Your province is Ontario.

Entrer un groupe et sélectionner une province

Entrer un groupe valide. Note : Entrer le nom de votre entreprise, organisation, syndicat, ordre professionnel, association de diplômés ou de retraités, par exemple.
Sélectionner une province.

Important notice

We’re currently receiving a high number of phone and online requests. We’re working hard to serve our customers as quickly as possible. You can do some transactions right away, like storing a vehicle or filing a claim, in your Online Services account.

Skip to content


We adhere to very strict and rigorous security standards. Here are some of the measures we have in place to ensure that your online transactions remain secure.


Access to our Web site is controlled by a firewall, which is a security device that filters requests for access to our Web site and blocks any attempts at unauthorized access.

256-Bit encryption

All transactions involving your online account and our quote tools are encoded, using 256-bit encryption for transfers between our systems and your computer.

Encryption is a cryptography procedure that makes a document unreadable by anyone who is not authorized to access it. With 256-bit encryption, the chances that a hacker could take control of an online session are reduced to virtually zero.

Fraudulent email

What is phishing?

Phishing is the practice of sending out unsolicited email in which the recipient is asked, under various pretexts, to click a link to a false Web site. The phisher then collects the information provided and uses it to commit fraud. The fake Web site, like the email, appears legitimate because it is often an exact copy of the actual institution's or company’s Web site.

After clicking a link or an attachment to the email, the user is directed to a fake home page to open a session. On this page, additional data fields have been added to fraudulently collect personal information.

How can you recognize fraudulent email?

You need to be on your guard, because criminals use the same colour schemes and logos as the company they’re imitating, making their emails look exactly like the real thing.

Don’t imagine that you’ll be able to recognize fraudulent email at a glance. While in the early days of this type of scam, emails were often amateurish and obvious fakes, today’s fraudulent emails have come a long way.

To distinguish between fraudulent and legitimate email, focus on the content of the message rather than its security trappings. Logos, slogans, security markings, and backgrounds will, in most cases, be perfect counterfeits of the originals.

Few characteristics of fraudulent email

  • The content of fraudulent email seeks, urgently or otherwise, to get you do something for one of the following reasons:
    • You are a finalist in or have won an official contest.
    • There has been an attempt to breach your computer.
    • You need to update your personal information or your account will expire or be frozen.
    • Fraud has been discovered involving your account, and, unless you provide certain information, you will be held responsible.
  • The messages contain a hyperlink that appears legitimate, leading to a fake version of your online account.
  • The email is often signed by, or uses the letterhead of, a security group.
  • Some emails have attachments.

We will never communicate with you by email in any of the above situations.

If you receive an email with any of these characteristics, it is likely that the email is fraudulent, and is therefore a case of phishing aimed at you.

It is not our practice to solicit confidential information on clients via email. If you receive a request of this type, do not reply.

Protecting your identity

We do everything in our power to keep the information you provide during your online sessions confidential. Nevertheless, you should also take the personal safety measures we recommend in order to maintain optimal security.

Clear your computer’s cache memory

If you are using a computer that is shared by several users, we strongly recommend that you clear your browser’s cache memory so that you do not leave an information trail that can compromise the confidentiality of your private data.

This recommendation is particularly important if you use public computers, such as those in libraries, cyber cafés, community access centres, and so forth.

If you don’t know how to clear your browser’s cache memory, check your browser’s help section.

Manage your passwords

When choosing a password for your online account, be sure to follow the advice below to keep your personal information well protected:

  • Choose a password that you will find easy to remember.
  • Do not base your password on personal information; it will be more vulnerable to discovery by swindlers.
  • Never reveal your password to anyone.
  • Do not save your password on your computer.
  • Do not write your password down anywhere.
  • For the highest level of security, change your password regularly.

Close your session

It is important to close your session as soon as you’ve finished using your online account, or if during a session, you need to leave your place momentarily or leave the computer unattended.

To end a session securely, click Quit, clear your cache memory, and shut down your browser.

These operations are even more important if the computer you use for your online transactions is shared with others.