How we keep you safe online
We know you access customer accounts in many different ways, including tablets, laptops, and mobile devices. That's why we use advanced security measures to ensure that every visit to Fidelity is safe. Here are just a few ways we help keep you secure online.
Username and password requirements
To help prevent unauthorized access, we prompt you to create a unique username and password for first-time access. The strongest passwords are longer and use a mix of numbers, upper- and lower-cased letters, and special characters. We also provide a visual password strength meter to assist you in creating a strong password.
Whether you visit us online or by phone, we always verify your identity before granting you access, and for the security of your account, the password will lockout after three failed attempts.
When we notice an attempt to log in to a Fidelity website from an unrecognized computer, we may prompt you to answer enhanced security questions or use a security code to make sure it's really you accessing customer accounts. Unusual account login and transaction activity is investigated by Fidelity risk professionals.
We use the strongest encryption available to protect customer information as it travels across our internal systems infrastructures and over the Internet.
Fidelity employs a multi-layer firewall architecture that includes the strategic placement of firewalls at both internal and external interface points.
We digitally sign all emails so that you can verify that our message has not been forged or altered.
Our websites automatically log you off after 30 minutes of inactivity. This reduces the risk that others could access information from your unattended computer or mobile device.
Constant systems surveillance
We monitor our systems around the clock to provide you with peace of mind no matter when you log in.
Security at Fidelity worksites
Because we also print and deliver documents containing sensitive personal information, all work areas are monitored continuously and restricted to only authorized personnel.
Restricted access to customer data
Just as we limit physical access to our work areas, we also restrict access to systems containing customer data and constantly monitor access to these systems.
Our employees receive thorough training on our security policies and are held accountable when it comes to adhering to those policies. Employees who work directly with customers also receive training on emerging security risks.