Encryption: The privacy of communications between you (your browser)
and our servers is ensured via encryption. Encryption scrambles
messages exchanged between your browser and our online banking
Password Complexity: It is important to verify that only authorized
persons log into online banking. This is achieved by verifying your
password. When you submit your password, it is compared with the
password we have stored in our secure data center.
We allow you to enter your password incorrectly a limited number of times;
too many incorrect passwords will result in the locking of your online
banking account until you call us to reinitialize the account. We monitor
and record "bad-login" attempts to detect any suspicious activity (i.e.
someone trying to guess your password).
You play a crucial role in preventing others from logging on to your
account. Never use easy-to-guess passwords. Examples:
Social Security numbers
Never reveal your password to another person. You should periodically
change your password in the User Option section of Internet Banking.
Secure Architecture: The computers storing your actual account
information are not linked directly to the Internet.
Transactions initiated through the Internet are received by online
banking Web servers.
These servers route your transaction through firewall servers.
Firewall servers act as a traffic cop between segments of our online
banking network used to store information, and the public Internet.
This configuration isolates the publicly accessible Web servers from
data stored on our online banking servers and ensures only authorized
requests are processed.
Various access control mechanisms, including intrusion detection and
anti-virus, monitor for and protect our systems from potential malicious
activity. Additionally, our online banking servers are fault-tolerant, and
provide for uninterruptible access, even in the event of various types of
Online Banking Features that promote Security: We provide a number
of additional security features in online banking to help protect you:
Timeout: This prevents curious persons from continuing your online
banking session if you left your PC unattended without logging out.
You may set the timeout period in online banking's User Options
screen. We recommend that you always sign off (log out) when done
Online Statements: Online statements are facsimiles of traditional
financial statements packaged and delivered to you securely within
Internet Banking. By eliminating your paper statement, you help stop
thieves from stealing your information out of your mailbox.
Check Images: View an exact facsimile of your check transactions
online to help prevent fraud.
Alerts: Check clear alerts, payment alerts, and balance alerts are
financial tools we provide to help you to monitor your accounts more
actively and to detect suspicious activity more easily.
Frequently used online identify theft and online security terminology.
A computer software program that detects and responds to viruses and worms, blocking
access to infected files and performing frequent updates.
A computer software program that is used to view and interact with Internet material on
the World Wide Web. Netscape Navigator and Microsoft Internet Explorer are two of
the most popular browsers.
Thieves rummage through trash looking for bills or other paper that includes your
A process in which data is scrambled before it is transferred so that it cannot be read by
Enhanced Security Login
Provides security at login, no matter what computer you sign in from, using additional
end user authentication that helps to protect against online fraud.
A gateway supported by hardware or software that limits access between computer
networks. Firewalls can protect your home computer from hackers and your family
from web sites that may contain offensive material.
A person who tries to gain unauthorized access to a computer system. Hackers are
known to modify computer programs and security systems that protect home and office
A spyware program or device that records what users type on their computer. Also
referred to as Keystroke Logger.
Also known as ‘malicious software’, malware is designed to harm, attack or take
unauthorized control over a computer system. See Virus, Trojan and Worm.
Permission granted to a business or organization to use your email address for
promotional or marketing purposes, or to rent your email address to another
The opposite of Opt-In- not granting permission for a business or organization to use
your email address for promotional or marketing purposes, or to rent your email address
to another organization.
A new software release created to update a computer software program. Updates may
include security, performance, or usability enhancements.
Pharming takes place when users type in a valid URL and you are illegally redirected to
a web site that is not legitimate in order to capture personal information through the
internet such as credit card numbers, bank account information, Social Security number
and other sensitive information.
The process of seeking to obtain personal information illegally through email or pop-up
messages in order to deceive you into disclosing your credit card numbers, bank
account information, Social Security number, passwords, or other sensitive information.
A form of web advertising that appears as a "pop-up" on a computer screen, they are
intended to increase web traffic or capture email addresses. However, sometimes popup
ads are designed with malicious intent like when they appear as a request for
personal information from a financial institution.
A standard policy included on most corporate websites that explains how personal
information collected about visitors to a company’s site is handled.
A software program that updates, fixes and/or enhances a software program found on
your computer, typically delivered in the form of a single, installable package.
When an unauthorized second copy of a credit or debit card is taken by an employee at
a store by using a storage device that copies the details held within the card’s magnetic
Unsolicited bulk electronic “junk” messages sent to huge numbers of people via email,
instant messaging, Usenet newsgroups, and more.
A form of phishing, a way for cyber criminals to send emails that look legitimate, but are
not, to falsely represent a legitimate company or organization. The false email from
phishing will include a phony link to what closely resembles a legitimate website
address. Once click upon, the victim is asked to provide personal information which is
then forwarded to criminals.
Loaded onto your computer unbeknownst to you, spyware is a type of program that
watches what users do and forwards information to hackers over the Internet.
A malicious program that is disguised or embedded within legitimate software program
that, when activated, unwittingly allows hackers to gain unauthorized access to the
A self-replicating computer program, loaded on to your computer without your
knowledge that spreads by making copies of itself and clogging up your computer’s
Similar to a computer virus, a worm attaches itself to, and becomes part of, another
executable program. Able to self-propagate, worms generally harm the network and