and take advantage of the victim's anxiety to defraud money. For example, criminals falsely claim that the victim's child or parents have a sudden illness and require emergency surgery, and require money transfer for treatment. The victim often transfers money according to the criminals' instructions because of worry and impatientness.

4. Incentive fraud: Fraudsters lure victims by publishing various winning information, redeeming points, sharing links or scanning QR codes to receive red envelopes, high-paying recruitment, etc. Scam out money. For example, they use the live broadcast room to mix people, use barrage comments and other forms to send false advertisements such as easy and high-paying part-time recruitment. Once someone takes the bait, they will ask for a "deposit", "introduction fee", etc. to defraud money.

5. Other types of fraud: Mainly use various new things and popular social events to commit fraud, such as fraudulent orders and agent operations, "campus loan account cancellation", and fake investment platforms , false love donations, etc. For example, criminals cast a wide net through phone calls, text messages, social software and other channels, inviting defrauded people to join group chats. So-called experts and traders talk about stocks online in the group, and gradually induce the defrauded people to switch to false investments on the grounds of poor stock market conditions. The platform operates by claiming free transactions, low thresholds, and high returns. At first, the deceived will benefit. After gaining trust, it will gradually allow them to increase their investment, eventually causing the deceived to suffer heavy losses.

Consumers must start from themselves to protect the safety of their property, and achieve the "three maintenances" and "three musts" in our daily lives and work.

"Three Keeps": First, we must remain highly vigilant, and we must not blindly trust people who call or send WeChat messages claiming to be "a certain identity"; second, we must remain calm and calm, Don’t panic when you hear emergency news about accidents or property damage to relatives and friends; third, you must keep a clear mind and don’t be greedy for small profits when you see good news about winning prizes, receiving red envelopes, super low prices, super high salaries, etc.

"Three Musts": First, be sure to pay more attention to suspected telecom network fraud information. You can verify and confirm various information by calling the official phone number, checking the official website, discussing with relatives and friends, etc. authenticity; second, be sure to learn more about preventing telecom network fraud, and promptly remind the elderly and children at home, and also raise security awareness; third, be sure to seek help in time, and call as soon as possible once you find that you may have encountered telecom network fraud. Report the crime to 110 and accurately provide the scammer’s account and account name.

04

How to ensure the security of online transactions

With With the popularity of online transactions, in addition to using bank cards to pay, consumers often use mobile banking, Alipay, WeChat and other methods to pay. Online transactions are more convenient, but there are also many criminals who are looking for opportunities to use online transactions to infringe on consumer property safety.

In order to ensure the security of online transactions, please keep in mind the "eight shoulds":

First, the payment password should be set to a high strength Password, do not use birthdays, phone numbers, etc. as passwords, set different passwords for different payment methods, and change them regularly;

Second, before online transactions, you should confirm whether the URL is correct and select Use formal websites for online payment services and avoid transactions through fake and phishing websites;

Third, after completing online transactions, you should exit safely in a timely manner to avoid subsequent risky transactions; < /p>

Fourth, when conducting overseas online transactions, relevant authentication services should be opened through safe channels;

Fifth, it should be avoided Pay through public WIFI and do not conduct online transactions in public places such as Internet cafes to avoid leaking information such as account numbers and passwords;

Sixth, be careful not to scan emails from unknown sources. Use QR codes and log in to unknown websites to avoid being implanted with Trojan viruses by criminals;

Seventh, when handling online shopping, returns, and refunds, you should know the official channels and do not Trust unidentified phone calls, online chat tools or other informal network links provided in other forms;

Eighth, when receiving suspicious online transaction prompts, you should carefully confirm, if any If you have any questions, you should directly call the customer service hotline of the bank, Alipay, WeChat, etc. Do not directly reply to messages or click on links to inquire.

05

How to ensure the safety of credit card consumption

Because of the Consumption is very convenient and favored by many consumers. However, some criminals use fake POS machines to copy and steal other people's bank cards, causing huge property losses to cardholders. In order to ensure the safety of card consumption, please pay attention to the following matters:

First, be sure to conduct transactions at regular merchants, do not let the bank card out of your sight when swiping the card, and pay attention to the cashier.

Second, when swiping the card and entering the password for consumption, you should try your best to cover the operation gesture with your body or other hand;

p>

Third, when signing the purchase form, you must carefully check whether it is your card number, date and amount. If you find any errors, ask the cashier to tear up the voucher in person and cancel the transaction;

< /p>

Fourth, when the transaction is completed, you must confirm whether the bank card returned by the cashier is your own bank card, and save the purchase order for future verification with the statement;

Fifth, activate SMS Use the reminder service or bank application software to keep track of account dynamic information. When there are abnormal changes in your account, you must contact the card-issuing bank to inquire about the transaction in a timely manner.

06

How to use the "delayed arrival" function of transfers

In order to prevent telecom fraudsters from quickly transferring funds and better protect the safety of people's funds, banks and other financial institutions have launched a "delayed arrival" function for transfers. The "delayed arrival" functions of current common transfer methods include:

First, transfer through bank branch counters, online banking, and mobile banking. The arrival time can be selected in real time or Ordinary, next-day transfer, etc. If you choose non-real-time transfer, you can cancel the transfer before the transfer is received. For each transfer, if the default is real-time remittance, customers can choose to adjust the arrival time according to actual needs.

