To protect your information and assets, we employ extensive physical, electronic and procedural security controls, regularly adapting them as technology and threats evolve. Although we cannot fully disclose all of our tactics, here are just a few of the measures we take:
Customer Username and Passwords
When you sign up for online access to your account, you create your own personal password to login (your "Login Password") as well as a different personal password for trading (your "Trading Password"). Together with your Customer username, your Login Password and your Trading Password allow you encrypted, secure access to your accounts. Never give your Customer Username, Login Password or Trading Password to anyone under any circumstances.
Customer Access to Account Information
No matter how you contact us - online or by phone - we verify your identity before granting you access to your accounts.
You will automatically be logged off after an extended period of inactivity. This reduces the risk that others could access your information from your unattended computer.
To block unauthorized access, all of our computer systems are protected by firewalls, which are electronic barriers that prevent unauthorized access to our networks.
We employ some of the strongest methods of encryption commercially available today. All online activity with us involving personal or sensitive information is encrypted with 256-bit or greater encryption from the point it leaves your computer until it enters our systems. For your general online security, be sure you see the letter "s" at the end of "https" at the beginning of the URL address before entering any sensitive information - this indicates the site is secure (e.g., "https://www.qtrade.ca"). Similarly, another indication that a website is secure is a padlock at the top of your browser in the middle of the screen, if you are using Internet Explorer.
Our security teams monitor our systems round-the-clock, ensuring you have timely and secure access to your accounts.
Employee Access to Customer Information
We restrict access to systems containing customer data and monitor system access continuously.
Our employees receive thorough training on our security policy and are held accountable for adhering to the policy.