This page contains a Flash digital edition of a book.
Customers


Workplace


Environment


Communities


How We Operate


110


MATERIAL TOPIC


Privacy, Security and Fraud


Context


With incidents of data theft affecting major retailers in 2013, we are critically aware that the challenges of data security are increasingly sophisticated and require constant vigilance.


Materiality and Strategy


Protecting the security of our custom- ers’ information and doing our part to help ensure that TD’s banking system is not used for illegal purposes are an ongoing priority for TD. We are committed to creating a safe and secure environment for our employ- ees and customers. TD continues to


make significant investments to protect and regularly upgrade our controls and defences to meet legal and regulatory requirements and address new threats as they emerge.


Privacy


TD’s Global Privacy Program includes policies, procedures, standards and guidelines to help protect the privacy of our customers’ personal information and mitigate privacy risk. The program complies with applicable laws and regulations governing privacy. Robust governance and oversight promote an organizational culture that respects privacy. The privacy department is led by the Global Chief Privacy Officer, who reports to TD’s Chief Compliance Officer. Local Privacy Offices are responsible for the jurisdictions where we operate.


In the world of mobile banking with apps and virtual wallets on smart devices, privacy and data management become essential. When innovating, TD ensures that all technology meets regulatory and industry requirements and expectations, with efforts including piloting new mobile options.


+ Our Privacy Commitments TD 2013 Corporate Responsibility Report


Protecting Customers Against Fraud


Cyber criminals use a variety of tools and techniques, including phishing and malicious software (malware) to defraud banks and their customers and steal data. TD provides web pages on privacy and security in Canada and the U.S. to help customers understand how TD protects their personal information and how they can identify and protect themselves against fraud risks. As customers log on to conduct online banking, they are given reminders and tips on how to protect against fraud.


In 2013 we partnered with leading software suppliers to offer our customers two ways of proactively protecting themselves against malware. TD customers are offered free protection through McAfee Internet Security for one year and at a discounted rate for the second year, as well as through Trusteer Rapport at no cost to them. Through Internet advertising and information on


WATCH THE VIDEO Phishing: Helping customers protect against fraud





our EasyWeb, WebBroker and U.S. Online Banking sites, we encourage our customers to protect themselves using these tools.


In the unlikely event that customers experience a loss from an EasyWeb or WebBroker transaction they did not authorize, they would receive 100% reimbursement.


+ Online Security Guarantee


Security


Our dedicated global security professionals develop and oversee security standards to protect our retail premises, systems and customer information against unauthorized access and use.


Among the challenges TD and the rest of the industry face are increasingly sophisticated cyber threats. TD takes a vigilant, proactive, multi-layered approach to reducing the risk of cyber and other threats to the bank and our customers. This includes continuous adaptation of our security efforts that relate to threat intelligence and analytics, defensive controls, customer education and incident response.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92  |  Page 93  |  Page 94  |  Page 95  |  Page 96  |  Page 97  |  Page 98  |  Page 99  |  Page 100  |  Page 101  |  Page 102  |  Page 103  |  Page 104  |  Page 105  |  Page 106  |  Page 107  |  Page 108  |  Page 109  |  Page 110  |  Page 111  |  Page 112  |  Page 113  |  Page 114  |  Page 115  |  Page 116  |  Page 117  |  Page 118