How safe is it to deposit checks using smartphones?


In my bank statement this month, there was an insert about depositing checks to my account using either an Android phone or iPhone. It looks pretty much all you do is take a photograph of the check, confirm that the amount is correct, and Bob’s your uncle. I’m a little skittish about this though; is it really secure?

Topic: Security
Answer this Question


2 total
Vote Up (4)

I doubt the bank would be advertising it if it wasn't encrypted and protected. But you might want to check with them directly and find out what precautions they take to insure security.

Vote Up (4)

I would think that a lot of that would depend on the app you are using - I would make sure that it doesn’t store data locally, and I would make sure to use a lock screen password on your device. The data you send to your bank is going to be encrypted, so it shouldn’t be exposed even if someone gets hold of the data during transmission. The bank is going to check the routing and account numbers to make sure it is legit before it ever gets published. So I would say that it is probably pretty safe to make deposits using your smartphone, but I’m not a security expert and I couldn’t swear to it.

Ask a question

Join Now or Sign In to ask a question.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts