Please wait...
Please wait...

Security & Privacy

When we talk about security, we do not just mean protecting the transmissions between your computer and our systems. We do far more to help safeguard your information added testing content.

We have an integrated system of industry best practices and technologically advanced safeguards that includes:

  • SSL and encryption
  • Firewall
  • Monitoring
  • Automatic logout

SSL and Encryption: We use an industry-standard technology called Secure Sockets Layer (SSL) on our account services websites to encrypt the information flowing between your computer and our servers. Encryption works by scrambling words and numbers before they travel across the Internet so that they cannot be read or altered.

Several levels of encryption are available. A higher number indicates more secure communication. Browsers that support 128-bit encryption or higher currently offer the best protection.

Firewall: A firewall is a combination of hardware and software deployed to control the information that can pass from the Internet into our internal systems and servers. Firewalls enforce a set of rules intended to bar intruders and viruses from gaining entry.

Monitoring: We continually monitor our systems for evidence of attempted break-ins. Our monitoring methods combine internal resources and security companies we pay to help safeguard your information.

Automatic Logout: The automatic logout is intended to protect your account information from passersby if you are interrupted and leave your computer before logging out. Typically, you will be automatically logged out 20 minutes after your last click in a secure session

Security measures you can take: You can take numerous actions to increase your Internet security. Some basic security measures are listed below, but we encourage you to also read through the security topics listed in the navigation menu on the left.

  • Use a browser with 128-bit encryption or higher
  • Make sure you're on a secure page.
  • Log out and close your browser.
  • Clear your cache.

Use a browser with 128-bit encryption or higher: To enter the account service areas of our site, your browser must support a minimum 128-bit encryption browser.

Make sure you are on a secure page: When viewing the account information online, you will know that the information being transmitted is being encrypted and secure if the "locking" symbol of your browser shows a closed lock. Your browser will always display this lock in the same location. Typically, it is in the lower right of the browser window, but not all browsers show it in the same place. Find the lock on your browser and always check for it in that location when inputting or looking at confidential information.

You can also look at the address box (URL) to see whether http:// has changed to https://. The "s" indicates your connection is secure. However, you cannot trust this indicator alone if you have clicked an email link because some of the "phishing" scams have managed to fake the "https" to make the URL look secure.

Create a password that is hard to guess but easy to remember. Use a mix of numbers and letters (both upper and lower case). Don't use sequential numerals or letters (12345), repetitive numerals or letters (aaabbb), or personal information such as names, license plates, phone numbers and birthdates. Even dictionary words are considered weak protection.

Log out and close your browser: If you leave a computer without logging out and closing your browser, someone else could use the browser's back button to view information you entered.

The user ID and password you use to access account information on your country specific Franklin Templeton website are protected separately by our site's security, which clears them from your browser as soon as you have logged in.

Clear your cache: As an additional precaution after visiting any secure site, you may wish to delete any page images your browser stored to your hard drive. These page images are called "cache." Your computer uses cache to make your experience faster by loading images from your hard drive rather than downloading them repeatedly from the website's server. Your browser's Help section should have instructions detailing how to clear your cache.

Security threats are ever changing: We use intensive testing procedures and other safeguards to verify that customer information is protected. But no security system is foolproof. Please be sure you are comfortable with our security measures before accessing your account online.

Have you ever received an email from a business asking you to provide personal information like your Social Security number or account number? Chances are it was a scam by someone trying to steal your identity for fraudulent purposes.

What's phishing?

Phishing is any email that seems to be from a legitimate business but is really intended to steal personal information Testing.

Phishers bait their hooks with an email designed to look like it is from a bank, retail or auction site, or some other business you may have an online relationship with. The message typically claims there is a problem with your account and asks you to click a link in the email and return to their site to confirm your account number, credit card information, password or other sensitive information. Sometimes the e-mail simply asks you to download an attachment which may be infected with a virus or spyware (see Viruses and Spyware section).

