Use and Acceptance
This website (the "Site"), and any tools and/or services offered and/or provided by The Bank of New York Mellon Corporation and/or its subsidiaries ("BNY") through this Site (collectively, the "Services"), are offered to you conditioned on your acceptance without modification of these Terms of Use. By using this website or any Services, you agree to these Terms of Use. Please read these Terms of Use carefully. If you do not agree to these Terms of Use, you may not use this website or any service offered or provided through this website.
Modification
We may change these Terms of Use from time to time without notice. You should review these Terms of Use each time you use this Site or a Service to make sure you agree to them. By using this Site or Services or engaging in any of the activities described in these Terms of Use, following changes to these Terms of Use, you are agreeing to accept and comply with those changes.
Authorized Use; Copyrights and Trademarks
This website and the Services may contain copyright and trademark and other proprietary materials owned by us or our copyrighted content providers. You may use the information available from this Site for informational purposes only. You may print copies of the pages of this Site for your personal purposes, provided that each copy includes any copyright, trademark or service notice, trademark notice, or attribution of how they appear, on the copied pages. The availability of third party data from or through this website is not to be used as a substitute for a license agreement or services directly with the relevant content provider. Except as noted above, you may not copy, reproduce, publish, transmit, display, store, sublicense, transfer, or distribute material or images from this website without the express written permission of us or our content providers, as applicable ("Permission"). You may not modify, alter, revise, paraphrase, omit or alter any material or images from this website without express permission. You may not create derivative works, whether based in whole or in part, on the information on this website or any portion of it without permission. You may not modify, alter, reduce the size or in any way obscure any notice, notification, limitation of liability or other license provision of material or images on or from this Site. Nothing contained on this Site and/or the Services should be construed as granting, by implication, estoppel, or otherwise, any license or right to our trademarks or copyrighted material. The information contained on this website is subject to change without notice.
We reserve the right to prohibit access to anyone we deem to be in violation of these Terms of Use, restricting or inhibiting any other user from using or enjoying the Site, or whose conduct in our judgment would constitute a criminal offense, give rise to civil liability, or otherwise violate any applicable local, state, national, or international law.
Limited Availability, Eligibility
The services mentioned on this website may not be available in all geographical areas. Your eligibility for particular products or services is subject to final determination by us and/or the applicable content provider.
Limitation of Liability
BY ACCESSING THIS SITE OR RECEIVING ANY SERVICES, YOU AGREE TO WAIVE ALL CLAIMS AGAINST US AND AGAINST THIRD-PARTY PROVIDERS OF CONTENT ON THIS SITE, THE INFORMATION PROVIDED ON THIS SITE, AND ALL INFORMATION RECEIVED BY YOU AS A RESULT OF USING THE SERVICES, AND ANY USE BY YOU OF SUCH INFORMATION. YOU AGREE THAT IN NO EVENT SHALL WE OR ANY OTHER PARTY INVOLVED IN CREATING, PRODUCING, OR DELIVERING THIS SITE OR ITS CONTENT OR SERVICES BE LIABLE FOR ANY DAMAGES, INCLUDING, WITHOUT LIMITATION, ANY DIRECT, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES OR DAMAGES FOR LOSS OF PROFITS, GOODWILL, BUSINESS INTERRUPTION, USE, DATA, EQUIPMENT, OR OTHER INTANGIBLE LOSSES (EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM (1) USE OR INABILITY TO USE THIS SITE OR ANY SERVICES; (2) THE CONSEQUENCES OF ANY DECISION OR ACTION OR ACTION NOT TAKEN BY YOU OR ANYONE TO WHOM YOU COMMUNICATE SUCH INFORMATION, OR BY ANY ERROR BY YOU IN COMMUNICATING SUCH INFORMATION; (3) THE COST OF REPLACEMENT SERVICES; OR (4) ANY OTHER MATTER RELATING TO THE CONTENT, SERVICES, OR DISTRIBUTION OF SERVICES THROUGH THIS SITE. WE WILL NOT BE LIABLE FOR DAMAGE OR INJURY TO PERSONS OR PROPERTY RESULTING FROM ANY USE OF ANY PRODUCT, INFORMATION, PROCESS, OR SERVICES OBTAINED THROUGH THIS SITE.
