7 tips to make your registry worth
the time and effort.
7 tips to make your registry worth the time and effort.
Making a list of the gifts you would like to receive is a favor to those who love you and want to give gifts. Use these tips to make your registry work for you.
Creating your baby registry is a great excuse to research baby products and decide what fits your parenting style. Take time to ask experienced parents what they loved and what they didn’t. A well thought out registry means fewer returns and more gifts you sincerely love. Even if you don’t receive a single gift from your registry, having done the research will make shopping easier.
You might be tempted to go crazy with the scanner and add everything cute and interesting. But, that’s not a good tactic for making the most out of your baby registry. Be intentional about the items you choose. Ask yourself, "Would I spend my own money on this?" If the answer is no, then put it down and back away from the scanner.
Also, spend your gift cards like they are hard-earned cash. If you do, you will have money left to buy all the essentials on your own.
Don’t forget diapers, wipes, and other basics. People love to give diapers and moms love to receive them. While not a very original gift, they’re one of the most useful. Having the basics on your registry also reminds people that simple, useful gifts are appreciated.
You will get clothes whether you register for them or not. People will get excited at the idea of your baby dressed in something adorable they bought. In addition to that, different store locations may have different clothing inventories, making it difficult for friends or family to find the exact item you’re looking for. Finding clothes from your registry can be very frustrating for both you and your friends and family.
It’s great to have a few big-ticket items on your registry in case your friends from work want to go in on a gift together or grandma wants to get something extra special, but the bulk of your items should be in the lower price range. Having lower-priced options allows people to shop within their budget. People who want to spend more can buy multiple items or put together a gift basket.
Lots of retailers have baby registries and each store has different perks or bonuses for registering with them. Learn about these programs before you decide where to register. For example, some major retailers give 10% off purchases made from your registry, even purchases you make yourself. Others give a 15% off completion coupon so you can buy what’s left on your registry—another great reason to put basics like diapers on the list. While every store has its own perks, registering at only 1 or 2 stores will keep it simple for both you and your shower attendees.
Select stores allow for group gifting, so several people can contribute whatever they want toward one big-ticket item. Similarly, some sites offer cash funds, which allow friends and family to choose the amount they want to give toward, say, a college fund or pricey item. In both cases, you get what you want and loved ones get to contribute without overspending.
Edvest529 gives you a way to let friends and family give a gift that grows with your baby. Instead of the usual gift items, they may contribute to baby’s Edvest 529 college savings account via Ugift®. You can share your Ugift code via email, Facebook, Twitter, or printed party invitation inclusions. Another option for sharing is to print the Ugift Gifter Coupon and mail it. It’s never too early to start saving for college.
For more information about the Edvest College Savings Plan, call 1-888-338-3789 or click here for a Plan Description which includes investment objectives, risks, charges, expenses, and other important information. Read and consider it carefully before investing.
Please Note: Before you invest, consider whether your or the beneficiary’s home state offers any state tax or other state benefits such as financial aid, scholarship funds, and protection from creditors that are only available for investments in that state’s qualified tuition program. You should also consult your legal or tax professional for tax advice based on your own circumstances. Investments in the plan are neither insured nor guaranteed and there is the risk of investment loss.
If the funds aren’t used for qualified higher education expenses, a 10% penalty tax on earnings (as well as federal and state income taxes) may apply.
The Edvest College Savings Plan is offered by the State of Wisconsin. TIAA-CREF Tuition Financing, Inc. (TFI), program manager. TIAA-CREF Individual & Institutional Services, LLC, Member FINRA, distributor and underwriter for Edvest.
The Plan Web site contains links to other Web sites. Neither the Plan nor TFI and its affiliates are responsible for the content of those other Web sites. The accuracy of information on those sites cannot be confirmed.
All social media platforms are managed by the State of Wisconsin.
TIAA-CREF Tuition Financing, Inc. serves as program manager for the Edvest College Savings Plan (the “Plan”). Ascensus College Savings Recordkeeping Services, LLC provides recordkeeping and account processing services.
Our cybersecurity response program is designed to help keep your financial information safe and is intended to comply with applicable federal and state laws. Online security is a shared responsibility between you, the account owner, and us, the service provider. Safeguarding your assets, your personal information, and privacy is one of our fundamental priorities. We utilize a variety of controls to detect and prevent unauthorized access to our network and sensitive information.