The link takes you to a site cleverly designed to look like the business's website, but any information you enter is captured by the phisher, who may use it to steal your identity, make purchases using your credit card or drain money from your accounts.

How to Recognize a Fraudulent Message?

Phishing scams often include key phrases or themes to watch out for:

  • “Verify your account” – Legitimate businesses will not ask you to send passwords, login names, Social Security numbers, or other confidential information through email. Be suspicious of any message that asks for personal information, even if the request looks legitimate.
  • “If you don’t respond within 48 hours, your account will be closed” – These emails may be polite and accommodating in tone, but they often convey a sense of urgency so that you’ll respond immediately, without thinking. They could threaten to close or suspend your account or even say that your response is required because your account may have been compromised.
  • “Click the link below to gain access to your account” - Some messages contain links or forms. The links may contain all or part of a real company’s name and are usually “masked,” meaning the link doesn’t take you to the address you see but to somewhere else, usually a phony website.

Please always bear in mind that:

  • Franklin Templeton will never ask you for confidential information such as password, customer ID, or account number over email.
  • A phishing email will normally have a tone of urgency. Franklin Templeton will NEVER send such emails to our customers.
  • If you are doubtful about the credibility of the email, please DO NOT click on any link provided in the email. This may trigger malicious code to be installed on your PC.
  • Before you share any information on a website in response to an email, always assure that the URL shown in the email matches the URL of our website.
  • When you are on the online account access login page, please check for the security padlock icon at the bottom right side of the webpage.

How to avoid being hooked by phishers?

Develop a healthy skepticism when reading any email that asks for sensitive information and take a couple of simple steps to protect yourself.

Retype the URL: Phishers are very sophisticated in their use of design and technology to make their email lures look legitimate. The URL for the link in phishing scam emails usually appears to be a company's valid Web address. If you click the link, you are redirected to the phishers' phony site. However, if you type the displayed address into your browser rather than clicking the link, you can avoid being redirected.

Call the company: Franklin Templeton will never ask for personal financial information from you in an email, and we believe most reputable financial services companies won't either. If you have any doubts about the legitimacy of an email, call the company that sent it.

Banks and investment companies typically have phone support in addition to their websites. A quick phone call to the customer service department can let you know if the "problem with your account" is for real.

Stay informed: Phishing scams become more complex as the phishers try to stay ahead of the people trying to stop them. You can keep tabs on the latest phishing scams at, a website hosted by a group trying to eliminate identity theft and fraud related to phishing.

Email has become part of the very fabric of our lives. It lets us communicate quickly and easily with friends and family across town or across the globe. But do not let email's convenience make you forget about its potential dangers.

Following a few simple guidelines when using email can help protect you and your computer from identity thieves and unscrupulous businesses.

Treat email like a postcard: Email is not a private method of communication. Anyone with a certain level of technological know-how can read what you send. While it may seem unlikely that anyone would bother trying to read your emails in transit, it is wise to err on the side of caution.

Avoid writing anything in an email that you would not be willing to write on a postcard and drop in a mailbox. That means no personal financial information like account numbers, Social Security numbers, or passwords.

Avoiding email viruses: Hardly a week goes by without a major news story about a virus circulating on the Internet by email. These viruses typically arrive in the form of an attachment with some enticing invitation to open it.

If you open it, the virus can do almost anything—from sending out copies of itself to everyone in your address book to crashing your computer completely. Your best bet is to delete the email and the attachment immediately without opening them, especially if you don't know the sender.

Viruses are tricky though, and the emails they are attached to can seem to be from someone you know and trust, someone who would never knowingly send you a computer virus. So, it pays to be suspicious of attachments in general.

Before you open an unexpected attachment from a friend or family member, you may want to send them an email or give them a call to make sure they sent it.

Dealing with spam: Unsolicited email—commonly called spam—is a growing problem on the Internet, both for recipients and for companies trying to use email to communicate with customers. Low mortgage rate offers, porn site solicitations, phishing scams and ads for merchandise are all forms of spam.