Second, if you transfer money to a non-person's account through a bank's self-service teller machine (ATM), the funds will arrive after 24 hours. Within 24 hours, the funds can be transferred to the ATM machine or Apply to cancel the transfer at the bank counter.

The third is to transfer money through WeChat and Alipay. The default arrival time of the system is usually real-time arrival. Users can turn on the "transfer delayed arrival" function by themselves and select 2 hours. The transfer will arrive later or 24 hours later, but the user cannot cancel the transfer on his own after transferring, and needs to contact customer service to apply for withdrawal.

The general public can make full use of the "delayed arrival" function of transfers to protect the safety of their property, but they must also be wary of criminals using this function to commit new types of fraud. For example, criminals wait for customers at the ATM machine to withdraw money, claiming that they have used up the withdrawal limit and hope to transfer the money to the victim's card, and ask the victim to help withdraw cash. After the victim delivers the cash, they secretly cancel the transfer. Another example is that criminals first transfer "winning" bonuses and provide transfer vouchers to trick victims into paying fees such as personal income tax, and then immediately cancel the remittance. Remember: When trading with others, you must base your transactions on the actual arrival in your account, and do not trust the transfer voucher easily.

07

Why cannot rent, sell or lease personal account information

< p> Some people believe that ID cards and bank cards are their own personal belongings. Whether they are sold or rented, they are personal matters. However, such behavior carries huge risks:

< p> First, the risk of information leakage. A large amount of personal information is stored in ID cards, bank cards and accounts. If you sell or rent your ID card, bank card and account for a small gain, it may lead to the leakage of personal information, damage to personal credit, etc., and endanger yourself. Property security.

The second is legal liability risk. According to the "Resident Identity Card Law", "Bank Card Business Management Measures" and other laws and regulations, ID cards, bank cards and accounts are only for personal use and are not allowed to be rented or lent. Individuals can sell or rent ID cards, bank cards and accounts. Yes, you may be subject to administrative penalties, and in serious cases, it may constitute a criminal offence. If others use relevant documents and cards to engage in illegal activities, the cardholder may be jointly and severally liable for civil compensation, criminal penalties and other legal liabilities.

Third, the harm to society is huge. Selling or renting ID cards, bank cards, etc. will provide convenience for criminals to engage in telecommunications network fraud, money laundering, illegal fund-raising, online gambling and other criminal activities, and become accomplices, which will seriously infringe the legitimate rights and interests of other financial consumers and disrupt fairness and integrity. social environment.

08

How to inquire and receive the deposit of a deceased depositor

To facilitate the public to handle deposits In succession, the China Banking and Insurance Regulatory Commission and the Ministry of Justice jointly issued the "Notice on Simplifying Inquiries on Matters Related to Deceased Depositors' Deposits" (Chinese Banking and Insurance Regulatory Commission [2019] No. 107), which simplifies the process for close relatives to inquire about deceased depositors' deposits. Process: The spouse, parents, and children of the deceased depositor must present the death certificate of the deceased depositor, documents showing kinship (such as household register, marriage certificate, birth certificate, etc.) and their valid identity documents to identify the heirs designated in the notarized will. Or the legatee can present the death certificate of the deceased depositor, a notarized will and his or her valid identity document to submit a written application to the banking financial institution where the deposit is located individually or jointly to handle the deposit inquiry business. The query scope includes bank deposit balances and the balances of non-deposit financial assets issued or managed by banking financial institutions themselves.

However, in order to protect the safety of customer deposits, receiving deposits from deceased depositors must still comply with the "Several Provisions on the Implementation of Savings Management Regulations" (Yinfa [1993] No. 7), etc. Related measures: When there is no dispute over the inheritance rights, the heir can go to the bank to make a withdrawal with the inheritance rights certification document issued by the notary public and his or her valid identity document. If there is a dispute over the inheritance rights, it must first be adjudicated by the People's Court. The heir can present the judgment or ruling of the People's Court. Please go to the bank to make a withdrawal with a written or mediation letter and your valid ID card.

09

How to correctly use the password-free and visa-free function for small-amount payments

The "Small Amount Payment No Password and No Visa" service is a small amount fast payment service provided by China UnionPay to customers. When you use a UnionPay chip bank card with the "Quick Pass" logo or a mobile device that supports "UnionPay Cloud Quick Pass" to make transactions below a certain amount at designated merchants in the country, you only need to insert the UnionPay chip bank card into the mobile device POS machine, etc. Just swipe the card in the "Quick Pass" sensing area of ??the acceptance terminal to complete the payment. During the payment process, you do not need to enter a password or sign.

According to the relevant business rules of China UnionPay, the function of password-free and visa-free small-amount payment is automatically activated. If you do not agree to activate the service function of "small-amount payment without password and visa", you can go to the bank where the card belongs. Apply to close this service at a branch or through online banking and other channels.