We are committed to keeping your financial information secure. Please know that we'll never call or email you to ask you for your login credentials. If you receive a suspicious message, don't click on any of the links or respond with personal information. Please report suspicious activity by calling your plan's customer service at 1-888-338-3789.
While we strive to keep your information and transactions safe, there are actions you can take to contribute to your own security. The following are some best practices to follow.
When buying online, look for online merchants who are members of a seal-of-approval program that sets voluntary guidelines for privacy-related practices, such as TRUSTe, Verisign, or BBBonline.
Criminals are using new schemes that incorporate old techniques to try to trick people to provide personal information or account details. These social engineering attempts include use of sophisticated email and text messages appearing to be from legitimate sources and phone calls appearing to be from authentic individuals or service providers, etc. Carefully scrutinize any requests to divulge personal or account details. Understand your surroundings and be wary of those watching and listening. If you can't verify a request or confirm that it is authentic, take the utmost caution in releasing any information.
Identity theft involves the impersonation of an individual through the fraudulent use of his or her personal and account information - e.g., driver's license, Social Security number, bank account and other numbers, as well as usernames and passwords.
Identity thieves obtain information in a number of ways:
Avoid being a victim of a social engineer or scam artist by being an educated and aware online consumer. Learn more by visiting OnGuard Online, a service of the U.S. Federal Trade Commission and other federal agencies. OnGuard Online provides information about avoiding scams, understanding mobile apps and Wi-Fi networks, securing your home computer, and protecting family members.
If you are a victim of an Internet crime, report it to IC3, a service of the U.S. Federal Bureau of Investigation and the National White Collar Crime Center. You should also report attempted identity theft to the local authorities as well as to the Federal Trade Commission's Complaint Assistant Application.
While there is no way to completely eliminate the risks of fraud or identity theft, there are things that you can do to help protect yourself and minimize the risk.
We use the following methods to help keep your online transactions and personal information safe and secure.
To help prevent unauthorized access, we prompt you to create a unique username and password when you first access your account. A password is a string of characters used to access information or a computer. Passwords help prevent unauthorized people from accessing files, programs, and other resources. When you create a password you should make it strong, which means it should be difficult to guess or crack. See below for hints in creating a password that would be difficult to crack.
A Strong Password
Before you enter your online password, we ask that you verify your personalized security image. This image would be one that you selected during the creation of your web account. Once the image you have selected is displayed, you can be confident that you are accessing our website, as opposed to a fake site that may be attempting to "phish" for your personal information. If you ever log in and do not see the image you've selected or the image is incorrect, STOP, do not input your password. Please immediately report this to your plan's customer service team.
Note that for some sites where there exists a partner relationship, some users may seamlessly sign into their financial institution's website without seeing a security image. This occurs because of an industry standard technology called federated authentication which exists between your financial institution and us. When you securely log into your financial institution's site and wish to then view your 529 plan account, you will seamlessly and securely be transitioned to the Plan’s website. Users should familiarize themselves with their financial institution's security and login process to be more able to effectively identify when the process behaves differently than expected.
If you forget your password, answering the security questions you selected when creating your account will allow you to reset your password online. The security questions are designed to be personal to you. The answers should also be easy for you to remember but hard for others to guess. We highly recommend that you do not use questions that may be answered by someone viewing your social media profiles or other information that may be publically available.
Whether you visit us online, or by phone, we always verify your identity before granting access to your accounts.
Transport Layer Security (TLS) technology is used to establish an encrypted connection between your browser and our Web applications. TLS websites start with "https://" instead of "http://" and signify that you are in a secure online session with us. For your protection, we require a modern version of TLS and industry standard encryption strength - these are supported by current versions of all modern browsers.
We're on the lookout for suspicious irregularities across our network and infrastructure every day, all day.
Firewalls are protective barriers that defend our networks and computer systems from hackers and cyber- attackers trying to gain access into our systems. We use some of the strongest firewalls available in the industry to guard the information housed in our servers.
System activity is logged in order to preserve the information necessary to validate the transmission of data or the completion of a transaction.
We monitor transactions for suspicious and unusual behavior to help verify that they are authentic and legitimate.
We limit access to systems containing customer data to only those employees who need it to conduct business or support key business functions. Access is continually monitored and only granted to new associates as their role may require.
We make sure that our employees know and adhere to our security policies. We require all associates to participate in ongoing security training, including how to handle sensitive data and to be aware of security risks.
We review industry security standards and perform system testing on an ongoing basis to help identify and implement the most up-to-date techniques and technologies, and verify that our systems are performing as expected.