Security Statement

How We Protect You

For more than 160 years, account security has been a top priority for Wells Fargo. Today, we remain as committed as ever and use the latest technologies to help protect your financial information and privacy.

In addition, under federal law, Regulation E (Electronic Fund Transfer Act) provides certain protections to consumer customers when there is unauthorized account activity. Regulation E covers electronic fund transfer activity through a checking, savings, or other consumer asset account at a financial institution used primarily for personal, family, or household purposes. All of the protections provided by Regulation E are incorporated into our Online Security Guarantee. In addition, our Online Security Guarantee expands these protections to cover other types of unauthorized transactions, including certain business and brokerage monetary transactions as described above. Learn how our Online Security Guarantee works.

Individualized Password

When you sign up for online access, Wells Fargo Advisors asks you to create your own username and password to access your accounts. This information is encrypted during transmission. We strongly recommend that you do not use your Social Security number as a username or password.

Wells Fargo Advisors may request a client's Access Online username to authenticate the client by phone or email; however, we do not request a client’s Access Online password to verify their identity. Wells Fargo Advisors emails may include an Access Online sign-on link. If there is ever a question regarding the legitimacy of an email, our clients should visit and sign on from the homepage.

Security Questions

Wells Fargo Advisors requires online clients to select three security questions and provide answers. If we ever need to confirm your identity, your correct answers to these security questions will help us verify it’s you.

Timed Log-Off

Wells Fargo Advisors' system will automatically log you off from Access Online after 30 minutes of inactivity. This reduces the risk of others accessing your information from your unattended computer.


Wells Fargo's computer systems are protected 24 hours a day by a powerful firewall that blocks unauthorized entry.


From the moment account information leaves your computer to the time it enters Wells Fargo Advisors' system, all online access and bill pay sessions are encrypted. Wells Fargo Advisors employs some of the strongest forms of encryption commercially available for use on the Web today.

During any transaction, our 128-bit encryption turns your information into a coded sequence with billions of possible variations, making it nearly impossible for unwanted intruders to decipher. Wells Fargo Advisors' computers possess the proper formulas to turn this code back into meaningful information and complete your transaction.

Look for a "closed lock" icon in or near either end of the address bar of your browser (Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Safari) to determine if encryption is being used on any Web page you are viewing. Any Web address beginning with "https://" indicates the page you are viewing uses encryption. The "s" in https:// stands for "secured."

Ongoing Monitoring

Wells Fargo maintains and monitors our security systems to help protect your accounts.

Additional Security Measures

Wells Fargo Advisors' layered approach to online security extends beyond a unique username and password, encryption, firewall, technology updates and ongoing monitoring. We have additional security measures that may be activated in response to certain activities or events. If we are suspicious of any online behavior, we may restrict online access to accounts or prevent certain types of transactions. These measures safeguard your identity and your accounts. Further proof of identity may be required before online access is restored.

Technology Updates

To address evolving online threats, Wells Fargo has continued to enhance our security measures to help protect your accounts.

In addition, Wells Fargo collaborates closely with major Internet software manufacturers like Microsoft®, Mozilla®, and Apple® to ensure that new web browsers meet our high security standards and can be included in our list of supported browsers.