Use a spam filter: A good first line of defense against spam is spam-blocking software. Many email programs like Outlook and Eudora have built-in spam protection tools. Likewise, your Internet service provider may include a spam-blocking system bundled with their service. If these options are not available to you, look into purchasing and installing spam-blocking software for yourself. These systems do a reasonable job of reducing spam, but they are not 100% effective.

Delete without opening: When you reply or even open a spam message you may be confirming to the spammer that your email address is active. That's likely to mean more spam will be coming your way as the "good" address gets passed around among spammers.

Unsubscribe with caution: If spam comes from a company or individual you don't know, following the instructions to "unsubscribe" or be removed from the mailing list is not likely to stop the spam. Your request will probably just confirm to the spammer that the address is active, and your address is more likely to be added to other lists rather than removed from any.

However, if what you think of as spam is coming from a company you have a relationship with, consider the possibility that they think you want to receive what they are sending. They might not realize they are annoying you with these emails because you may have forgotten you signed up for a newsletter or special offers by email. Legitimate businesses that want you as a customer will generally provide you with an email address to contact them to have your name removed from email lists.

Report spammers: Internet service providers often make ongoing efforts to combat spam on their systems. By reporting spam when you receive it, you can sometimes help service providers thwart spammers in the future. Contact your provider to find out if they have procedures in place for you to report spam.

A virus or spyware on your computer can do more than just crash your system or delete files. More insidious strains can present a serious threat to the security of personal information.

A virus is a program that enters your computer without your knowledge and attaches itself to other files, replicating itself and spreading. Spyware is similar in that it invades your computer without your knowledge, but it also monitors your activity. In some cases it may report this activity back to the person who originally wrote the program.

Keeping your computer free of all unwanted programs is an important aspect of making sure your personal information is secure.

Be cautious when downloading: Be aware that whenever you download software or application files from the Internet, you could be allowing a Trojan horse into your system. A Trojan horse is a file that has undesired components like viruses or spyware hidden inside.

These programs vary in the amount of damage they do. One might simply annoy and frustrate you by resetting your browser's home page and not letting you change it back. Another might capture your ID and password as you log into a financial site and then relay that information back to the source, where it may be used to steal your identity.

Be as certain as possible that you can trust the integrity of the source before downloading anything.

However, you don't have to download something for malicious programs to find their way onto your system. Some of them can sneak onto your computer without any action on your part beyond visiting a website that hasn't taken appropriate steps to prevent hackers from triggering these "drive-by" downloads. Our site has security measures in place to combat this kind of activity.

Keeping your system clean: Antivirus and antispyware programs that seek out and destroy spyware are available to help keep such programs off your system. But be aware that viruses and spyware are not easy to eliminate.

For instance, spyware programs typically hit your computer in clusters rather than single programs. So when spyware A invades your machine, spyware B, C, D and E may also sneak in and find a place to hide. In addition to watching you, these programs watch each other. If spyware A gets deleted, spyware B reaches out to the originator and grabs another copy. So it is important to be disconnected from the Internet before trying to clean these files from your system.

Our Internet security expert recommends running your antispyware and antivirus programs several times in succession. Each run may be able to peel off layers of "masks," allowing the programs to work in tandem to target and destroy spyware and viruses that have been hiding. As a final step, restart your computer. Then run your antispyware and antivirus programs once more.

This process may seem like overkill, but many experts believe it is worth the effort to keep your system clean. If you had rather not do all of what's described above, it is a good idea to run the antispyware and antivirus programs at least once.

While airports and other venues with public computer terminals offer convenience, using them could compromise the security of your personal information.

You are on a vacation and have not been able to check your emails for a week. You stop for a cappuccino and notice a computer terminal in the corner of the coffee shop. It has Internet access, and you decide to check your email and glance at the headlines on your favorite news website. No problem so far.

Then you decide to visit your bank's website, log in and check to see if a couple of recent transactions have cleared. Is that a good idea? Probably not since you are using a public computer terminal.

