We use a variety of controls to detect and prevent unauthorized access to our network and sensitive information. Our cybersecurity response program fulfills the requirements of federal and state laws and includes appropriate notifications to investors and advisors when warranted.
Our security program also features safeguards for your account. To help keep your information safe, we:
We use a variety of controls to detect and prevent unauthorized access to our network and sensitive information. Our cybersecurity response program fulfills the requirements of federal and state laws and includes appropriate notifications to investors and advisors when warranted.
Our security program also features safeguards for your account. To help keep your information safe, we:
Use our Account Security Checklist (PDF) to quickly assess the security features you have in place. More detailed information about each item and other best practices can be found below.
Security is a joint effort. Here are some steps you can take to help protect your sensitive information.
Be Observant
Keep Your Computer Secure
Avoid Public Computers and Wi-Fi
Protect Physical Documents
Please note: You only need to inform one consumer credit company since it’s required by law that they share your fraud alert request with the other two.
Once you’ve requested a fraud alert, you’re entitled to free copies of your credit report. Review them for suspicious activity and inaccuracies. If you find unauthorized accounts or charges, take the appropriate steps to get them corrected.
Report Suspicious Email, Phone Call or Text Message
We’ll never ask for account or personal information, including passwords, via email or text message.
Job candidates may be contacted via email (with emails ending in @capgroup.com or @jobs2web.com), phone, or possibly via message from a professional networking social media platform, such as LinkedIn.
Before receiving any job offer, candidates must apply and interview for a position. Candidates will never be initially contacted by text message or direct Twitter message, and candidates will never be solicited by Capital Group for payment related to job searches.
If you suspect that you’ve received a fraudulent email, text message or phone call, please contact us immediately:
OR
Phishing
Phishing is the most widely known form of fraud. It typically involves someone sending an email that appears to be legitimate from a reputable source. It may contain real information, including a company logo and branding, or even personal information gleaned from your social networking site. These emails then urge you to take action — e.g., click on a link, open an attachment or respond to a message.
There are two primary types of phishing: broad phishing, where the attacker casts a wide net and hopes to “hook” one or more victims, and spear phishing, where the attacker carefully researches their victims using publicly available information in order to make the message appear more legitimate.
Phishing attempts typically:
Phishing attacks may also occur over the phone.
Malware
Malware includes spyware, viruses and other types of malicious software that are installed on your computer, smartphone and other devices without your authorization. Malware typically collects information about you — the passwords you use, the websites you visit — simply by watching you type or surf the web. Malware may also take over your computer for nefarious purposes such as sending email you didn’t write or spreading computer viruses.
Malware is typically installed through:
Computers with malware may:
If you suspect your computer has been infected with malware, take the necessary steps to remove the unwanted software from your computer.
Identity Theft
Identity theft involves the impersonation of an individual through the fraudulent use of his or her personal and account information — e.g., driver’s license, Social Security number, bank account and other numbers, as well as usernames and passwords.
Identity thieves obtain information in a number of ways:
More information on identify theft and protecting your identity can be found at these websites:
Social Media
Please see Twitter Terms of Use.
Investments are not FDIC-insured, nor are they deposits of or guaranteed by a bank or any other entity, so they may lose value.
Investors should carefully consider investment objectives, risks, charges and expenses. This and other important information is contained in the fund prospectuses and summary prospectuses, which can be obtained from a financial professional and should be read carefully before investing.
All Capital Group trademarks mentioned are owned by The Capital Group Companies, Inc., an affiliated company or fund. All other company and product names mentioned are the property of their respective companies.
Use of this website is intended for U.S. residents only. Use of this website and materials is also subject to approval by your home office.
American Funds Distributors, Inc.
This content, developed by Capital Group, home of American Funds, should not be used as a primary basis for investment decisions and is not intended to serve as impartial investment or fiduciary advice.