OUR ENTIRE AND YOUR SOLE RESPONSIBILITY FOR ANY DISPUTE OR ACTION RELATING TO THE SITE'S TERMS OF USE, ANY SERVICE, OR THE PRIVACY POLICY IS YOUR ASSIGNMENT OF USE OF THIS SITE AND ANY AND ALL SERVICES. BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, LIABILITY IS LIMITED TO THE FULLEST EXTENT PERMITTED BY LAW.
WE CANNOT AND DO NOT ASSUME ANY RESPONSIBILITY FOR UNAUTHORIZED OR FRAUDULENT USE OF THIS SITE AND ANY SERVICE.
Indemnification
YOU AGREE TO INDEMNIFY US AND OUR CONTENT PROVIDERS FROM ANY LOSS, INCLUDING ATTORNEYS' FEES, RELATED TO ANY COST, DAMAGES, CLAIM, OR EXPENSE RELATING TO ANY CONTENT YOU SUBMIT, POST, OR TRANSMIT THROUGH THIS SITE, YOUR USE OF THE SITE OR THE SERVICES, YOUR CONNECTION TO THE SITE, YOUR VIOLATION OF THE TERMS OF USE, OR ANY HARM YOU CAUSE TO ANOTHER USER.
Disclaimers
SOME OF THE CONTENT ON THIS SITE OR THE SERVICES MAY BE MADE AVAILABLE BY CONTENT PROVIDERS AND USERS. SEE "SOCIAL MEDIA" BELOW. WE ARE A DISTRIBUTOR AND NOT A PUBLISHER OF CONTENT AND HAVE NO CONTROL OVER YOUR PUBLICATIONS. ANY OPINIONS, ADVICE, STATEMENTS, SERVICES, OFFERS, OR OTHER INFORMATION GIVEN OR PROVIDED BY THIRD PARTIES (INCLUDING MERCHANTS AND LICENSORS) ARE THOSE OF THE RESPECTIVE AUTHORS OF SUCH CONTENT AND NOT OURS.
ALTHOUGH WE USE REASONABLE EFFORTS TO PROVIDE ACCURATE AND UP-TO-DATE INFORMATION THROUGH THIS SITE, WE AND THE CONTENT PROVIDERS MAKE NO WARRANTIES OR REPRESENTATIONS AS TO THE ACCURACY, RELIABILITY, OR COMPREHENSIVENESS OF THE CONTENT ON THIS SITE AND ANY SERVICE. THE INFORMATION CONTAINED ON THIS WEBSITE AND ANY SERVICE IS PROVIDED ON AN "AS IS" "AS AVAILABLE" BASIS. TO THE FULLEST EXTENT PERMITTED BY LAW, WE HAVE ALL WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, WITH RESPECT TO THE INFORMATION CONTAINED ON THIS SITE AND ANY SERVICE, INCLUDING ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. WE AND THE CONTENT PROVIDERS CANNOT AND DO NOT GUARANTEE THAT THE FILES AVAILABLE FOR DOWNLOADING (FROM THIS SITE AND ANY SERVICE) WILL BE FREE OF INFECTIONS OR VIRUSES, WORMS, TROJAN HORSES OR OTHER CODE TO CONTAMINATION OR DESTRUCTIVE PROPERTIES. YOU AGREE TO RELEASE AND HOLD US HARMLESS FROM ANY AND ALL CLAIMS, LOSSES, EXPENSES, OR DAMAGES RELATED TO ANY REJECTED WARRANTY DESCRIBED IN THIS PARAGRAPH.
