We want to make sure your private information stays private. Please take some time to review how we work to ensure your personal and financial information is protected, and the steps you can take to stay safe from fraud and identify theft on the internet.
Visit our Identity Theft Reporting Checklist page for more helpful information.
At TCU you can receive eStatements online through TCU Internet Banking. Your account statements will no longer have to sit in your mailbox waiting for you to pick them up! eStatements are safe and secure. To register for eStatements, log in to Internet Banking and click on "eStatements". Once you register for eStatements, you will no longer receive paper statements. Contact a TCU Representative for more details.
Call (800) 552-4745 for more information or to answer any questions or concerns.
Access to Internet Banking requires your member number and a unique password. This information along with any interactions and\or transactions performed is encrypted during transmission. You cannot use any part of your member number or Social Security Number as your password. TCU strongly encourages you to define a unique password that only you can provide and is not tied to any personally identifiable information that a hacker could obtain from a phone book or the Internet.
TCU provides Enhanced Login Security which significantly increases your level of protection online. Not only will your password and user id be recognized, but your device will be recognized as well. If we don't recognize your device – you've logged in from a public computer or one you haven't used before - you will be prompted to provide a secure access code which will be sent to you. This step acts as an additional line of defense against unauthorized access to your accounts.
The TCU Internet Banking platform will log you off after 10 minutes of inactivity. This will reduce the risk of someone else accessing your financial information if you leave your PC unattended.
Internet Banking systems are protected 24 hours a day by a variety of security measures, to include firewalls that block unauthorized entry.
Throughout your Internet Banking session, from login, to transaction activity, to log-off, all interactions are encrypted between your browser and the web server. TCU employs some of the strongest levels of encryption available today.
You can identify a secure (encrypted session) by looking for the "closed lock" icon in the lower right-hand corner (Microsoft Internet Explorer) or in the right end of the address bar (Firefox 2) or in the top right corner (Safari) of your browser. Additionally, the Web address or URL will begin with https://.... This indicates the page you are viewing uses encryption. The "s" stands for "secured."
While the measures noted above are instrumental to your safe interaction with Internet Banking, continuous monitoring is in place to alert TCU of any unusual activity. If suspicious activity is identified, TCU will take necessary steps to shut down access until the issue has been resolved. Security of your information is a top priority and we take it very seriously.
TCU has enlisted the assistance of our Debit/ATM Card process, Star Systems, to identify potentially fraudulent transactions and then contact you to verify whether they were authorized or not. Calls will originate from (800) 327-8622 and you will be asked your name, the phone number the message was left on if applicable, along with information about the transaction(s) in question.
It's not always easy to identify online fraud. Understanding how fraudulent activity takes place helps with prevention, and keeps you safe.
Email is often a vehicle used to transmit malware and commit fraud. It is important to evaluate your email behaviors and develop good habits to help protect your computer and your identity.
In addition to viruses and worms that can be transmitted via email, phishing also threatens email users. A type of email fraud, phishing occurs when a perpetrator, posing as a legitimate, trustworthy business, attempts to acquire sensitive information like passwords or financial information.
Delete all spam without opening it. Responding to spam only confirms your email address to the spammer, which can actually intensify the problem.
It's safer to retype the Web address than to click on it from within the body of the email.
Don't open attachments from strangers.
If you do not know the sender or are not expecting the attachment, delete it.
Most computer files use filename extensions such as ".doc" for documents or ".jpg" for images. If a file has a double extension, like "heythere.doc.pif," it is highly likely that this is a dangerous file and should never be opened. In addition, do not open email attachments that have file endings of .exe, .pif, or .vbs. These are filename extensions for executable files and could be dangerous if opened.
If you don't know the reputation of a Web site, don't assume you can trust it. Many Web sites sell email addresses or may be careless with your personal information. Be wary of providing any information that can be used by others for fraudulent purposes.
Forged email purporting to be from your financial institution or favorite online store is a popular trick used by criminals to extract personal information for fraud.
Many fraudulent emails send out urgent messages that claim your account will be closed if sensitive information isn't immediately provided, or that important security needs to be updated online. Your financial institution will never use this method to alert you of an account problem.
A tell-tale sign of a fraudulent email or Web site includes typos and grammar errors as well as unprofessional design layout and quality. Delete them immediately.
