|FACTS||WHAT DOES SECURITY STATE BANK DO WITH YOUR PERSONAL INFORMATION?|
About Security State Bank
|What?||The types of personal information we collect and share depend on the product or service you have with us. This information can include:
When you are no longer our customer, we continue to share your information as described in this notice.
|How?||All financial companies need to share customers’ personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customers’ personal information; the reasons Security State Bank chooses to share; and whether you can limit this sharing.|
|Reasons we can share your personal information||Does Security State Bank share?||Can you limit this sharing?|
|For our everyday business purposes -such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus||Yes||No|
|For our marketing purposes -to offer our products and services to you||No||We Don’t Share|
|For joint marketing with other financial companies||No||We Don’t Share|
|For our affiliates’ everyday business purposes -information about your transactions and experiences||No||We Don’t Share|
|For our affiliates’ everyday business purposes -information about your creditworthiness||No||We Don’t Share|
|For nonaffiliates to market to you||No||We Don’t Share|
|Questions? Call toll-free 800-835-3728 or go to www.ssbwyo.bank|
|What We Do|
|How does Security State Bank protect my personal information?||To protect your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings.We also maintain other physical, electronic and procedural safeguards to protect this information and we limit access to information to those employees for whom access is appropriate.|
|How does Security State Bank collect my personal information?||We collect your personal information, for example, when you
We also collect your personal information from others, such as credit bureaus, affiliates, or other companies.
|Why can’t I limit all sharing?||Federal law gives you the right to limit only
State laws and individual companies may give you additional rights to limit sharing. See below for more on your rights under state law.
|Affiliates||Companies related by common ownership or control. They can be financial and non-financial companies.
|Nonaffiliates||Companies not related by common ownership or control. They can be financial and non-financial companies.
|Joint Marketing||A formal agreement between nonaffiliated financial companies that together market financial products or services to you.
|Other Important Information|
|For Alaska, Illinois, Maryland and North Dakota Customers: We will not share personal information with nonaffiliates either for them to market to you or for joint marketing – without your authorization. For California Customers: We will not share personal information with nonaffiliates either for them to market to you or for joint marketing – without your authorization. We will also limit our sharing of personal information about you with our affiliates to comply with all California privacy laws that apply to us.|
Our website brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features a VeriSign-issued Digital ID for the bank’s Internet Service Provider hosting our website, Secure Sockets Layer (SSL) protocol for data encryption, and a router and firewall to regulate the inflow and outflow of server traffic.
Secure Data Transfer
Once a server session is established on an https secure page, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by VeriSign, data traveling between the user and the server is encrypted with Secure Sockets Layer (SSL) protocol. With SSL, data that travels between the bank and customer is encrypted and can only be decrypted with the public and private key pair. In short, the bank’s server issues a public key to the end user’s browser and creates a temporary private key. These two keys are the only combination possible for that session. When the session is complete, the keys expire and the whole process starts over when a new end user makes a server session.
Router and Firewall
Secure forms must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank.
Using the above technologies, your Internet loan application and check reorder transactions are secure.
Texts and Emails
Security State Bank will not request your banking information through email or text messages. Texts and emails are only sent regarding your accounts when initiated by you.
If you should have any questions about a text or email you receive please contact your local branch.