Job Recruitment Website - Zhaopincom - Tips for protecting the rights and interests of financial consumers: Personal financial information security is very important.

Tips for protecting the rights and interests of financial consumers: Personal financial information security is very important.

0 1

Why is the security of personal financial information very important?

Personal financial information mainly refers to personal identity information, property information, account information, credit information, financial transaction information and its derivative information generated by banks and other financial institutions when providing financial services to individual customers. Personal financial information is highly related to personal assets and credit status. Once leaked, it may pose a great threat to personal and property safety. For example, criminals may use their personal financial information to implement precise fraud. Personal financial information security is the foundation of property security. Therefore, the relevant laws, regulations and regulatory provisions promulgated by the state clearly require financial institutions to take effective measures to protect the security of personal financial information.

Financial consumers should also keep in mind the "Three Don 'ts" and "Three Musts" to protect the security of financial information.

"Three Don 'ts": First, don't lend your identity documents and bank cards to others; Second, don't disclose personal financial information such as bank card number, account password and SMS verification code to others at will; Third, don't entrust unfamiliar people or intermediaries to handle personal financial business, and beware of personal information being stolen.

"Three Musts": First, when providing copies of identity documents for various businesses, be sure to indicate the purpose of use on the copies to prevent them from being used for other purposes; Second, when downloading an APP or logging in to a website, you must carefully fill in personal information, especially personal financial information; Third, before discarding financial business documents such as credit card purchase orders, withdrawal receipts and credit card statements, they must be completely shredded or destroyed with a shredder.

02

Why update the identity information reserved in the bank in time?

Customer identity information is dynamic, and the customer identity information obtained by each identification only reflects the customer identity information at the moment of identification. The continuous identification of customer's identity is the need to dynamically grasp the customer's transaction situation, which provides a basic evaluation basis for customer risk rating and transaction monitoring, and is conducive to cracking down on illegal and criminal activities such as telecommunication network fraud and money laundering using bank accounts, preventing criminals from opening accounts under false names and protecting customers' legitimate rights and interests.

If the identity certificate or identity certificate submitted by the customer has expired or the identity information is invalid, the bank will take control measures such as suspending business or closing its counter business.

At present, the channels that banks support individual customers to update their identity information usually include: outlets, intelligent self-service machines, mobile banking, WeChat banking, direct banking and other mainstream channels; Corporate customers mainly update their identity information at the counter. After the customer completes the information supplement, the control measures will be released simultaneously, which is convenient for the customer to update the information and use the account normally.

03

How to prevent new telecommunication network fraud

In recent years, telecommunication network fraud has been repeatedly banned, fraudsters are extremely cunning, fraud methods are constantly being refurbished, and the masses are hard to prevent. In order not to give fraudsters an opportunity, please be alert to common fraud methods:

1. False identity fraud: fraudsters often impersonate leaders, relatives and friends, staff of public security organs, civil affairs, education and other units, staff of banks, securities companies and other units to cheat, or even commit false identity fraud, such as impersonating "Bai" or "". After being added as a friend to defraud each other's feelings and trust, they immediately invest in high-yield projects with tight funds and induce them.

2. Shopping fraud: fraudsters often cheat through fake purchasing, low-priced shopping, opening fake shopping websites, and false returns. For example, during the epidemic, criminals used WeChat and other channels to sell epidemic prevention substances as a cover, and after the victims paid the price, they found various reasons not to deliver the goods or black the victims.

3. Fictitious dangerous fraud: fraudsters often use the anxiety of victims to fictionalize relatives and friends who have suffered car accidents, kidnappings, operations, etc. to defraud money. If criminals falsely claim that the victim's children or parents have a sudden illness and need emergency surgery, they can only ask for transfer treatment. Victims often transfer money according to the instructions of criminals because of fear and impatience.

4. Luring fraud: The fraudsters lure the victims by publishing various winning information, redeeming points, sharing links or scanning QR codes to receive red envelopes, and recruiting with high salaries, etc. to defraud money. For example, in the live webcast, there are mixed fish and dragons, and false advertisements such as easy and high-paying part-time recruitment are sent in the form of barrage comments. Once someone takes the bait, they are required to pay "deposit" and "referral fee" to defraud money.