Consider backing up all sensitive files. This will not only help you restore damaged or corrupted data, but it will help protect against fraud attacks and help recover lost files if needed.
In addition to protecting your email, there are a number of guidelines to follow that will help safeguard your identity online.
It is a common practice when registering for access to a Web site or making a purchase from a Web site to be asked if you want to keep your access credentials, credit card number or other sensitive information on file as a matter of convenience. This common request is referred to as "remembering" for the future use.
Not all Web sites are benign. Sites that are engaged in illegal or questionable activities often host damaging software and make users susceptible to aggressive computer attacks.
You should never use the "remember password" feature for online banking or transactional Web sites.
Since you cannot validate the computer's integrity, there's a higher risk of fraud when you log in from a public computer.
Firewalls, antivirus, anti-spyware and other protection devices help keep a computer properly monitored and provide peace of mind. These tools are important in order to protect your computer and data. A good firewall is critical if you commonly access the Internet via a wireless connection. It is also important to keep your computer up-to-date with patches to security tools as well as to the operating system and other programs on your computer. Make sure to configure your computer to update all security fixes.
The best password is an undetectable one. Never use birth dates, first names, pet names, addresses, phone numbers or Social Security Numbers. Use a combination of letters, numbers and symbols. Be sure to change your passwords regularly.
Only use secure Web pages when you're conducting transactions online (a Web page is secure if there is a locked padlock in the lower left-hand corner of your browser).
Always sign off or logout from your Internet Banking session or any other Web site that you've logged into using a user ID and password. When a computer is not in use, it should be shut down or disconnected from the Internet.
This helps protect you from unauthorized user access.
This is a common tactic that happens in public places such as coffee shops, airports and libraries etc. where an attacker will look over your shoulder when you're logged in to obtain your sensitive information. Be vigilant and aware of prying eyes.
The timeout feature is an additional safety check. It can prevent others from continuing your online banking session if you left your PC unattended without logging out. You can set the Timeout period in the User Options screen.
Tactics that fraudsters employ all share the same goal: to obtain your personal, confidential and financial information for fraudulent use.
From obtaining your information 'the old fashioned way' via discarded mail, to emails that ask you to verify personal information under the guise of a trusted source – like TCU – fraudulent activity comes in many different forms.
Dumpster Diving: Thieves rummage through trash looking for bills or other paper that includes your personal information.
Malware: Also known as 'malicious software', malware is designed to harm, attack or take unauthorized control over a computer system. Malware includes viruses, worms and Trojans. It's important to know that Malware can include a combination of all three of the types noted.
Phishing: A scam that involves the use of replicas of existing Web pages to try to deceive you into entering personal, financial or password data. Often suspects use urgency or scare tactics, such as threats to close accounts.
Vishing: Vishing is a type of phishing attack where the attacker uses a local phone number in the fake email as a means of obtaining your sensitive information. The goal is to fool you into believing the email is legitimate by instructing you that responding to the request by phone is safer than responding by email and shows authenticity. The unsuspecting caller is then tricked through an automated phone system to relinquish their sensitive information.
Pharming: Pharming takes place when you type in a valid Web address and you are illegally redirected to a Web site that is not legitimate. These 'fake' Web sites ask for personal information such as credit card numbers, bank account information, Social Security numbers and other sensitive information.
Trojan: A Trojan is malicious code that is disguised or hidden within another program that appears to be safe (as in the myth of the Trojan horse). When the program is executed, the Trojan allows attackers to gain unauthorized access to the computer in order to steal information and cause harm. Trojans commonly spread through email attachments and Internet downloads. A common Trojan component is a "keystroke logger" which captures a user's keystrokes in an attempt to capture the user's credentials. It will then send those credentials to the attacker.
Spoofing: Spoofing is when an attacker masquerades as someone else by providing false data. Phishing has become the most common form of Web page spoofing. Another form of spoofing is URL spoofing. This happens when an attacker exploits bugs in your Web browser in order to display incorrect URLs in your browser location bar. Another form of spoofing is called "man-in-the-middle". This occurs when an attacker compromises the communication between you and another party on the Internet. Many firewalls can be updated or configured to significantly prevent this type of attack.
