top of page

SECURITY

CENTER

DSP Security Center

The security of your personal information is always a priority at Data Service Pros. We work hard to help ensure your account information stays secure.

Call Center Employee

How We Protect You

Online Security

DSP is serious about safeguarding your personal information online. As a security measure, you may access your account information online from the DSP website only if you have registered with DSP Online. DSP Online Transaction uses Secure Socket Layer (SSL) technology to encrypt your personal information such as User Ids, Passwords, and account information over the internet. Any information provided to you is scrambled and decoded once it reaches your browser.

Online Transaction
Security
Submitting Forms
Online

Information you provide via electronic forms on the DSP website is secure and encrypted in most instances. In other words, it is scrambled en route and decoded once it reaches DSP. You may check that your web session is secure by looking for a small lock symbol usually located in the lower corner of your web browser window. Current versions of leading web browsers indicate when a web page is encrypted for transmission through this symbol. You may also look for the letters "https://" at the beginning of your website URL in your web browser. The "s" means that the web connection is secure.

protect you

Privacy Notice

What do we do with your personal information

Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.


The types of personal information we collect and share depend on the product or service you have with us. This information can include:

 

  • Social Security number, Driver License and Passport number.

  • Transaction history & Processing statement.

 

To limit our sharing: Call (833) 400-PROS (7767) 

Collect,
Share, 
& Protect
Privacy

How To Report Fraud

Types of Fraud

If you're worried that you might have inadvertently compromised your DSP account: It's important you speak with us immediately. The sooner we know what's happened, the sooner we can begin helping you. Please call us now!
This includes:

 

  • Checking or Savings Account Number

  • Bank Information

  • PII (Personal Identifiable Information) – such as Social Security or Tax ID Number

  • DataServicePros.com logon information – User ID's or passwords

I Think I'm a Victim of Fraud
I Received a Suspicious
E-mail

If you think you've received a fraudulent e-mail, but you haven't acted on it: Please forward it to risk@dataservicepros.com so we can investigate it for you.

Report Fraud by Phone: 
(833) 400-PROS (7767) 

Report Fraud by Email: contact@dataservicepros.com

Report Fraud

Fraud Information

Requesting your personal information

We recognize how important it is to protect your identity from unlawful use, and shield your accounts from fraud and unauthorized access. With that in mind, we want you to know it is not our practice to ask for your DSP User ID or password in e-mail.
Further, you can be assured that it's not our practice to:

 

  • Send e-mail that requires you to enter personal information directly into the e-mail.

  • Send e-mail threatening to close your account if you do not take the immediate action of providing personal information.

  • Send e-mail asking you to reply by sending personal information.

 

With those things in mind, please exercise caution when reading e-mail that may appear to have been sent by us. It's an unfortunate reality that criminals continue to devise ways to exploit technology in an effort to rip you off. One increasingly common scam is called "phishing" (pronounced "fishing"), where your personal information is the “catch of the day.”

Report Fraud by Phone: (833) 400-PROS (7767) 

Report Fraud by Email: contact@dataservicepros.com

Company
Email Policy
Fraud Info

FAQ's

Frequntly Asked Questions

  • 1. What is Phishing?
    Phishing (pronounced "fishing") is a form of criminal activity that employs social engineering techniques to acquire sensitive personal information (such as passwords, account numbers, PIN numbers, your Social Security number and account information). By masquerading as a trustworthy person or business in an apparently official electronic communication like e-mail, criminals use sophisticated lures to "fish" for users' passwords and account or personal information.
  • 2. What Protection do I have if I responded to a phishing attempt?
    Each situation is different. We'll work with you to make the best decisions based on the nature of the compromise and what data you shared.
  • 3. What do fraudulent e-mails look like?
    They take many forms, but most are similar in tone – harsh, demanding and scary.
  • 1. What is Identity Theft?
    Identity theft happens when a criminal obtains your personal information to steal money from your accounts, open new credit cards, apply for loans, rent apartments and commit other crimes — all using your identity. These acts can damage your credit, leave you with unwanted bills and cause you countless hours and frustration to clear your good name.
  • 2. How do thieves steal an identity?
    Identity theft starts with the misuse of your personal information such as your name and Social Security number, credit card numbers, or other financial account information. For identity thieves, this information is as good as gold. bills and cause you countless hours and frustration to clear your good name.
  • 3. How can I find out if my identity was stolen?
    The best way to find out is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft.
faq

GLOSSARY

  • 1. What is Phishing?
    Phishing (pronounced "fishing") is a form of criminal activity that employs social engineering techniques to acquire sensitive personal information (such as passwords, account numbers, PIN numbers, your Social Security number and account information). By masquerading as a trustworthy person or business in an apparently official electronic communication like e-mail, criminals use sophisticated lures to "fish" for users' passwords and account or personal information.
  • 2. What Protection do I have if I responded to a phishing attempt?
    Each situation is different. We'll work with you to make the best decisions based on the nature of the compromise and what data you shared.
  • 3. What do fraudulent e-mails look like?
    They take many forms, but most are similar in tone – harsh, demanding and scary.
  • 1. What is Identity Theft?
    Identity theft happens when a criminal obtains your personal information to steal money from your accounts, open new credit cards, apply for loans, rent apartments and commit other crimes — all using your identity. These acts can damage your credit, leave you with unwanted bills and cause you countless hours and frustration to clear your good name.
  • 2. How do thieves steal an identity?
    Identity theft starts with the misuse of your personal information such as your name and Social Security number, credit card numbers, or other financial account information. For identity thieves, this information is as good as gold. bills and cause you countless hours and frustration to clear your good name.
  • 3. How can I find out if my identity was stolen?
    The best way to find out is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft.
glossary

RESOURCES

Links
  • FTC.org

  • FDIC.gov

STILL HAVE QUESTIONS?

We are here waiting to answer all your questions. Contact us today!

bottom of page