What is Identity Theft?

Identity theft occurs when someone illegally obtains your personal information, such as your Social Security number, bank account number, or other identification, and uses it to open new accounts or initiate transactions in your name. Examples of fraudulent activities conducted by criminals include opening new credit cards, opening new bank accounts, forging or counterfeiting checks, and applying for new loans and even mortgages in your name. Such activity can cause financial loss and damage to your credit, which can lead to a lengthy resolution process.

Criminals can obtain personal information via online and offline methods. Stealing wallets and purses, intercepting or rerouting your email, and rummaging through your garbage are some of the common tactics that thieves may use to obtain personal information.

Recognize Identity Theft and Fraud

Identity thieves can strike even if you’ve been very careful with your personal information.

The following may be signs of identity theft:

  • Discovering new accounts on your credit report that are not yours
  • Not receiving an expected bill or statement by mail
  • Receiving credit cards or billing statements on accounts you didn’t apply for
  • Being denied credit or offered less than favorable credit terms for no reason
  • Getting calls from creditors or debt collectors regarding merchandise or services that you did not buy

Fraud is an act that occurs when someone uses your account to make unauthorized transactions, usually when the account number or card has been stolen.

The following may be signs of fraud:

  • Not receiving an expected bill or statement by mail
  • Finding unexpected charges on your account
  • Finding charges on your account from unrecognized vendors
  • Discovering posted checks on your account significantly out of sequence

Types of Identity Theft

Mailbox Theft

Only use secured mailboxes to deposit your mail, such as those provided by the post office. If your home mailbox is unsecured, consider changing it to a locked box with a mail slot to ensure your incoming mail is secure. Collect your mail promptly. If you don’t receive an expected piece of mail, such as a billing statement, make a call to the company to ask when they sent it out and make sure no unauthorized change of address has been made. For your eligible accounts, consider switching to online billing statements, such as Bank of the Rockies Online Banking

If you have reason to believe your information has been stolen, report the incident immediately at any of the Bank of the Rockies locations or toll free at 877-726-9797. Contact Us


Before you begin to use your debit card, look around you. Do you have enough personal space? Is someone crowding you, such as in a busy supermarket line? Is there someone hovering around your area for no apparent reason?

If you feel uncomfortable completing the transaction, don’t. Additionally, be sure to secure your wallet in a safe space, such as an inner zipped pocket, especially when securing your card back into place in public.

Insider Threat

Make it a point to know how organizations requesting your personal information secure it.

Safekeeping of customer information is a high priority at Bank of the Rockies. We will continue to maintain the high standards necessary to help ensure that your information is kept private and secure.


View Internet Scams for more information on avoiding email phishing attempts. Understand that a criminal may use the name of a trusted source to gain your information, so you cannot rely on name alone to make a judgment. Know the policies of the various institutions you interact with so that if you are faced with this type of scheme you are prepared to protect yourself.

Look at what kind of information about you is available on the internet. View your internet networking sites and profiles to ensure you are not inadvertently giving out information that can be used to steal your identity.


Make sure that your computer has a firewall installed. Firewalls are designed to block unsolicited attempts to access your system. Firewalls are available to purchase if you do not have one. If you do have a firewall, make sure that it is turned on.

Make sure that you have antivirus software installed and update it regularly.  Run the antivirus software on a regular basis to identify and remove viruses from your computer.

Do not open any attachments or go to any links from a source that you are not familiar with. Delete any unsolicited emails with attachments and links immediately. You can report any suspicious communications to us at 877-726-9797 or you may Contact Us.


Skimmers are devices used to read the magnetic strip from your credit or debit card. They can be used on any ATM type device, such as at a local gas station or restaurant. The devices are often well concealed.

Criminals who use skimmers typically use the information they gather from you within 24 hours. It is always important that you regularly check your account balances and reconcile them with any purchases you have made. Be wary of any ATM device that appears to have been altered or appears suspicious. Always cancel a transaction if you feel uncomfortable in any way.

Theft by Phone

Organizations and financial institutions typically do not have a reason to call unexpectedly to ask you to verify your personal information.

If you feel that it may be a legitimate call from a company known to you, tell them that you will call them back through the organization’s listed number. Ask for their name so that you can be connected directly to them. If it is a legitimate call, the person calling you should have no problem with accommodating you. When calling back, use a phone or internet listing for the company. If it is an organization you are unfamiliar with, satisfy yourself about the legitimacy of the organization before giving any information about yourself. When in doubt, do not provide any information.

Identity Theft Security Tips

Follow these tips to help protect yourself from identity theft:

  • Carefully review websites, online advertisements, and emails before taking any action or submitting any personal information online.
  • Memorize your passwords and PINs. Do not write them down, save them on your computer, or reveal them to anyone.
  • Create a complex password that:
    • Is 8 – 12 characters in length. The longer the password, the better.
    • Includes letters and numbers.
    • Has at least four different characters (no repeats).
    • Has at least one special character.
    • Is a sequence of random letters and numbers.
    • Is not obvious or easily obtainable information.
  • Change your Bank of the Rockies Online Banking password every 60 to 90 days. Log into your personal account at Bank of the Rockies Online Banking and click on the Change Password link.
  • Never email your account number, Social Security number, or other sensitive information to anyone.
  • Never leave your computer unattended while logged in. Complete your banking tasks and end your web sessions by always logging out.
  • When visiting social networks, remember that sharing information like your birth date, phone number, email address, location, and photos can put your identity at risk.
  • Carry only necessary information with you. Leave your Social Security card and unused credit cards at home in a safe and secure location.
  • Make photocopies (front and back) of vital information you carry regularly and store them in a secure place, such as a safety deposit box. If your purse or wallet is lost or stolen, you will have the relevant contact information readily available.
  • Do not provide your Social Security number unless absolutely necessary.
  • Replace paper invoices, statements, and checks with electronic versions, if offered by your employer, bank, utility provider, or merchant.
  • Know your billing and statement cycles. Contact the company’s customer service department if you stop receiving your regular bill or statement.
  • Shred documents containing personal or financial information before discarding. Many fraud and identity theft incidents happen as a result of mail and garbage theft.
  • If you are uncomfortable with a phone call that was not initiated by you, hang up or ask for the purpose of the call. Contact the company using legitimate sources such as contact phone numbers found on the company’s website, your bank statements, and those listed on your ATM, debit, or credit cards.
  • Maintain a close watch on your bank accounts, credit card accounts, and loan accounts. Review your credit report at least twice annually. Check for unauthorized charges and new accounts in your name, and report any loss or theft immediately.
  • Make sure we have your current contact information so we can reach you if fraudulent activity is suspected on your account(s).
  • For consumers – obtain a free credit report annually from each of the credit reporting companies and review it carefully. See the Federal Trade Commission’s Website  ftc.gov for more information. Contact the applicable credit reporting companies immediately if you find any unknown or suspicious activity on your credit reports.
  • Consider subscribing to a credit monitoring service and monitor your credit reports regularly.
  • Use computer virus protection software.

Additional Resources

Visit annualcreditreport.com to take advantage of your free credit report, or contact the three major bureaus directly.

View Don’t be an Online Victim from the Federal Deposit Insurance Corporation (FDIC)

Federal Trade Commission