THE INFORMATION PROVIDED ON ANY SERVICE OR ON THIS WEBSITE IS NOT INVESTMENT OR LEGAL ADVICE. INFORMATION RECEIVED THROUGH THIS SITE OR THE SERVICES SHOULD NOT BE RELIED UPON BY PERSONAL, LEGAL OR FINANCIAL DECISION-MAKERS AND YOU SHOULD CONSULT AN APPROPRIATE PROFESSIONAL FOR ADVICE SPECIFIC TO YOUR SITUATION. THE INFORMATION CONTAINED ON THIS WEBSITE, INCLUDING THE INVESTOR RELATIONS SECTION (INCLUDING, WITHOUT LIMITATION, STOCK QUOTES, CHARTS, AND SEC FILINGS) AND ANY ADDITIONAL CONTENT IS DISCLOSED FOR INFORMATIONAL PURPOSES ONLY AND IS NEITHER A SOLICITATION NOR AN OFFER TO BUY OR SELL ANY STOCK, MUTUAL FUND OR OTHER SECURITY, NOR SHOULD IT BE USED IN CONNECTION WITH ANY SALE, OFFERING FOR SALE OR SOLICITATION OF AN OFFER TO BUY SECURITIES OR ANY OTHER INSTRUMENT. SUCH INFORMATION IS NOT OR IS NOT INTENDED TO BE A COMPLETE DESCRIPTION OF THE SECURITIES, MARKETS OR DEVELOPMENTS REFERRED TO IN THE MATERIAL. ALL EXPRESSIONS OF OPINION ARE SUBJECT TO CHANGE WITHOUT NOTICE. SUCH INFORMATION IS OBTAINED FROM INTERNAL AND EXTERNAL SOURCES THAT WE CONSIDER RELIABLE, BUT WE DO NOT INDEPENDENTLY VERIFY SUCH INFORMATION AND WE DO NOT GUARANTEE THAT IT IS CORRECT OR COMPLETE. WE, OUR EMPLOYEES, DIRECTORS AND DIRECTORS FROM TIME TO TIME HAVE POSITIONS IN SUCH SECURITIES AND MAY SELL OR BUY SUCH SECURITIES. INVESTMENT PRODUCTS ARE NOT BANK DEPOSITS, ARE NOT GUARANTEED OR INSURED BY THE FDIC OR ANY OTHER ENTITY, AND ARE SUBJECT TO INVESTMENT RISKS, INCLUDING LOSS OF THE AMOUNT OF CAPITAL INVESTED.
WE DO NOT GIVE FINANCIAL ADVICE AS A TRUSTEE, NOR DO WE ENDORSE ANY COMPANY, PRODUCTS, SERVICES OR SECURITIES BY ANY INFORMATION CONTAINED ON THIS SITE. SUCH INFORMATION IS NOT INTENDED FOR TRADING PURPOSES OR FOR ANY PURPOSE OTHER THAN YOUR PERSONAL USE. IN PARTICULAR, STOCK QUOTES THAT APPEAR ON THIS WEBSITE MAY BE DELAYED FOR AT LEAST 20 MINUTES. WE ARE NOT RESPONSIBLE FOR THE ACCURACY OR TIMELINESS OF ANY SUCH INFORMATION AND SHALL HAVE NO LIABILITY FOR INVESTMENT OR OTHER DECISIONS BASED ON SUCH INFORMATION. ANY DATED INFORMATION IS POSTED ON YOUR DATE, AND WE ASSUME NO OBLIGATION OR RESPONSIBILITY TO UPDATE OR MODIFY ANY INFORMATION. SPECIFICALLY, WE DISCLAIM ANY AND ALL LIABILITY OR LOSS ARISING FROM ANY ACTION TAKEN IN RELIANCE ON THIS INFORMATION, INCLUDING MARKET VALUE, LOSS ON SALE, PURCHASE OF SECURITIES OR OTHER INSTRUMENTS, OR OBLIGATIONS.
SOME JURISDICTIONS DO NOT ALLOW TIME LIMITATIONS OR LAST WARRANTIES TO THE EXCLUSION OF CERTAIN WARRANTIES, SO THESE DISCLAIMERS AND LIMITATIONS MAY NOT APPLY TO YOU. IN SUCH EVENT, SUCH WAIVERS WILL APPLY TO THE FULLEST EXTENT PERMITTED BY LAW.