There is no way for you to know what kinds of spyware programs are installed on public terminals. The computer may contain key tracking software or other invasive programs installed by someone who used the terminal previously. Those programs could help someone steal your identity if you are typing in personal information like an ID and password for online access to your bank account.

Given the ease with which spyware and other treacherous programs can imbed themselves on a personal computer used only by you, it is wise to be extra cautious and never access personal financial data from a computer used by the general public.

Certain information and statements made herein have been derived by third party sources. While we consider that information to be reliable, we give no assurance that such information or statements are accurate or complete.

We respect your privacy and value the trust you place in us when you share your personal information with us. The way we may use your personal information is discussed in our official privacy notice. Having said that, we know you might have some additional questions about privacy on the Web.

First, we will talk about privacy as it relates to using this website. Then, we will cover the broader privacy issues concerning a mutual fund shareholder's relationship with our company as a whole. If you want to skip the Web-related privacy issues, you can jump ahead and read our official Mutual Fund Privacy Notice.

Web-Related Privacy Issues

How we use information provided on the Web

Your email address: We collect your email address when you register for account access. If we need to contact you about transactions or account activity on the site, your email address lets us do that quickly. If you sign up for electronic delivery of documents, we will need your email address for that, too.

Even if you are not registered for account access, we may need to ask for your email address. For instance, if you ask for a referral to a financial adviser or subscribe to our email newsletter, we'll need your email address to respond to your requests.

We won't send emails you have not asked for unless there is a good reason.

Survey information: Occasionally we may ask you to participate in a brief survey to help us make smart choices as we look for ways to improve the site. If you choose to participate, information you provide won't be identified with you personally.

Personal data entered in calculators : When you use calculators and planning tools on the site, you may need to enter information such as your age or even certain dollar amounts like how much you save each month.

We do not collect or store this kind of information. It is only used to perform the calculation you are asking for.

Our Mutual Fund Privacy Notice

Your Privacy Is Our Priority

Franklin Templeton Investments including Franklin Templeton Asset Management (India) Pvt. Ltd (AMC) and Franklin Templeton Trustee Services Pvt. Ltd are committed to safeguarding information provided to us by Unitholders of schemes of Franklin Templeton Mutual Fund in India. This notice is designed to provide you with a summary of the non-public personal information we may collect and maintain about current or former investors; our policy regarding the use of that information; and the measures we take to safeguard the information. We do not sell non-public personal information to anyone and only share it as described in this notice.

Information We Collect

When you invest in the schemes of Franklin Templeton Mutual Fund, India you provide us with your non-public personal information. We collect and use this information to service your accounts and respond to your requests. The non-public personal information we collect falls into the following categories:

  • Information we receive from you on applications or other forms, whether we receive the form in writing or electronically. For example, this information includes your name, address, tax identification number, birth date, investment selection, beneficiary information, and possibly your personal bank account information and/or email address if you are signing up for certain account options.
  • Information about your transactions and account history with us, or with other companies that are part of Franklin Templeton Investments, including transactions you request on our website. This category also includes your communications to us concerning your investments.
  • Other general information that we may obtain about you such as demographic information.

Some of the information mentioned above can be personal and sensitive in nature as per the indicative list given below:

  • Bank Account details change of bank account details or registration of multiple bank accounts etc. through application forms;
  • Payment instrument details at the time of submitting application at the time of investment or as proof for carrying out change of bank account or any other details of debit card obtained (if any);
  • Generation and storing password (PIN) in encrypted form based on the request from the investor under the online mode of investments;
  • Biometric information obtained, if any;
  • Demat Account details like beneficiary account no. etc.;
  • Annual Income and savings profile; and
  • Other information as may be considered as sensitive and personal

Disclosure Policy

The aforesaid information is being collected by the AMC/Service Providers to respond to your requests, to process the investment applications and to also ensure safe subscriptions/redemptions through points of acceptance in physical form, website, online portals, Automated Teller Machines and such other mode. The AMC may also call the investors to inform them with respect to the other products or services offered by the AMC. The said information is also being collected to be compliant with the Know Your Client (KYC) norms under the Prevention of Money Laundering Act, 2002, (PMLA), the rules issued thereunder, and guidelines and circular on Anti- Money Laundering issued by SEBI and SEBI (Mutual Funds) Regulations, 1996 as amended till date. 

