What we Collect
At Manappuram Home Finance Limited (MAHOFIN), we may collect the
following information:
• Name and job title
• Including contact information email address
• Demographic information such as postcode, preferences, and interests
• Other information relevant to customer surveys and/or offers.
What we do with the information we gather
We require this information to understand your needs and provide you a better
service’s and for the following reasons:
• Assessing your profile while granting loan
• Internal record keeping.
• demographic information such as postcode, preferences and interests.
• We may periodically send promotional emails about new products,
special offers or other information of MAHOFIN which we think you
may find interesting using the email address which you have provided.
• From time to time, we may also use your information to contact you for
market research purposes. We may contact you by email, phone, fax or
mail. We may use the information to customize the website according to
your interests.
Security
We are committed to ensuring that your information is secure. In order to
prevent unauthorized access or disclosure, we have put in place suitable
physical, electronic and managerial procedures to safeguard and secure the
information we collect online.
How to use cookies
A cookie is a small file which asks permission to be placed on your computer's
hard drive. Once you agree, the file is added, and the cookie helps analyse web
traffic or lets you know when you visit a particular site. Cookies allow web
applications to respond to you as an individual. The web application can tailor
its operations to your needs, likes and dislikes by gathering and remembering
information about your preferences. Confdental
We use traffic log cookies to identify which pages are being used. This helps
us analyze data about web page traffic and improve our website / any application
in order to tailor it to customer needs. We only use this information for statistical
analysis purposes and then the data is removed from the system.
Overall, cookies help us provide you with a better website, by enabling us to
monitor which pages you find useful and which you do not. A cookie in no way
gives us access to your computer or any information about you, other than the
data you choose to share with us.
You can choose to accept or decline cookies. Most web browsers automatically
accept cookies, but you can usually modify your browser setting to decline
cookies if you prefer. This may prevent you from taking full advantage of the
website.
Links to other websites
Our website may contain links to other websites of interest. However, once you
have used these links to leave our site, you should note that we do not have any
control over that other website. Therefore, we cannot be responsible for the
protection and privacy of any information which you provide whilst visiting
such sites and such sites are not governed by this privacy statement. You should
exercise caution and look at the privacy statement applicable to the website in
question.
Controlling your personal information
You may choose to restrict the collection or use of your personal information
in the following ways:
• Whenever you are asked to fill in a form on the website, look for the box
that you can click to indicate that you do not want the information to be
used by anybody for direct marketing purposes.
• If you have previously agreed to us using your personal information for
direct marketing purposes, you may change your mind at any time by
writing to or emailing us.
We will not sell, distribute or lease your personal information to third parties
unless we have your permission or are required by law to do so. We may use
your personal information to send you promotional information about third
parties which we think you may find interesting if you tell us that you wish this
to happen.
If you believe that any information, we are holding on you is incorrect or
incomplete, please write to us or email us as soon as possible. We will correct
any information found to be incorrect.
Security Tips
Mobile/Electronic Device Security – Do’s and Don’ts
• Password protect the mobile phone and never give your mobile phone to
anyone.
• Choose a strong password to keep your account and data safe.
• Do not share your One Time Password (OTP) to any one other than the
transaction
• Change your mobile PIN regularly at least once in every 60 days.
• Report a lost or stolen phone immediately to your mobile service
providers (For eg: Airtel / Vodafone / Idea /BSNL etc.) and law
enforcement authorities.
• Use anti-virus, anti-spyware and personal firewalls and keep them
updating regularly.
• Use licensed software. Software purchased from untrustworthy
sources could have virus or trojans that could corrupt your files and
reveal your confidential data.
• Don’t store sensitive information such as credit card details, mobile
banking password and user ID on your phone
• Be cautious while open/download emails or attachments from
known or unknown sources
• Be cautious while using Bluetooth/WiFi in public places as someone
may access your confidential data/information
• Don’t click on links embedded in emails/social networking sites
claiming to be from the bank or representing the bank
• Be careful about the websites you are browsing, if it does not look
authentic, do not download anything from it
• Update your mobile with latest security patches for your operating
system, browser and email client.
Password Security tips
• When you receive your OTP, change it immediately.
• Never use the following for your password:
• Your kids’ or loved ones’ date of birth or anniversary
• Consecutive numbers like 123456 or 987654
• Same numbers like 111111 or 444444 or 000000Confdental
• First or last digits of your card number / mobile number
• Same password as of your mobile pin or password
• Never share your password with anyone.
• Avoid using the same password for several different accounts. Once
hackers have guessed one password, they’ll often try to see if it works
on other accounts.
• Memorize your password. Don’t write down your password anywhere.
• Change your password at regular intervals at least once in 60 days.
• If you suspect that someone knows your PIN/Password, change it
immediately.
• Don’t send your password to anyone via email or text message.
• Don’t say your password aloud in public where other people can hear
you.
• Don’t have your browser/mobile remember your account password.
Fraud Scenarios
Forged Phone Calls
Forged phone call is one such attempt where fraudsters possess as your relative /
friend / Banker and ask your banking / credit card detail and ask for transfer the
funds on immediate basis in their bank account/wallet.
How do fraudsters operate?
• Fraudster collects information about you from social networking sites
like Facebook, Linkedin, twitter etc.
• Fraudster calls customer and poses as a relative or friend and talk to you
about few scenarios which recently happened with you so that they can
trick you in thinking that you actually know them.
• Once they get confidence that you are in trap, they ask you to transfer
some money (usually small amount ranging between INR 500 to 5000)
in their bank account or wallet account citing medical reasons.
• Once customer transfer the amount fraudster further transfer that money
to some other account so that transaction cannot be reversed.
How to protect yourself from fraud:
• Never share personal details on social networking sites.
• Never transfer the funds without confirming the identity of the
recipient as the moneyonce transferred cannot be reversed.
• All your details like Name, Father name, date of birth, Mother name, Confdental
bank / credit / debit card details, passwords are shall be kept confidential.
Phishing
Phishing is a type of fraud that involves stealing personal information such as
Customer ID, OTP/Password, etc. through emails that appear to be from a
legitimate source.
How do fraudsters operate?
• Fraudsters send fake emails to customers which appears legitimate,
asking them to urgently verify or update their account information by
clicking on a link in the email.
• Clicking on the link directs the customer to a fake website that looks
like the official website – with a web form to fill in his/her personal
information.
• Information so acquired is then used to conduct fraudulent
transactions on the customer’s account.
How to protect yourself from fraud:
• Always check the web address carefully.
• For logging in, always type the website address in your web browser
address bar.
• Install the anti-virus, antispyware, firewall and security patches on your
computer and mobile phones and keep updating them regularly.
• DO NOT click on any suspicious link in your email.
• DO NOT provide any confidential information via email, even if the
request seems to be from authorities like Income Tax Department, Visa
or MasterCard etc.
• DO NOT open unexpected email attachments or instant message
download links
• DO NOT access Net Banking or make payments using your
Credit/Debit Card from computers in public places like cyber cafés or
even from unprotected mobile phones.
How to identify fake Phishing website / Mails?
• Always check for the salutations in the mail, phishing mails are normally
targeted to large audience, so they put generic salutation like below,
genuine mail always comes with your name.
o Dear Sir / Madam Confdental
o Dear Customer
• Check the domain or email ID from where mail has come, generally
fraudster try to build look alike email ID with some spelling changes.
• Such mails come with some kind of urgency and they threat you for some
consequence if you ignore the mail.
• When you click on URL it will redirect you to some website which will
look alike the bank site but if you check the URL address then it would
be different from bank site address.
• Most fake web addresses start with ‘http://’. Legitimate site will always
start with HTTPS, the ‘s’ at the end of ‘https://’ stands for ‘secure’ -
meaning the page is secured with an encryption.
• Check the Padlock symbol. This depicts the existence of a security
certificate, also called the digital certificate for that website.
• Establish the authenticity of the website by verifying its digital certificate.
To do so, go to File > Properties > Certificates or double click on the
Padlock symbol at the upper right or bottom corner of your browser
window.
Vishing
Vishing is one such attempt where fraudsters try to seek your personal
information like Customer ID, Net Banking password, ATM PIN, OTP, Card
expiry date, CVV etc. through a phone call
How do fraudsters operate?
• The fraudster poses as an employee from the bank or a
Government / Financial institution and ask customers for their personal
information.
• They cite varied reasons as to why they need this information. For e.g.
reactivation of account, encashing of reward points, sending a new card
etc.
• These details thus obtained are then used to conduct fraudulent
activities/ transactions on the customer’s account without their
knowledge.
How to protect yourself from fraud:
• Never share any personal information like Customer ID, ATM PIN,
OTP etc. over the phone, SMS or email. Confdental
• If in case of doubt, call to customer care of respective service provider for
clarification.
Smishing
Smishing is a type of fraud that uses mobile phone text messages (SMS) to lure
victims into calling back on a fraudulent phone number, visiting fraudulent
websites or downloading malicious content via phone or web.