Unlinking
If a court determines that any Terms of Use are illegal or unenforceable, then such term will be eliminated and the remaining Terms of Use will remain in full force and effect.
Submissions
You agree to provide true, accurate, current and complete information about yourself when you choose to provide your personal information. You also agree to keep such information current. Other than information directed under our Online Privacy Policy, any and all comments, suggestions, ideas, graphics, or other information you transmit or post on the Site become and will remain our property and may be used by us anywhere, anytime, and for any reason. Except as provided in the Online Privacy Policy, any information or materials submitted to us will be treated as non-confidential and non-proprietary, and we will have no obligation to use or evaluate any information we receive from you. We will not have to pay you or anyone else to use any ideas or other materials that you may transmit or post on the site.
Links to Other Sites
This website provides links to other websites that we think may be of interest to our users ("linked sites"). Please note that when you click on one of these links, you may be transported to a website of another provider. These linked sites and their providers are not controlled by us, and we are not responsible for their content or proper operation of any linked site. The inclusion of any link does not imply our endorsement. We encourage you to read the Terms of Use and Privacy Statement of these sites as their policies may differ from ours.
Protecting Your Information
We use reasonable security technologies to protect sensitive information. However, the security of this information depends in part on the security you use on the computer that is communicating with us, the security used for user IDs and passwords, and also the security provided by your internet provider. We are not responsible for the security of your ISP. You should carefully review your ISP's security and privacy policies. The information you access through this Site may be stored on your computer for the duration of your session for your convenience. If other people have access to your computer or your user ID and password, they may be able to access that information. In any area of the site that requires a password, you must log off the site when you have finished viewing the information or each time you leave your computer. We are not responsible for the security or privacy of information communicated from such a computer. Finally, you should keep all correspondence you receive relating to this Site or the Services (including but not limited to your user ID, passwords or other registration information, emails, order information, or other confidential information) and in a safe place.
Inspection, Correction, and Removal of Information
We will make all reasonable efforts to enable you to review, correct, or update the information you have provided to us at any time. Please note that due to systems and back-up exclusion records, it may not be possible to locate and remove from the systems the waste information you have provided to us.
We cannot ask third parties to change information that has been made available to them with your consent. To modify this information, you will have to go directly to the relevant third party.
BNY is licensed under the following U.S. patents: 5,940,510; 5.949.880; 6.105.013; and 6,237,095.
Online Safety
The Internet is one of the most powerful communication tools available, making it possible to share information instantly, at any time of the day or night, around the globe.
Criminals have capitalized on the power and widespread availability of the Internet and electronic mail (e-mail) to defraud innocent people. It is critical that each of us keep a constant vigilance over the way we use the Internet and all forms of electronic communication.
Bank of New York Mellon maintains active oversight of all of our systems as part of our efforts to protect the security and privacy of customer information.
The Bank of New York Mellon does not contact its clients or anyone else by e-mail to confirm credit card or financial transactions, or to confirm or request personal account information or any other type of sensitive information.
Protect yourself
To help protect yourself and your personal data, please do not rely on any email communication that asks for your personal information.
Criminals can be convincing. They make their scam emails look like they come from legitimate sources. They publish fake websites that use projects, information, and programming stolen from their rightful owners. Cybercriminals use methods to impersonate you over the phone to perform fund transfers, or mimic communications from the financial institution to verify your transactions, or initiate other changes to your account. Don't fall for your maneuvers.
Email and Website Fraud
Email is by far the most popular way criminals try to get your attention – and your personal information. An email may direct you to a website designed and operated by criminals to trick you into revealing such information. So treat the email of someone you don't know the same way you would treat a telemarketing call from someone you don't know: don't necessarily believe what you're saying.
Fraudulent emails and websites are created every day to try to steal personal information. It's called "phishing" — a variation of the word "fishing." There are limitless variations of these online scams, so the best defense is education and a healthy dose of skepticism. Some deceptive and dishonest techniques in use include the following:
- The email or website may appear to be genuine.
- It can include a logo that looks legitimate.
- It may ask you to click on a link to go to a website – the website address may at first glance seem legitimate and imply importance.
