To ensure an optimal and secure experience, please upgrade to the latest version of your browser.
At Dreyfus, we take the issue of privacy very seriously. We want to assure our Web site visitors and clients that they are receiving the security, privacy and confidentiality they expect from a financial services firm.
Dreyfus will never contact you by e-mail to confirm financial transactions or to confirm or request personal account information or any other type of sensitive information.
If you do receive an e-mail that asks you to confirm financial transactions, provide or confirm sensitive information (such as passwords or sign-on IDs), or personal information (such as Social Security Numbers or personal bank account numbers), please assume that the request is fraudulent.
Some e-mails, links or Web sites may even include the Dreyfus logo or resemble existing Dreyfus Internet sign-on pages. You should continue to assume that the request is fraudulent because Dreyfus will never contact you by e-mail to request or confirm personal or sensitive account information.
If you receive e-mail requests to visit a Web site or to submit personal information, consider them fraudulent and notify Dreyfus here. We strongly recommend that you do not open an attachment, click on a link, visit the site, submit your personal information via the site or e-mail, or respond in any way.
What is escheatment?
Escheatment is the process of turning over unclaimed or abandoned property, including unclaimed or abandoned financial assets, to a state authority in accordance with state law. Learn more.
The Internet and electronic communications have made it easy for you to check your account information and initiate investment transactions online. Because of this, Dreyfus has implemented significant measures to help protect the security of your account — you should take precautions too.
To help protect the confidentiality of your personal information and transactions, Dreyfus.com utilizes the following layers of security:
Scam artists and fraud schemes are nothing new, but the Internet has helped bring them to a whole new level. Here are some of the scams you should be aware of.
Beware of fraudulent e-mail. There have been many reported incidents of imposters sending e-mails claiming to be from legitimate companies in an attempt to trick people into providing them with sensitive personal information. These fraudulent e-mails, sometimes referred to as "phishing," often claim to be "urgent," and say that you must immediately reply to confirm, update or provide sensitive personal information (such as a Social Security Number, account number, password, or personal identification number (PIN)) or your account will be closed or some other action will be taken. These fraudulent e-mails may include links to fake Web sites, created to trick you into providing your sensitive personal information. Here are some tips to follow to help protect you from these scams:
Internet fraud and threats don't only come from your computer. Social Engineering is a form of "phishing" in which a live person calls the victim posing as a system administrator or someone else of importance and persuades the victim to give the caller important information, like passwords, that will enable them to "help" the victim with his or her account. Dreyfus will never call you to ask for your personal information or passwords.
Also, when you call Dreyfus or any company you do business with, be sure to use a reputable phone number such as one obtained from your account statement.
You should use the same precautions when accessing the Web/e-mail through your cell phone or other mobile device that you would with any wireless network.
Be aware of what you are downloading from the Web. Many fun "free" items for your computer come with additional software that can have a variety of purposes from popping up ads on your computer ("adware"), to tracking your site usage or logging your keystrokes and sending them back to the person who created the software ("spyware"), to installing malicious software ("malware") which may disrupt or even destroy your system. To help prevent the installation of this type of software on your computer, follow these guidelines:
Be careful when using wireless hotspots (public access points) and wireless networks. Hotspots are public access points that enable you to get onto the Internet wirelessly. Some require payment, while many are free. When surfing the Internet using a hotspot, you should take many of the same precautions as when you are using a public computer.
Take some special precautions when connecting to a wireless network: