The security of your account is one of BPC's primary concerns. The security of the information you provide is among BPC’s top priority. BPC utilizes industry standard secure server protection using encrypted Secure Socket Layer (SSL). BPC will not use an e-mail to collect or update information on your SSN, date of birth, debit/credit card number, PIN or security code. To further protect your account, please read and heed the following guidelines:

Notification and Confirmation of Transaction

You will be notified if a transaction was added to your account. Upon approval and processing of your transaction, you will receive an email confirmation that your bill payment successfully went through.

Password Protection

You are responsible for the security of your account password and you must not share your password with anyone. The unauthorized use of your password will be your sole responsibility. You must report any attempt to acquire your password to You must immediately report any inappropriate use of BPC's service or unauthorized exposure of information you provided to your account. To report, you may call telephone no. 1844-867-9019 or email us at

The following are recommendations for creating a strong password and keeping it safe:

  • Use at least 10 characters; 12 is ideal for most home users.

  • Try to be unpredictable – do not use names, dates, or common words.Try to mix numbers, symbols, and capital letters into the middle of your password, not only at the beginning or end.

  • Do not use the same password for multiple accounts. If it’s stolen from you – or from one of the companies where you do business – thieves can use it to take over all your accounts.

  • Do not share passwords on the phone, in texts or by email. Legitimate companies will not ask you for your password.

  • If you write down a password, keep it locked up, out of plain sight.

Keep Your Personal Information Secure Online

  • Know who you share your information with. Store and dispose of your personal information securely.

  • Be Alert of Impersonators. Make sure you know who is asking for your personal or financial information. Don’t give out personal information on the phone, through the mail or over the Internet unless you have initiated the contact or know who you’re dealing with. If a company that claims to have an account with you sends an email asking for personal information, do not click on any link. Instead, type the company name into your web browser, go to their site, and contact them through customer service. Or, call the customer service number listed on your account statement and verify if the company really sent a request.

  • Safely Dispose your Personal Information. Before you dispose of a computer, get rid of all the stored personal information it contains. Use a utility program to overwrite and wipe the entire hard drive. Before you dispose of a mobile device, check your user manual, the service provider’s website, or the device manufacturer’s website for information on how to delete information permanently, and how to save or transfer information to a new device. Remove the memory or subscriber identity module (SIM) card from a mobile device. Remove the phone book, lists of calls made and received, voicemails, messages sent and received, organizer folders, web search history, and photos.

Keep Your Devices Secure

  • Use Security Software. Install an anti-virus software, anti-spyware software, and a firewall. Set your preference to update these protections often. Protect your software against intrusions and infections that can compromise your computer files or passwords by installing security patches for your operating system and other software programs.

  • Avoid Phishing Emails. Do not open files, click on links, or download programs sent by strangers. Opening a file from someone you don’t know could expose your system to a computer virus or spyware that captures your passwords or other information you type.

    Take note of poor grammar or typo errors. Some phishing e-mails are translated from other languages or are sent without being proof-read. To verify if the email is a phishing email (forged email address) and made to look like it is coming from BPC, please check the return address which must be “”. The website of BPC is if another website address is used, then it is most likely a forged website intended for phishing.

    If you receive a Phishing/spoofed E-mail (forgery) or you believe that you were a victim of a phishing attack, report this to BPC immediately.

  • Scam phone calls. Technical support scammers may call and pretend to be a computer technician from a well-known company. They usually say they have found a problem with your computer. They often ask you to give them remote access to your computer and then pretend to run a diagnostic test. They then try to make you pay for a problem they claim to have fixed, but doesn’t really exist. Listen to an FTC undercover call with a tech support scammer.

    If you get a phone call you didn’t expect from someone who says there’s a problem with your computer, and just hang up.

  • Be Wise About Wi-fi Before you send personal information over your laptop or smartphone on a public wireless network in a coffee shop, library, airport, hotel, or other public place, see if your information will be protected. If you use an encrypted website, it only protects the information you send to and from that site. If you use a secure wireless network, all the information you send on that network should be protected.

  • Lock Your Devices. Keep financial information on your device only when necessary. Do not use an automatic login feature that saves your user name and password, and always log off when you are finished. That way, if your laptop is stolen, it will be harder for a thief to access your personal information.

Update Your Software

Keep your software – including your operating system, the web browsers you use to connect to the Internet, and your apps – up to date to protect against the latest threats. Most software can update automatically, so make sure to set yours to do so. Outdated software are easier for criminals to compromise. If you think you have a virus or bad software on your computer, search how to detect and get rid of malware.

If you think there’s a problem with your computer or device, update your computer’s security software and run a scan. If you need help fixing a problem, consult a company you know and trust. Many software companies offer support online or by phone. Stores that sell computer equipment also offer technical support in person.

Protect Your Personal Information

Do not share your personal information to just anyone. Your Social Security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name. Every time you are asked for your personal information – whether in a web form, an email, a text, or a phone message – think about why someone needs it and whether you can really trust the request. In an effort to steal your information, scammers will do everything they can to appear trustworthy. We advise you to learn more about scammers who phish for your personal information.

What to Do If You Were Scammeds

If you paid a scammer with a credit or debit card, you may be able to stop the transaction. Contact your credit card company or bank right away. Tell them what happened and ask if they can dispute the charges. If you paid a tech support scammer with a gift card, contact the company that issued the card right away. Tell them you paid a scammer with the gift card and ask if it is possible for them to refund your money.

  • If you gave a scammer remote access to your computer, update your computer’s security software, then run a scan and delete anything if it identifies as a problem.

  • If you gave your user name and password to a tech support scammer, change your password right away. If you use the same password for other accounts or sites, change it there, too. Create a new password that is strong.