- The email or website may ask you to provide account numbers, identification numbers, personal identification numbers (PINs), passwords, or credit card numbers.
- The email or website may even already contain some of this information and ask you to confirm the data.
- You should be suspicious of any email or website asking you to provide or confirm any personal information.
As technology and ability to detect these frauds, unfortunately, it increases the ability of criminals. The latest attacks don't even require you to do anything. Simply opening the email can launch "hidden" software - a virus, spyware, or other malicious code - that will download and reside on your computer. Should they go unnoticed, any of these programs can compromise your computer in a variety of ways, including stealing private information, redirecting your browsing to fake websites, and transmitting the information you type into your computer directly to the criminals. Therefore, you should erase all unwanted and potentially fraudulent emails without opening them.
Some scam emails, for example, spear-phishing attempts, can be very well done and very convincing. These are often created by more sophisticated and more determined criminals who are highly motivated to succeed. Generally speaking, however, most scam emails and websites can often be characterized by the following:
- Spelling errors and other typographical errors.
- Poor grammar.
- Urgent messages in the subject line of the email.
- Random characters in the subject line or body of the email.
- "Fuzzy" logos, or logos that are distorted.
Tricks of the trade
There are a number of common email scams, which you should be aware of. While this list is by no means exhaustive, recent email tricks include:
- Creating a feeling of panic. Emails threatening loss of account access, loss of credit, deletion etc., try to get you to panic enough to lose your common sense and indulge in your scam. Don't panic; If in doubt, contact your financial institution.
- Referencing a recent transaction. Inaccurate emails referring to a "recent transaction" that you need to check urgently, or for which you need to provide additional account information, are also just trying to get you to fall for their scam.
- Confirming account information. It is possible that criminals think that they already have your account numbers, password, etc., and all they need is your confirmation. They could have guessed it, they could have bought it, they could have stolen it. Don't help them use it. Do not respond to requests for confirmation of information received by an email that you are not expecting or that could be fraudulent. This includes both not responding via email and not visiting a website to confirm the information.
- You are a winner! "Simply send money to cover the costs/fees/taxes and you can claim your prize." If you respond to this request, the thief will have your money as well as credit or debit card information, or your checking account number and bank routing information if you pay by check. A legitimate contest will never make you pay to receive the prize.
- Your donation is required. Many criminals act as if they are actually charities and solicit your donations, appealing to their emotions and taking advantage of tragedies and natural disasters. Be careful when making charitable donations. Many legitimate organizations now accept donations online. But be cautious and only donate through a nonprofit's website, or if you're absolutely sure it's the company you're donating through.
Website Spoofing
"Spoofing" Portuguese is another trick used by criminals, who steal a website's code – the technical programming that does the website's work – and use it to create a fake but legitimate website.
The difficulty for unsuspecting consumers is that these sites appear legitimate. To protect yourself, be aware of how you access the website.
- Do not follow a link in an unsolicited email if you have questions about the sender (see "phishing," above).
- Be careful when typing website addresses, when using Favorites or Bookmarks to store frequently accessed locations - especially related financial sites. Misspelling, even by a letter, the address of the website you are trying to access can send you to an incorrect, possibly fraudulent website.
Lottery / Fake Draw Cards
If you receive a letter, accompanied by a check marked by The Bank of New York Mellon, stating that you have won the lottery, a sweepstakes, a "paid secret shopper" choice, or a similar variation of a popular contest, it is possible that they are fake letters and checks. If you contact the sender as requested, you will be instructed to negotiate the check and forward the money to the sender via wire transfer or money order. Please do not negotiate these checks, as they are not authentic. If you receive one of these letters and/or checks, you should inform your local Postal Inspection Service.
Corporate Account Takeover
Corporate account takeovers, once associated primarily with large corporations, have already begun to reach municipalities, smaller businesses, and nonprofits. Thousands of companies, small and large, according to the information received by victims that fell for this type of fraud. To gain access to the business's financial accounts, cybercriminals often use targeted employees to get the target audience to download and spread malicious software (or "malware"), which in turn steals their log-in credentials. Cyber-criminals typically do this when you perform some action, such as opening an email attachment, accepting a fake friend request on a social networking site, visiting an already compromised legitimate site, or plugging an infected USB drive into your system. All of these can install malware on your computer.
