How We Protect You

Tulsa Federal Credit Union is dedicated to protecting your security and account information. We have installed the best of breed in security, intrusion software, and firewalls to protect our members. We maintain physical, electronic, and procedural safeguards that comply with federal regulations to guard your personal information.

Tips for Banking Securely Online

Online Banking allows members of Tulsa Federal Credit Union to conduct financial transactions via the internet on a secure website operated by Tulsa FCU. Tulsa FCU has in place various security policies and procedures to reduce the risk of unauthorized online access to member’s accounts.

To ensure member account records are as safe as possible, Tulsa FCU requires:
Online passwords to consist of letters (A a B b C c…), numbers (1 2 3…), and special characters (@#$%…).
Provide a correct answer to security questions.

Tulsa FCU will never ask you for your user login or password via email, text, or phone. Tulsa FCU will only ask for your username and password when you are logging into Online Banking.

If you are having problem with the home banking system additional information may be asked once the account holder has been verified.

Information Safety Tips

• Choose a password with a high percentage strength level, including upper case letters, lower case letters, numbers, and symbols.
• Never use your social security number, information found on your driver’s license, and try not to use a word found in a dictionary.
• Change your password every 90 days.
• Make your password easy to remember, but hard to guess. Do not share your password with anyone. If you have to write it down, store it in a safe place that only you can access.
• Install anti-virus and anti-malware software on your personal computer.
• Be sure to log out, never “X” out of the browser.

What Is Phishing?

What Is Phishing?

Phishing is the act of sending an email, phone call or text message in an attempt to get the recipient to visit a fraudulent website or call center and enter sensitive personal information. to fool the recipient by mimicking a legitimate business. Any information collected by the phisher is then used to steal the recipient’s money or identity.

Don’t Fall for Phishing

When you know how to spot a scam, it's easier to protect yourself.

Generic Greeting

Generic Greeting

Phishing emails are usually sent in large batches. To save time, Internet criminals use generic names like “First Generic Bank Customer” so they don’t have to type recipients’ names out and send emails one-by-one. If you don’t see your name, be suspicious.

Forged Links

Forged Links

Even if a link has a name you recognize somewhere in it, it doesn’t mean it links to the real organization. Roll your mouse over the link and see if it matches what appears in the email. If there is a discrepancy, don’t click on the link. Also, websites where it is safe to enter personal information begin with “https” — the “s” stands for secure. If you don’t see “https” do not proceed.

Requests Personal Information

Requests Personal Information

The point of sending phishing email is to trick you into providing your personal information. If you receive an emails requesting your personal information, it is probably a phishing attempt.

Sense of Urgency

Sense of Urgency

Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to another victim.

What to do if you are being Phished?

What to Do If You Are Being Phished?

If you receive a fake phone call, take down the caller’s information and report it to your local authorities. In the United States, use the FTC Complaint Assistant form.

If you receive a fake email, delete it immediately. Be sure to empty your trash so that you don’t accidentally open the link later.

Site Terms

Email Marketing

We Will Never Ask You Via Email...

Tulsa FCU will never ask you for any personal information including any account information or social security number via email. Email is a responsible way to deliver relevant product and service offers, regulatory information and rate updates, NOT to gather confidential member information.


Your Information Remains Confidential

We take every precaution to ensure your information remains confidential. The information you provide to us on our website is encrypted and protected with an encryption method called Secure Socket Layer (SSL). While on a secure page, the lock icon on the bottom of web browsers such as Microsoft Internet Explorer becomes locked, as opposed to unlocked or open when you are just 'surfing'.

Data Collected

Anonymous User Analytics

In addition to the information we collect as described above, we use technology to collect information about the use of our website. For example, our web server automatically logs which pages of our website our visitors view, their IP addresses and which web browsers our visitors use. Our website contains hyperlinks to other pages on our website. We may use technology to track how often these links are used and which pages on our website our visitors choose to view. The companies we contract with may allow us to use technology to collect transaction and site navigation information when you are on their website.


Enhancing Your Online Experience

A cookie is a piece of data stored on the hard drive of your computer containing information about you. Cookies by themselves cannot be used to discover the identity of the user. Cookies do not contain viruses and most cannot review any of your personally identifiable information unless you willingly provide it as a user on a website. Cookies do not damage your computer. We use cookies to track and target your interest in order to enhance your online experience with us.

Links and Frames

Links to other sites may be provided on our website for your convenience. You acknowledge and understand these sites may contain terms and privacy policies that are different from ours. By providing these links, we are not endorsing, sponsoring, or recommending such sites or the materials disseminated by or services provided by them, are not responsible for the materials, services, or other situations at or related to or from any other site, and make no representations concerning the content of sites listed in any of the web pages. Consequently, we cannot be held responsible for the accuracy, relevancy, copyright compliance, legality, or decency of material contained in sites listed in any search results or otherwise linked to our website. For example, if you “click” on a banner advertisement or a search result, your “click” may take you off our website. This may include links from advertisers, sponsors, and content partners that may use our logos as part of a co-branding agreement. These other sites may send their own cookies to users, collect data, solicit personal information, or contain information that you may find inappropriate or offensive. In addition, advertisers on the website may send cookies to users that we do not control. You may link to the home page of our website. However, you may not link to other pages of our website without our express written permission. You also may not “frame" material on our website without our express written permission. We reserve the right to disable links from any third-party sites to our website.

Site Acceptance

These Site Terms apply to your use of this website. By visiting or using this website, you accept these Site Terms and your continued use of this website constitutes your acceptance of any revisions to these Site Terms.

Terms of Use and Site Acceptance
Additional Information on Our Mobile Application

The Tulsa FCU Mobile App (“the App”) accesses the following information about your activity and device location. The App collects location data to enable “Pulsate” messaging, even when the App is closed or not in use. Specifically, the following pieces of information are collected by the App:
• Location – Used for geofencing and beacon scanning essential for advertising/marketing campaign delivery
• UserID – Pulsate creates a random user GUID upon initial app access, which is later used during every connection with Pulsate. This GUID is unique for each device/app and changes after every app reinstall. This ID is used for identifying a user and sending campaigns.
• Product Interaction – Pulsate tracks user’s app entry, app exit, and pages viewed within the app.
• Name – Pulsate collects user’s first name for product personalization purposes.
This information may be used for creating targeted communications, offering you products or services that fit your needs, determining your closest Service CU Branch or ATM, or determining where you are performing your banking transactions.

Fraud Center

If you feel your account or personal information may have been compromised or you have been charged for something you didn’t authorize, we’re here for you. Please visit our Fraud Center for additional information and helpful phone number.