How do fraudsters operate?
• Fraudsters send SMS intimating customer’s of prize money, lottery, job
offers etc. and requesting them to share their Card or Account
credentials.
• Unaware, the customer’s follow instructions to visit a website, call a
phone number or download malicious content.
• Details thus shared with the person who initiated the SMS are then
used to conduct fraudulent transactions on customer’s account, causing
them financial loss.
How to protect yourself from fraud:
• Never share your personal information or financial information via SMS,
call or email.
• Do not follow the instructions as mentioned in SMS sent from untrusted
source, delete such SMS instantly.
• If you receive any urgent communication asking for personal
information, call to respective service provider customer care, to check
if it was a legitimate communication.
Identity Theft
Identity Theft occurs when someone wrongfully uses your personal information
to obtain credit, loans and other services in your name.
How do fraudsters operate?
• They try to gather customer’s details through Phishing, Vishing,
Smishing or any other means.
• They call customers and try to collect details by posing as Bank Staff.
• They might visit customers posing as bank staff and collect personalConfdental
information like Name, Father’s Name, Address, Permanent Address,
Date of Birth, Aadhaar number, PAN Number etc.
How to protect yourself from fraud:
• Destroy any piece of paper holding details of your identity.
• Never share your personal information with a stranger or any third party,
posing as bank representative.
• Update your bank records whenever you change your contact numbers,
address or email ID.
SIM Swap
Under SIM Swap, fraudsters manage to get a new SIM card issued against your
registered mobile number through the mobile service provider. With the help
of this new SIM card, they get One Time Password (OTP) and alerts, required
for making financial transactions through your bank account.
How do fraudsters operate?
• Fraudsters gather customer's personal information through Phishing,
Vishing, Smishing or any other means.
• They then approach the mobile operator and get the SIM blocked. After
this, they visit the mobile operator's retail outlet with the fake ID proof
posing as the customer.
• The mobile operator deactivates the genuine SIM card and issues a new
one to the fraudster.
• Fraudsters then generates One Time Password (OTP) required to
facilitate transactions using the stolen banking information. This OTP is
received on the new SIM held by the fraudster.
• If your mobile no. has stopped working for a longer than usual
period, enquire with your mobile operator to make sure you haven't
fallen victim to the Scam.
• Register for SMS and Email Alerts to stay informed about the activities in
your account.
• Regularly check your bank statements and transaction history for any
irregularities.
Money Mule
Money Mule is a term used to describe innocent victims who are duped by
fraudsters into laundering stolen/illegal money via their bank account(s). Confdental
How do fraudsters operate?
• Fraudsters contact customers via emails, chat rooms, job websites or
blogs, and convince them to receive money into their bank accounts, in
exchange of attractive commissions.
• The fraudsters then transfer the illegal money into the money mule's
account.
• The money mule is then directed to transfer the money to another money
mule’s account – starting a chain that ultimately results in the money
getting transferred to the fraudster’s account.
• When such frauds are reported, the money mule becomes the target of
police investigations.
How to protect yourself from fraud:
• Do not respond to emails asking for your account details.
• For any overseas job offer, first confirm the identity and contact details
of the employing company.
• Do not get carried away by attractive offers/commissions or consent to
receive unauthorized money.
Trojan
A Trojan is a harmful piece of software that users are typically tricked into
loading and executing on their computers. After it is installed and activated,
Trojan attacks the computer leading to deletion of files, data theft, or
activation/spread of viruses. Trojans can also create back doors to give access
to hackers.
How do fraudsters operate?
• Fraudsters use spamming techniques to send e-mails to numerous
unsuspecting people
• Customers who open or download the attachment in these emails get
their computers / mobiles infected.
• When the customer performs account/card related transactions, the
Trojan steals personal information and sends them to fraudsters.
• These details will then be used to conduct fraudulent transactions on
the customer’s account. Confdental
How to protect yourself from fraud:
• Never open e-mails or download attachments from unknown senders.
Simply delete such emails
• Installing antivirus helps. It scans every file you download and
protects you from malicious files.
• Enable automatic OS updates or download OS patch updates
regularly to keep your Operating System patched against known
vulnerabilities.
• Install patches from software manufacturers as soon as they are
distributed. A fully patched computer / mobile behind a firewall are the
best defence against Trojan.
• Download and use the latest version of your browser.
• If your computer / mobile gets infected with a Trojan, disconnect your
Internet connection and remove the files in question with an antivirus
program or by reinstalling your operating system. If necessary, get your
computer serviced.