Some recent methods used to trick employees into opening an attachment or clicking on the link, making the email appear legitimate, are including, for example:
- UPS (e.g., "There was a problem with your shipment").
- Financial institutions (e.g., "There's a problem with your bank account").
- Best Business Department (e.g., "The complaint has been filed against you").
- Court systems (e.g., "You have been served a subpoena").
Cyber criminals may try to take advantage of some current event, such as natural disasters or major sporting events. They can use stolen credentials from company websites or co-workers or executives and design the email to appear from a trusted source.
Once they are able to get you to download their malware, they can easily steal your account login credentials and then be able to electronically steal the money from your business accounts through unauthorized transfers and ACH payments.
What You Can Do
Report any issues with respect to The Bank of New York Mellon to the customer service representative.
If you are a victim of identity theft, you can take the following steps to help protect your personal and property interests:
Contact your bank and credit card issuer to ensure that:
- Access to your accounts is protected
- All transactions are truly yours.
- Your address information does not change
- Your PINs are not changed.
- New checks are not requested by the identity thief.
File a police report with your local police department and provide the facts and circumstances surrounding your loss. Obtain a police report number with the date, time, police department, location, and name of the officer having the report or involved in the subsequent investigation. Having a police report on file often facilitates your transactions with insurance companies, banks, credit card agencies, and merchants who may be parties involved in fraudulent transactions. The police report may initiate a police investigation into the loss with the goal of identifying, arresting, and prosecuting the perpetrator and possibly recovering their lost items. The police report will also help provide immediate clarification that someone should assume their identity and be arrested for criminal activity using their name and biographical data.
Companies and Corporate Clients Should:
- Proactively use features that can protect your accounts, such as check cashing limitations and automated payment filters.
- Consider using positive compensation characteristics to limit fraud selection.
- Consider using debit blocks only in account disbursement.
- Reconcile bank transactions on a daily basis.
- Initiated ACH and bank transfers under dual control, with a transaction creator and authorizer.
- Business and personal customers should also employ best practices to secure computer systems in their homes and businesses, including but not limited to:
- Use strong passwords with at least 10 characters, which include a combination of uppercase and lowercase letters, numbers, and special characters.
- Do not share with users and passwords for online banking systems.
- Use a different password for online banking sites that you can use for email and other Internet activities.
- Verify that you use a secure session (https and not http) in the browser for all online banking.
- Do not use usernames and passwords for online banking "script" to allow automatic logins.
- Install commercial antivirus, desktop firewall, and intrusion detection software on all computer systems and apply updates regularly.
- Ensure that computers are patched regularly, particularly operating system applications and key with security patches.
- Always turn on the lock screen saver feature when you need to leave your computer.
- Limit administrative rights on users' workstations to help prevent accidental download of malware or other viruses - create limited user accounts for daily use
- Whenever possible, conduct online banking from a stand-alone and locked computer from which email and Web browsing are not possible.
- Never access banking, brokerage, or other financial services information from public kiosks, such as those found in Internet cafes, public libraries, and airports.
- Educate your staff about this type of fraud scheme.
- Set to deny unauthorized access to the computer or network.
- Change the default passwords on all network devices regularly.
- Block pop-ups.
- Stay informed of ongoing cyber threats that occur.
- Engage support IT staff if they notice any unexplained changes in the performance or behavior of their computers, experience an unexpected system shutdown and restart, or see new and unexpected toolbars or menu items.
- Make sure your employees know how and to whom to report suspicious activity within your company and at your financial institution.
- Verify that your contingency plan addresses the need to recover systems suspected of being compromised by malware, not just data corruption and catastrophic system/hardware failure.
- Consider whether other company or personal data may have been compromised.
- Contact your financial institution for more information.
Notify us immediately of any suspicious transactions, particularly ACH or bank transfers.
