For more than 160 years, account security has been a top priority for Wells Fargo. Today, we remain as committed as ever and use the latest technologies to help protect your financial information and privacy.
In addition, under federal law, Regulation E (Electronic Fund Transfer Act) provides certain protections to consumer customers when there is unauthorized account activity. Regulation E covers electronic fund transfer activity through a checking, savings, or other consumer asset account at a financial institution used primarily for personal, family, or household purposes. All of the protections provided by Regulation E are incorporated into our Online Security Guarantee. In addition, our Online Security Guarantee expands these protections to cover other types of unauthorized transactions, including certain business and brokerage monetary transactions as described above. Learn how our Online Security Guarantee works.
When you sign up for online access, Wells Fargo asks you to create your own username and password, to access your accounts. This information is encrypted during transmission. Wells Fargo now allows you to select your own, personal username to sign on, instead of your Social Security number. We strongly recommend that you do not use your Social Security number as a username or password. To create a new username, sign on to Wells Fargo Online® or Wells Fargo Business Online® Banking and go to Account Services.
Wells Fargo may request a customer’s online banking username to authenticate the customer by phone or email; however, we do not request a customer’s online banking password to verify their identity. Wells Fargo emails may include a Wells Fargo Online sign-on link. If there is ever a question regarding the legitimacy of an email, our customers should visit wellsfargo.com and sign on from the homepage.
Since 2008 Wells Fargo has required Online Banking customers to select three security questions and provide answers. If we ever need to confirm your identity, your correct answers to security questions will help us verify it’s you.
Wells Fargo's system will automatically log you off from Wells Fargo Online® or Wells Fargo Business Online® Banking after 10 minutes of inactivity. This reduces the risk of others accessing your information from your unattended computer.
Wells Fargo's computer systems are protected 24 hours a day by a powerful firewall that blocks unauthorized entry. In order to gain access to authorized information, the Web browser you are using must know the proper protocol, or language, and even then only select information is available.
From the moment account information leaves your computer to the time it enters Wells Fargo's system, all online access and Bill Pay sessions are encrypted. Wells Fargo employs some of the strongest forms of encryption commercially available for use on the Web today.
Look for a "closed lock" icon in the lower right-hand corner (Microsoft Internet Explorer) or in the right end of the address bar (Firefox 2) or in the top right corner (Safari) of your browser to determine if encryption is being used on any Web page you are viewing. Any Web address beginning with "https://..." indicates the page you are viewing uses encryption. The "s" stands for "secured."
Wells Fargo maintains and monitors our security systems to help protect your accounts.
Additional security measures
Wells Fargo's layered approach to online security extends beyond a unique username and password, encryption, firewall, technology updates, and ongoing monitoring. We have additional security measures that may be activated in response to certain activities or events. If we are suspicious of any online behavior, we may restrict online access to accounts or prevent certain types of transactions. These measures safeguard your identity and your accounts. Further proof of identity may be required before online access is restored.
To address evolving online threats, Wells Fargo has continued to enhance our security measures to help protect your accounts.
In addition, Wells Fargo collaborates closely with major Internet software manufacturers like Microsoft®, Mozilla®, and Apple® to ensure that new web browsers meet our high security standards and can be included in our list of supported browsers.