5. Other types of fraud: mainly using all kinds of new things and social hot events to cheat, such as brushing bills, operating on behalf of others, "cancellation of campus loan accounts", false investment platforms, false love donations, etc. For example, criminals spread the net widely through telephone, text messages, social software and other channels, and invited the deceived to join the group chat. The so-called experts and traders talk about stocks online in groups, and gradually induce deceived people to operate on false investment platforms on the grounds that the stock market is not good, claiming that trading is free, the threshold is low and the return is high. At first, the deceived will get benefits. After gaining trust, they will gradually increase their investment, which will eventually make the deceived suffer heavy losses.

The vast number of consumers must start from themselves, protect property safety, and achieve "three maintenance" and "three musts" in daily life and work.

"Three Maintains": First, we must be highly vigilant and not blindly believe those who call WeChat to claim to be "an identity"; Second, we must remain calm and listen to emergency information such as accidents, property losses of relatives and friends, and we must not panic; Third, we should keep a clear head and see good information such as winning prizes, receiving red envelopes, ultra-low prices, ultra-high salaries, and not covet small profits.

"Three Musts": First, we must pay more attention to the suspected telecommunication network fraud information, and verify the authenticity of all kinds of information by making official calls, making inquiries in official website, and discussing with relatives and friends; Second, we must know more about the knowledge of preventing telecommunication network fraud, prompt the elderly and children at home in time, and raise the awareness of safety prevention; Third, we must seek help in time. Once you find that you may encounter telecom network fraud, you should call 1 10 as soon as possible to report the case, and provide the account number and account name of the liar accurately.

04

How to ensure the security of online transactions

With the popularity of online transactions, consumers not only use bank cards to pay, but also often use mobile banking, Alipay and WeChat to pay. Online transactions are more convenient, but there are also many criminals who use online transactions to infringe on the property safety of consumers.

In order to ensure the safety of online transactions, please keep in mind the "Eight Should's":

First, the payment password should be set with high-strength password, and don't use birthday and phone number as passwords. Different payment methods should set different passwords and modify them regularly;

Second, before online trading, it is necessary to confirm whether the website address is correct, choose a regular website for online payment business, and avoid trading through false and phishing websites;

Third, after completing online transactions, it is necessary to exit safely in time to avoid subsequent risky transactions;

Fourth, when conducting overseas online transactions, relevant certification services should be opened through secure channels;

Fifth, we should avoid paying through public WIFI, and do not conduct online transactions in public places such as Internet cafes, so as not to disclose information such as accounts and passwords;

Sixth, be careful not to scan the QR code of unknown source and log on to unknown websites to avoid being implanted with Trojan virus by criminals;

Seventh, when dealing with online shopping, returns and refunds, we should recognize the official channels, and don't believe in telephone calls, online chat tools or other forms of informal network links from unknown sources;

Eighth, when you receive a suspicious online trading tips, you should confirm it carefully. If you have any questions, call the customer service hotlines such as Bank, Alipay and WeChat directly. Don't reply to the message directly or click on the link to inquire.

05

How to ensure the safety of credit card consumption

Credit cards are favored by many consumers because of their convenience, but some criminals use fake POS machines to copy and steal other people's bank cards, which has caused huge property losses to cardholders. To ensure the safety of credit card consumption, please pay attention to the following matters:

First, transactions must be conducted in regular businesses. Please don't let the bank card leave your sight when you swipe your card. Pay attention to the number of times the cashier swipes your card to avoid accidentally swiping it.

Second, when swiping the card to enter the password, try to block the operation gesture with your body or the other hand;

Third, when signing the purchase order, carefully check whether it is your card number, date and amount. If something is wrong, the cashier should be asked to tear up the voucher in person and cancel the transaction.

Fourth, when the transaction is completed, it is necessary to confirm whether the cashier has returned his bank card and keep the shopping list so that it can be checked with the statement in the future;

Fifth, open SMS reminder service or use bank application software to keep abreast of account dynamic information. When the account changes abnormally, contact the issuing bank in time to inquire about the transaction.

06

How to use the "late arrival" function of transfer

In order to prevent telecom fraudsters from transferring funds quickly and better protect the safety of people's funds, banks and other financial institutions have opened the function of "delaying the arrival of funds". At present, the "delayed arrival" functions of commonly used transfer methods include:

First, transfer money through bank outlets, online banking and mobile banking. You can choose real-time, normal and next-day arrival time. If non-real-time arrival is selected, the transfer can be cancelled before arrival. For each transfer, if it is real-time remittance by default, customers can choose to adjust the arrival time according to actual needs.

