The following are the policies and practices conducted by PT Bank Central Asia, Tbk ("BCA") in order to portray BCA’s commitment in protecting and maintaining your privacy and security when you visit the site and internet banking BCA
BCA does not sell, trade or reveal any type of information in relation to the customer or site visitor of internet banking BCA.
BCA does not track those who visit the BCA site.
This site will use a cookie.
All your banking transactions and other account information is kept confidential according to Indonesian law and BCA’s internal policy.
BCA uses a 3 (three) layered security system to protect your access and transactions on internet banking BCA, which include :
Because of the various types of internet browsers, it is difficult to provide internet banking that follows the security policy of each browser. Currently, BCA only provides internet banking that is more suited to be accessed using Microsoft Internet Explorer version 6 or the most recent one. BCA apologizes for this inconvenience.
BCA uses the 2048 bit Secure Socket Layer (SSL) encrypted technology to protect communication between your computer and the BCA server during the time you are accessing internet BCA.
In order to ensure communication protections while you access internet banking BCA, you can do the following:
BCA insists that you must enter your User ID and PIN before you can access internet banking BCA.
To ensure protection for your when accessing internet banking BCA, please do the following:
BCA insists you use a security token named KeyBCA that generates a One Time Password that is used to authenticate each financial transaction and as a sign of confirmation towards the transaction that was done.
You must enter the One Time Password generated by KeyBCA if you do financial transactions such : fund transfers, purchases and payments and non financial transactions such as : KeyBCA activation, increasing connectivity, deleting connectivity and BCA Credit Card billing inquiry.
Transactions that can be done without using KeyBCA : account information, transaction status, transaction history, administration and email.
To ensure protection of your KeyBCA, please do the following :
How to use KeyBCA can be seen in the manual that is included with the KeyBCA you received.
BCA insists you provide an e-mail address to BCA. BCA will use your e-mail address to send information regarding the financial transactions you conducted through internet banking BCA and most non financial transactions which are during first login, e-mail address alterations, additional connectivity, and others. Aside from that, BCA also uses your e-mail address for promotional use, sending gathering invitations and other information.
To ensure protection when sending information to your e-mail address, please do the following:
If you access the site or internet banking BCA through a URL link from another site, make sure the address you are accessing is correct which http://www.klikbca.com or https://ibank.klikbca.com.
Tips on Using Internet Banking BCA In a More Secure Way
Basically, the internet banking BCA system or network is using the most optimal security system. The internet banking BCA security condition is always being monitored and improved according to advances in technology and existing threats.
Existing threats are also experienced by all internet users, internet banking BCA. Therefore, we from BCA, request your attention as internet banking BCA users regarding some types of threats you may encounter when accessing the internet. Tips that can be done when using internet banking BCA, are as follows :
Phising is a type of fraud conducted by certain people in order to obtain confidential information from a customer such as the User ID and PIN. There are a number of ways to do this which include :
A computer virus is a computer program created for certain objectives. In general, a virus damages the operational system, application and data in an infected computer. A virus can spread through several media, : e-mail, disc, CD, USB drive, Flash memory, program from the internet, even a network, and also from ‘evil’ websites.
Some examples of virus effects:
Worms are similar to viruses and are created so viruses can spread quickly to several computers. Although in general, worms do not cause damages like a virus does, a worm can be used to deliver various attachments, including dangerous ones.