This website uses first- and third-party cookies to improve accessibility, personalise your browsing and compile statistical information on your browsing habits. Continued use of this site indicates that you accept this policy. See our Cookies Policy to change this configuration or obtain more information.

Do not show this message again

Operate safely on Linea Abierta

With the aim of guaranteeing security within the Linea Abierta service of “la Caixa”, always remember three things:

  1. ”la Caixa” never asks its users for any financial or personal information by e-mail – such as password, card numbers or PIN.
  2. The TOKEN or signature device is only used to confirm transactions and more than one password is never asked for per transaction.
  3. Should “la Caixa” send you an e-mail, the name and surname of the client will always appear. Fraudulent e-mails do not usually contain them.

To access Linea Abierta

You must enter your identification and Secret number (these are personal and non-transferable details).
In order to guarantee security it is necessary to treat these details as confidential.

Screen detail of access to linea Abierta

To sign transactions, enter the digits that appear on your signature device. The code that the signature device gives you will be the code needed to sign transactions.

Screen detail enter code in the TOKEN

To check you are on Linea Abierta

On initiating the electronic banking service your name and surnames will appear in the upper right-hand part of the Linea Abierta page and the details of the last connection to this system.

Screen detail to check authenticity of the page

At the same time, details of the present connection will appear on the lower left-hand side and the buttons to change password, register connections to the application and disconnection.

Screen detail to check authenticity of the page

Also, in order to maintain the same level of security, the systems that provide service to Linea Abierta are subject to continual monitoring and are revised and up-dated periodically.
Apart from the physical protection of the computer systems, the most modern systems of logical security are applied.