We no longer support this browser. Using a supported browser will provide a better experience.

Please update your browser.

Close browser message

As a global leader, we deliver strategic advice and solutions, including capital raising, risk management, and trade finance services to corporations, institutions and governments.

Learn more about our solutions:

  

Serving the world's largest corporate clients and institutional investors, we support the entire investment cycle with market-leading research, analytics, execution and investor services.

Learn more about our solutions:

  

We are a leader in investment management, dedicating to creating a strategic advantage for institutions by connecting clients with J.P. Morgan investment professionals globally.

Learn more about our solutions:

    

Our financial advisors create solutions addressing strategic investment approaches, professional portfolio management and a broad range of wealth management services.

Learn more about our solutions:

    

Leverages cutting-edge technologies and innovative tools to bring clients industry-leading analysis and investment advice.

Learn more:

    

The latest news and announcements.

Learn more:

    

For company information and brand assets for editorial use.

Learn more:

    

The latest news and announcements.

Learn more:

    

In a fast-moving and increasingly complex global economy, our success depends on how faithfully we adhere to our core principles: delivering exceptional client service; acting with integrity and responsibility; and supporting the growth of our employees.

Learn more:

    

J.P. Morgan is a global leader in financial services, offering solutions to the world's most important corporations, governments and institutions in more than 100 countries. As announced in early 2018, JPMorgan Chase will deploy $1.75 billion in philanthropic capital around the world by 2023. We also lead volunteer service activities for employees in local communities by utilizing our many resources, including those that stem from access to capital, economies of scale, global reach and expertise.

Learn more:

    

With over 50,000 technologists across 21 Global Technology Centers, globally, we design, build and deploy technology that enable solutions that are transforming the financial services industry and beyond.

Learn more:

    

Technology Banner

For general inquiries regarding JPMorgan Chase & Co. or other lines of business, please call +1 212 270 6000.

Learn more:

      

For general inquiries regarding JPMorgan Chase & Co. or other lines of business, please call +1 212 270 6000.

Learn more:

      

J.P. Morgan Markets Security Center

Glossary

Adware

Software that automatically displays or downloads advertisements (e.g., in pop-up windows or banners), on a computer after the software is installed, often without the user’s knowledge or consent, or while the application is being used.

Anti-Virus/Anti-Spyware Software

Software that is designed to help protect a computer from viruses and other malicious software, including those that can destroy data, slow a computer’s performance, cause a crash, or allow spammers to send email from a user’s account. Effectiveness of anti-virus/anti-spyware software is directly related to the frequency of virus definition updates and scans.

Attachment

An email attachment is a file that is sent with a message. An attachment can be a picture, a Word document, a movie, a sound file, an Excel document, or any other special file that requires another program to open it.

Files may contain computer viruses or other malware. Unless you are expecting an attachment from a trusted source, it is recommended you do not open the attachment. Viruses and worms can use address books to spread the virus and make it appear to be a valid email.

Bookmark

A web address stored in your browser for specified web sites that can be revisited easily without having to remember or retype the Internet address. You should always use browser bookmarks to launch sites vs clicking on links in emails.

Botnet

A collection of computers (“net”) controlled by fraudsters to deliver malware and/or collect personal information.

Browser

Software that enables a user to interact with websites on the Internet. J.P. Morgan Markets supports the most widely used browser, Microsoft Internet Explorer.

Cache

A form of computer memory that allows a computer to quickly access stored information, such as web addresses recently typed into a browser. Pronounced “cash.”

CAN-SPAM Act

A federal law that established standards for sending out promotional email.

Cookies

A small text file that a website can place on a computer to allow a web browser to track or maintain certain information about the user.

Domain

A segment of Internet space, denoted by the function or type of information it includes; current domains include “.com” and “.net” for commercial sites, “.gov” for governmental sites, “.edu” for educational and “.org” for non-commercial organizations.

Download

To copy files from one computer to another. Some websites require users download and install software to view and use the website.

Email Spoofing

Fraudulent email activity where the sender’s address and other parts of the email are altered to appear as though the email originated from a legitimate source.

Encryption

The scrambling of data so that it can only be read by software set to decode the information. Encryption is used to secure the data and information communicated between websites and browsers.

Firewall

Hardware or software that restricts access to computers or networks. Firewalls are used to help keep hackers from accessing computers and networks.

Fraudster

Someone who access computers without permission to perpetrate fraudulent activity.

Hacker

Someone who access computers without permission.

HTML (Hypertext Markup Language)

A programming language used to create documents on the Internet and control how web pages appear.

HTTP / HTTPS (Hypertext Transfer Protocol)

Standard language that computers connected to the World Wide Web use to communicate with each other. Web-sites with secured, encrypted communications will be seen as ‘HTTPS.’

Identity Theft

When a criminal obtains personal or organizational information with the intent to perpetrate fraud, resulting in financial loss.

IP (Internet Protocol) Address

A unique network address that computer systems use in order to identify and communicate with each other – in simple terms, a computer address.

Keystroke Logger

Hardware or software that records user’s keystrokes typed on a computer. Fraudsters may use this to capture user information.

Malware

A type of software program designed to access or control another user’s computer with the intent to perpetrate fraud. Malware can be installed onto a user’s computer without their knowledge.

Phishing

A fraudulent and criminal attempt, typically carried out through email or instant messaging, to lure a user to fake websites where the user is asked to disclose confidential financial and personal information, like passwords or accounts. Pronounced “fishing.”

Social Engineering

Using not-computerized methods such as phone calls or face-to-face conversations to deceive people into providing personal information.

Spam

Unsolicited commercial email, often sent in bulk quantities.

Spammer

Someone who sends unsolicited commercial email, often in bulk quantities.

Spyware

Software that may be installed on a computer without the user’s consent to monitor use, send pop-up ads, redirect a computer to certain websites, or record keystrokes, which could lead to fraud.

Trojans

Software disguised to perform a legitimate action, but actually performs a malicious function such as enabling unauthorized access to the affected computer.

Virus

Software that is attached to a file or program designed to spread via email from one computer to another, without the user’s knowledge. Most viruses are programmed to be extremely damaging.

Worm

A program that reproduces itself over a network, uses up computer’s resources or possibly shuts down a user’s system.