TC Wealth Partners  
Statements of Use

Data Protection:

Notice of Data Protection

How TC Wealth Partners and Trust Company of Illinois Rigorously Protect Your Confidential Information:

TC Wealth Partners and Trust Company of Illinois use the most stringent policies and procedures to protect the confidentiality, integrity and availability of client information under our control. Every TC Wealth Partners and Trust Company of Illinois employee undergoes a background check before hire and signs a confidentiality agreement, as well as a code of ethical business conduct, upon joining our firm. All employees receive annual security awareness training.

The Illinois Department of Financial & Professional Regulation examines information technology policies and procedures on a bi-annual basis. In addition, TC Wealth Partners and Trust Company of Illinois hire independent information security firm(s) to review our overall network system and security and to perform internal and external penetration testing.

Current technology provides protection using firewalls, network monitoring, anti-virus software and patch maintenance. TC Wealth Partners’ and Trust Company of Illinois’ server room is locked, accessed only by authorized personnel. Best practices in disaster recovery are followed with offsite replication of critical data as well as secure storage of historical data.

TC Wealth Partners’ and Trust Company of Illinois’ client access portal provides encrypted communication and secure identification. Client access is protected with unique ID passwords, security questions and visual cues.

How You Can Protect Yourself:

Protecting Yourself Online

Though the internet has many advantages, it can also make users vulnerable to fraud, identity theft and other scams. Simply by connecting to the Internet you are making yourself a potential target of criminals.

  • Keep your computers and mobile devices up to date: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
  • Set strong passwords: A strong password is at least eight characters in length and includes a mix of upper and lowercase letters, numbers, and special characters.
  • Watch out for phishing scams: Phishing scams use fraudulent emails and websites to trick users into disclosing private account or login information. Do not click on links or open attachments or pop-up screens from sources you are not familiar with.
  • Secure your internet connection: Always protect your home wireless network with a password. When connecting to public Wi-Fi Networks, be cautious about what information you are sending over it.

Protecting Your Identity

Identity theft continues to be one of the fastest growing crimes in the United States. Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. It is recommended that you follow these tips to keep your information, and your money, safe.

  • Don’t share your secrets: Don’t provide your Social Security number or account information to anyone who contacts you online or over the phone. Protect your PINs and passwords and do not share them with anyone. Use a combination of letters and numbers for your passwords and change them periodically. Do not reveal sensitive or personal information on social networking sites.
  • Shred sensitive papers: Shred receipts, bank and financial statements and unused credit card offers before throwing them away.
  • Keep an eye out for missing mail: Fraudsters look for monthly bank or credit card statements or other mail containing your financial information. Consider enrolling in online access to your financial accounts to reduce the likelihood of paper statements being stolen.
  • Use online access to protect yourself: Monitor financial accounts regularly for fraudulent transactions.

Protect your mobile device

  • Use the passcode lock on your smartphone and other devices: This will make it more difficult for thieves to access your information if your device is lost or stolen.
  • Log out completely when you finish a mobile session.
  • Use caution when downloading apps: Apps can contain malicious software, worms, and viruses. Always use official app stores to download any app. Download the updates for your phone and mobile apps.
  • Avoid storing sensitive information like passwords or a social security number on your mobile device.
  • Wipe your mobile device before you donate, sell or trade it.
  • Be aware of shoulder surfers: The most basic form of information theft is observation. Be aware of your surroundings, especially when you’re punching in sensitive information.