Second, transfer money to non-peer accounts through bank self-service teller machines (ATMs). The funds will arrive in the account within 24 hours, and you can apply for cancellation of transfer at ATM or bank counters within 24 hours.

Third, transfer money through WeChat and Alipay. The system default time is usually real-time arrival. Users can turn on the function of "transfer delayed arrival" and choose to arrive after 2 hours or 24 hours. However, the user cannot cancel the transfer by himself after the transfer, and needs to contact customer service to apply for withdrawal.

The general public can make full use of the "delayed arrival" function to protect their property safety, but they should also be wary of criminals using this function to implement new fraud. For example, a customer who is waiting to withdraw money at the ATM machine says that his withdrawal quota is used up, and he wants to transfer the money to the victim's card, ask the victim to help him withdraw money, and then secretly cancel the transfer after the victim delivers the cash. Another example is that criminals first pay the "winning prize" by transfer, and provide transfer vouchers to trick the deceived person into paying personal income tax and other expenses, and then immediately cancel the remittance. Remember: transactions with others must be based on the actual arrival of the account, and you can't trust the transfer voucher.

07

Why can't I rent, sell or rent personal account information?

Some people think that ID cards and bank cards are personal items, whether they are sold or rented, they are personal matters, but such behavior hides great risks:

The first is the risk of information leakage. ID cards, bank cards and accounts all store a lot of personal information. If you sell or rent your ID card, bank card and account number for petty gain, it may lead to personal information disclosure, personal credit damage and endanger your property safety.

The second is the risk of legal liability. According to the Law on Resident Identity Cards, Measures for the Administration of Bank Card Business and other laws and regulations, ID cards, bank cards and their accounts are for personal use only and may not be rented or lent. Individuals selling or renting ID cards, bank cards and account numbers may be subject to administrative punishment and may even constitute a criminal offence. If others use relevant certificates and cards for illegal activities, the cardholder may also bear legal responsibilities such as civil compensation and criminal punishment.

Third, the social harm is enormous. Selling or renting identity cards and bank cards will facilitate criminals to engage in telecommunication network fraud, money laundering, illegal fund-raising and online gambling and become accomplices, which will seriously infringe on the legitimate rights and interests of other financial consumers and disrupt the fair and honest social environment.

08

How to inquire and collect the deposits of deceased depositors?

In order to facilitate people to handle deposit inheritance, the China Banking Regulatory Commission and the Ministry of Justice jointly issued the Notice on Simplifying the Deposit Inquiry of Deceased Depositors (No.[2065 438+09] 107 issued by Yin Bao Commission of Supervision). Simplifies the process for close relatives to inquire about the deposits of deceased depositors: spouses, parents and children of deceased depositors can submit a written application to the banking financial institution where the deposit is located with the death certificate of deceased depositors, documents showing kinship (such as household registration book, marriage certificate and birth certificate) and their valid identity documents, and heirs or legatees designated by notarized wills can submit a written application to the banking financial institution where the deposit is located alone or jointly with the death certificate of deceased depositors, notarized wills and their valid identity documents. The scope of inquiry includes the balance of bank deposits and the balance of non-deposit financial assets issued or managed by banking financial institutions themselves.

However, in order to ensure the safety of customers' deposits, it is still necessary to follow the Regulations on the Implementation of Savings Management: Several Provisions (Yinfa [1993] No.7) and other relevant measures. When there is no dispute about the inheritance right, the heirs can withdraw from the bank with the inheritance certificate issued by the notary office and their valid identity documents. If the right of inheritance is disputed, it must be judged by the people's court first, and the heir can withdraw it from the bank with the judgment, ruling or conciliation statement of the people's court and his valid identity certificate.

09

How to use the function of confidentiality-free and visa-free for micropayments correctly

The service of "exemption from confidentiality and visa for micropayments" is a fast micropayment service provided by China UnionPay. When you use the UnionPay chip bank card with the "flash payment" logo or the mobile device supporting "UnionPay China UnionPay Express" to conduct transactions below a certain amount in designated merchants in China, you only need to swipe the UnionPay chip bank card in the "flash payment" induction area of the acceptance terminal such as the mobile device POS machine to complete the payment. In the process of payment, you don't need to enter a password or signature.

According to the relevant business rules of China UnionPay, the function of confidentiality-free and visa-free for micropayments is automatically opened. If you don't agree to open the confidentiality-free and visa-free function of micropayments, you can apply to close this service at the bank outlets where the card belongs or through online banking and other channels.