How we keep you safe online

We know you access customer accounts in many different ways, including tablets, laptops, and mobile devices. That's why we use advanced security measures to ensure that every visit to Fidelity is safe. Here are just a few ways we help keep you secure online.

Username and password requirements

To help prevent unauthorized access, we prompt you to create a unique username and password for first-time access. The strongest passwords are longer and use a mix of numbers, upper- and lower-cased letters, and special characters. We also provide a visual password strength meter to assist you in creating a strong password.

Customer verification

Whether you visit us online or by phone, we always verify your identity before granting you access, and for the security of your account, the password will lockout after three failed attempts.

Security questions

When we notice an attempt to log in to a Fidelity website from an unrecognized computer, we may prompt you to answer enhanced security questions or use a security code to make sure it's really you accessing customer accounts. Unusual account login and transaction activity is investigated by Fidelity risk professionals.

Strong encryption

We use the strongest encryption available to protect customer information as it travels across our internal systems infrastructures and over the Internet.

Firewalls

Fidelity employs a multi-layer firewall architecture that includes the strategic placement of firewalls at both internal and external interface points.

Secure email

We digitally sign all emails so that you can verify that our message has not been forged or altered.

Timed logoff

Our websites automatically log you off after 30 minutes of inactivity. This reduces the risk that others could access information from your unattended computer or mobile device.

Constant systems surveillance

We monitor our systems around the clock to provide you with peace of mind no matter when you log in.

Security at Fidelity worksites

Because we also print and deliver documents containing sensitive personal information, all work areas are monitored continuously and restricted to only authorized personnel.

Restricted access to customer data

Just as we limit physical access to our work areas, we also restrict access to systems containing customer data and constantly monitor access to these systems.

Employee education

Our employees receive thorough training on our security policies and are held accountable when it comes to adhering to those policies. Employees who work directly with customers also receive training on emerging security risks.

NEXT STEPS

751444.1.0