|
| >
> Security Center
> Bind Computer
> Bind Computer Setting
|
 |
|
|
|
>>More Help
|
|
|
|
Security Center:A group of security functions of Internet Banking to manage password, USB-Shield and TX permission
Bind computer setting: a function for setting the binding/unbinding of the computer currently in use to/from your Personal Internet Banking. Once the binding is established, critical transaction such as online payment can only be made through the bound computer. Only the bound computer can be used to be unbound itself from your Personal Internet Banking.
|
|
|
|
|
| 31080109e |
| Menu Tip |
 |
|
|
 |
1. "Bind computer" is a function free of charge for extra protection to code card customers when online. Customers who use USB-Shield are not necessary to bind computer. 2. Only one computer can be bound at a time. If there is a need to bind more than one computer, you must open the binding permission first and set the period range when binding occurs. After that you can proceed to bind computer within this period range set. Open binding permission must be done at the bound computer. 3.If you cannot unbind the bound computer, unbind it in person at ICBC outlet and bring along your ID card and registration card for identification. 4. This function also allows you to update the name of the bound computer. However you have to use the bound computer to update its own name. 5. Name of the bound computer can be in Chinese, alphabets and numbers, preferably not longer than 10 Chinese characters or 20 characters. 6. Change of hardware device in the bound computer could lead to binding parity failure. This may affect you to use Internet Banking as usual. Hence you are recommended to unbind the computer before replacing the hardware. If this happens, you can unbind the computer in person at any ICBC outlet by presenting your ID card and registration card for identification. 7. Use of code card and computer binding can help those who have code card to use ICBC Internet Banking in a much secure fashion. However, the binding may fail if there is hardware change in your computer or any other special situation. 8. This function only collects features of your hardware, not your configuration or personal particulars. No intrusion to your privacy. It is safe to use. |
|
|