Sometimes I log in to my account on a device not owned by me. Should I be concerned with doing this?
There are a number of things you should be mindful of when using a device not owned by you or when you are accessing your account information from a public network.
- Be cautious using public computers. The best policy is to avoid using computers you do not trust. Some computers, even ones in legitimate business centers, may contain malicious software. If you must use a public or shared computer, once your session is complete, be certain to do the following before leaving the computer:
- Click Logout in the upper right corner of the site page.
- Clear the browser’s cookies and clear the cached files from the browser.
- Close the browser.
- Only use wireless networks you trust. Your information may be vulnerable when you log in on an unsecured wireless network, whether at home or in a public area. Some wireless networks in public areas reduce their security, making it easier for individuals to access and use these networks. Do not use a wireless network when you do not know or trust whoever is responsible for the network.
- Be ready to confirm your identity. We monitor your log in activity and may require you to validate your identity when you use a different computer, device, or network. If we require further validation, you will be presented with the option to use your telephone in conjunction with a security code or by answering a dynamically-generated set of questions.