The aforesaid information is the basis of our ability to provide investors/clients/customers with good, qualitative, timely and efficient service, customized and personalized experience, while also keeping the information and data provided totally secure and confidential.

We endeavor to have suitable technical, operational and physical security controls and measures to protect investors/customers/clients personal/sensitive data or information that are commensurate with the nature of our business at all times.

We permit only authorized employees who are trained in the proper handling of customer information, to have access to aforesaid information. We would ensure to enter into suitable terms with third party service providers in order to protect client confidentiality and follow a non-disclosure or restricted disclosure policy. Further, the employees who violate the privacy and confidentiality promise shall be subjected to disciplinary action.

We shall reveal only such information to external authorities as may be found relevant and necessary in order to comply with the applicable laws of the land and to third party service providers to ensure smooth functioning of the activities as may be prescribed under applicable laws like Registrar and Transfer Agents/distributors/banks/sub-brokers/call-centers/custodians/depositories and such other entities/persons. By using our website or by agreeing to transact with us, you agree to the above sharing of information during your relationship with us. We may also be required from time to time to disclose investors/customers/clients personal information to governmental or judicial bodies or agencies or our regulators based on their requirement to comply with the applicable laws including cyber laws. In addition to the above we may also use the information shared by investors/clients/customers to contact investors/clients/customers regarding the products and services offered by us and seek feedback on the services provided. Further, such information may also be used by us to generate statistics and reports and/or to protect and defend the rights, interest and property of the Mutual Fund, AMC, Trustee Company, Sponsors & its affiliates and directors and/or to enforce legal rights or provisions of the Scheme related Documents of the Mutual Fund viz. Scheme Information Document (SID), Statement of Additional Information (SAI) and Key Information Memorandum (KIM). To better service your accounts and provide you with more choices, we may share non-public personal information with other Franklin Templeton Investments' companies such as investment advisers, the distributor of our mutual funds, and financial service providers offering banking, trust, and custodial products and services. Further, it may be noted that Internet Protocol (IP) addresses, browser supplied information and site session information may be recorded as part of the normal operations and for security monitoring purposes.

Nevertheless, it is our foremost endeavor to ensure that the Customer’s Privacy is protected at all points in time. The customers/clients (whether existing/prospective) must ensure to recheck the information or data being provided to the AMC or any person acting on its behalf. Incase if any of the data/information is found to be inaccurate or incorrect, the same shall be informed to the AMC for immediate amendment. The AMC and any person acting on its behalf shall not be responsible for the authenticity of the personal information or sensitive personal data or information supplied by the customers/clients (whether existing/prospective).

Our website may use cookies. By using our website and agreeing to these terms of use, you consent to our use of cookies in accordance with the terms of our privacy policy.

Investors/ Customers/ Clients shall not be covered by the terms of this Policy if they access other websites using links from this website.

Further, despite our efforts to protect investors/customers/clients privacy, if unauthorized persons breach security control measures and illegally use such sensitive/personal data or information, the Mutual Fund, AMC, Trustee Company, Sponsors and its affiliates and directors shall not be held responsible/liable.

This Privacy Policy available on our website is current and valid. However, the AMC reserves the right to amend/modify any of the sections of this policy at any time and the clients/customers/investors are requested to keep themselves updated for changes by reading the same from time to time. 

Retention of information/data
It may be noted that we may retain the data as may be provided by the client/investors/customers till such time as may be provided under the law and as required to efficiently provide service to the clients/investors/customers.

Grievance redressal
If investors/customers/clients have any concerns relating to their personal and sensitive information they may be addressed to Investor Relations Officer. For more details please refer to the Scheme related documents available on our website.
Investors/clients/customers shall have expressly consented to the terms of this Policy if they enter and use this website or provide any information while transacting with us.