Email Security
BNY Mellon actively works to protect the privacy and data integrity of sensitive information while it is in our possession and control. In the course of providing services, we may exchange information with customers or their authorized representatives that is sensitive and confidential. In order to protect this information, BNY Mellon requires highly confidential information (HCI), and in some cases other types of sensitive information, to be encrypted when transmitted over an open unsecured network.
BNY Mellon provides two encryption methods for electronic messages containing HCI sent to external recipients.
- Transport Layer Security (TLS)
- Portal BNY Mellon Secure Messaging
Transport Layer Security is the primary and preferred method of encryption for BNY Mellon. This encryption method allows email to be automatically secured with no additional steps required by the sender and recipient. TLS requires our external partner organizations to have both a TLS-capable infrastructure and a valid digital certificate for encryption. Once established, this method is the most convenient for all users and provides transparent encryption for email and attachments. TLS encrypts email message between servers and is designed to protect the confidentiality and integrity of data and is a widely recognized standard issued by the Internet Engineering Task Force (IETF) to protect transmitted data.
If you have questions about TLS encryption or to establish a TLS relationship with your customer, please contact ;TLS team administration.
If you would like to learn more about how BNY protects the privacy and data integrity of sensitive information using email TLS encryption, please review our Transport Layer Security for External Partners guide.
BNY Messaging Secure Portal is the alternative secure encryption tool that is used when an external partner does not have TLS capability. The portal encapsulates a message and its attachments in an encrypted message. Once secured, the encrypted message is sent to recipients as an attachment to a plaintext email. The recipient uses a pre-registered, self-created password to access the notification and any attachments. This guide provides step-by-step instructions on how to register and use BNY's Secure Messaging tool.
BNY's Secure Email User Guide can be obtained by contacting: securemailsupport@bnymellon.com.
If you have questions about BNY's Secure Messaging Portal, please contact the Secure Messaging Team:securemailsupport@bnymellon.com.
Note: When you access any third-party external websites that may be linked above, you will leave the BNY website. These sites are not controlled or endorsed by BNY, and BNY is not responsible for the content, operation, or security of these sites.
Social Media
We use unaffiliated social media sites, including Twitter, Facebook, YouTube, and LinkedIn to share product and service information, leadership material, news, events, and career information. A list of these accounts can be found below.
Never disclose any personal or financial information on any social media site or other website. BNY Mellon will never ask you for your identification number, account information, passwords, PINs or other personally identifiable information through social media or email. We are not responsible for the privacy or security practices of the social media sites we use. Please review their policies.
In addition, we do not advise clicking on links posted by other social media users, as these links may pose risks to your computer or lead you to inappropriate websites.
We reserve the right to block or remove objectionable content and users if possible, in our sole discretion and without notice. Any delay in removal or failure to remove an objectionable post should not be considered an endorsement or approval of the post, and does not prevent us from taking other steps to address objectionable content, especially when a social media site restricts us from removing or blocking content/users. If a follower forwards our posts and adds comments, those comments are the follower's view and responsibility, and we expressly disclaim any responsibility for such communication.
If you are a BNY client with specific questions about an account or investment, please contact your direct relationship manager. If you have any concerns or complaints about our social media sites, you can submit them through our online form.
Links to Third-Party Sites and Mentions
Occasionally, we may mention a user, tweet, re-tweet, or repost links to third-party websites when we think you might find information useful. However, this does not constitute an endorsement of the individual, place, product, or company. See also "Links to other websites" above.
Our Social Media Sites
Twitter Pages
@BNYMellon – http://www.twitter.com/bnymellon
Facebook Pages
BNY – http://www.facebook.com/bnymellon
Instagram Pages
BNY - http://www.instagram.com/bnymellon
YouTube Pages
BNY – http://www.youtube.com/bnymellon
LinkedIn Company Page
BNY – http://www.linkedin.com/company/bny-mellon
TikTok Company Page
BNY_Mellon – http://www.tiktok.com/@bnymellon
By accessing any external websites that may be linked above, you will leave the BNY website. These sites are not controlled or endorsed by BNY and, therefore, BNY is not responsible for the content, operation or security of these sites.