Spyware: Loaded on to your computer unbeknownst to you, spyware is a type of program that watches what users do and forwards information to someone else. It is most often installed when you download free software on the Internet. Unfortunately hackers discovered this to be an effective means of sending sensitive information over the Internet. Moreover, they discovered that many free applications that use spyware for marketing purposes could be found on your machine, and attackers often use this existing spyware for their malicious means.
Pop-Ups: A form of Web advertising that appears as a "pop-up" on a computer screen, pop-ups are intended to increase Web traffic or capture email addresses. However, sometimes pop-up ads are designed with malicious intent like when they appear as a request for personal information from a financial institution, for example.
Virus: A computer virus is a malicious program that attaches itself to and infects other software applications and files without the user's knowledge, disrupting computer operations. Viruses can carry what is known as a "payload," executable scripts designed to damage, delete or steal information from a computer.
A virus is a self-replicating program, meaning it copies itself. Typically, a virus only infects a computer and begins replicating when the user executes the program or opens an "infected" file.
Viruses spread from computer to computer only when users unknowingly share "infected" files. For example, viruses are commonly spread when users send emails with infected documents attached.
RetroVirus: This virus specifically targets your computer defenses. It will look for vulnerabilities within your computer operating system or any third party security software. Most security vendors have some form of tamper-proof measure in place, so it is important to keep your patches up-to-date. Retro Viruses are usually combined with another form of attack.
Worm: A worm is similar to a virus but with an added, dangerous element. Like a virus, a worm can make copies of itself; however, a worm does not need to attach itself to other programs and it does not require a person to send it along to other computers.
Worms are powerful malware programs because they cannot only copy themselves; they can also execute and spread themselves rapidly across a network without any help.
Please call (800) 523-4175
Complete our secure 'General Questions' form and provide detailed information about what occurred and the range of check numbers that were lost or stolen
If your TCU checkbook, ATM card or TCU Debit Mastercard® is lost or stolen, it is very important that you report it to TCU as soon as possible. If any of the items have been stolen, we strongly recommend you also file a police report.
Teachers Credit Union is not responsible for accuracy, security, content, or services offered by other websites; we encourage you to view privacy & security disclosures of all websites you visit as they may be different than those of Teachers Credit Union.
If you're between the ages of 14 and 17, you and a parent/legal guardian can open your Student Rewards Checking by visiting your nearby TCU branch. Be sure you each bring two forms of valid ID. You can find a list of acceptable IDs here.
Yes, I am.
Great! Click here to get started.
No, not yet.
No problem! We'll take care of that while you apply for your loan.
No problem! We'll take care of that while you apply for your for your card.
🖶 Print/Download as a PDF
Developing a budget based on your monthly income, expenses and savings is the first step.
Even a small, regular contribution toward your retirement has the potential to grow into a large nest egg.
It is important to build up your savings to cover emergencies and to plan for your future. As a general rule, you should maintain enough savings to cover three to six months of your regular expenses.
Want to know more? Call or visit your local TCU service center or book an appointment when it's convenient for you.
An extra-low rate* makes TCU Visa Platinum the perfect card if you carry a balance each month or want to transfer a balance from a high-interest credit card. But the perks don't stop there:
✓ 1.99% APR for the first year*
✓ No annual fee
✓ No application fee
✓ Easy cash advances at ATMs
✓ No foreign country transaction fee
✓ Roadside Dispatch®
* Annual Percentage Rate (APR) range after introductory period is 7.25% - 17.25% based on your creditworthiness.
Every dollar of qualifying purchases earns 1.5 Rewards Points redeemable any time for cash back, merchandise, travel or gift cards. But that's just the beginning:
✓ Visa Concierge†
✓ Visa Luxury Hotel Collection
✓ Travel emergency assistance
✓ Rental Car
✓ Extended warranty protection
Click here to redeem your Rewards Points.
An extra-low rate makes TCU Visa Platinum the perfect card if you carry a balance each month or want to transfer a balance from a high-interest credit card.
With TCU Visa Signature Rewards, every dollar of qualifying purchases earns 1.5 Rewards Points redeemable any time for cash back, merchandise, travel or gift cards.
Great! Click above to get started.
No problem! Click above and we'll take care of that as you apply for your card.
No problem! Click here and we'll take care of that while you apply for your loan.
No problem! Click here and we'll take care of that first.
No problem! Click above and you can join while you open your account.
No problem! Click above and you can join while you purchase your certificate.
No problem! Click above and you can join while you open your IRA.
No problem! Click above and you can join while you open your HSA.
See how TCU handles your personal information.
Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.
The types of personal information we collect and share depend on the product or service you have with us. This information can include:
All financial companies need to share members' personal information to run their everyday business. In the section below, we list the reasons financial companies can share their members' personal information; the reasons Teachers Credit Union or TCU chooses to share; and whether you can limit this sharing.
Does Teachers Credit Union or TCU share for our everyday business purposes —such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus?
Can you limit this sharing?
Does Teachers Credit Union or TCU share for our marketing purposes —to offer our products and services to you?
Can you limit this sharing?
Does Teachers Credit Union or TCU share for joint marketing with other financial companies?
Can you limit this sharing?
Does Teachers Credit Union or TCU share for our affiliates' everyday business purposes — information about your transactions and experiences?
Can you limit this sharing?
Does Teachers Credit Union or TCU share for our affiliates' everyday business purposes — information about your creditworthiness?
Can you limit this sharing? -- Yes
Does Teachers Credit Union or TCU share for affiliates to market to you?
Can you limit this sharing?
Does Teachers Credit Union or TCU share for nonaffiliates to market to you?
Can you limit this sharing?
We don't share
Call Toll-free (800) 552-4745 - our menu will prompt you through your choice(s)
Visit us online: www.tcunet.com
Please note: If you are a new member, we can begin sharing your information 30 days from the date we sent this notice. When you are no longer a member, we continue to share your information as described in this notice. However, you can contact us at any time to limit our sharing.
Call toll-free (800) 552-4745 or go to www.tcunet.com
Who is providing this notice?
How does Teachers Credit Union or TCU protect my personal information?
How does Teachers Credit Union or TCU collect my personal information?
Why can't I limit all sharing?
What happens when I limit sharing for an account I hold jointly with someone else?
Affiliates - Companies related by common ownership or control. They can be financial and non-financial companies.
Nonaffiliates - Companies not related by common ownership or control. They can be financial and non-financial companies.
Joint marketing - A formal agreement between nonaffiliated financial companies that together market financial products or services to you.
For Alaska Members. We will not share personal information with nonaffiliates either for them to market to you or for joint marketing - without your authorization.
For Illinois, Maryland and North Dakota Members. We will not share personal information with nonaffiliates either for them to market to you or for joint marketing - without your authorization.
For California Members. We will not share personal information with nonaffiliates either for them to market to you or for joint marketing - without your authorization. We will also limit our sharing of personal information about you with our affiliates to comply with all California privacy laws that apply to us.
For Massachusetts, Mississippi and New Jersey Members. We will not share personal information from deposit or share relationships with nonaffiliates either for them to market to you or for joint marketing - without your authorization.
For Vermont Members. We will not share personal information with nonaffiliates either for them to market to you or for joint marketing - without your authorization, and we will not share personal information with affiliates about your creditworthiness without your authorization.
The TCU Visa® Accelerate Secure Credit Card is designed to help you strengthen, build or rebuild your credit. This secured card uses your own money as collateral* until you reach the last step of this 2-step program. You’re rewarded as you progress through each step, working to achieve milestone credit scores as you use your card responsibly.
✓ Zero Liability® coverage
Build your credit in 2 steps:
Reach a credit score of 650 at one-year, and you’ll get a lower rate.
Reach a credit score of 680 at two-years, and your secure funds will be released —which means money back in your wallet.
* The money you pledge as collateral will be held in a special savings account on deposit at TCU.
The TCU Visa® Accelerate Secure Credit Card is designed to help you strengthen, build or rebuild your credit. This secured card uses your own money as collateral* until you reach the last step of this 2-step program.
To apply for your Accelerate card, simply call our Member Services Team at (800) 552-4745 or stop by your nearby TCU branch. You can even schedule an appointment at a branch location and time that work best for you.
FIND A BRANCH
BOOK AN APPOINTMENT
Enter your email below to get all the latest updates! Get exclusive offers, pre-sale ticket opportunities and TCU Amphitheater updates straight to your inbox.
Your email will never be sold or shared.