Security and Privacy

Privacy

What does 1st Security Bank do with your personal information?

Why?

Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.

What?

The types of personal information we collect and share depend on the product or service you have with us. The information can include:

When you are no longer our customer, we continue to share your information as described in this notice.

How?

All financial companies need to share customer’s personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customer’s personal information; the reasons 1st Security Bank chooses to share; and whether you can limit this sharing.

Reasons we can share your personal information Does 1st Security Bank share? Can you limit this sharing?
For our everyday business purposes – such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus Yes No
For our marketing purposes – to offer our products and services to you Yes No
For joint marketing with other financial companies No Not applicable
For our affiliates' everyday business purposes – information about your transactions and experiences No Not applicable
For our affiliates to market to you No Not applicable

Questions?

Contact your local branch.

Who is providing this notice?

1st Security Bank of Washington

How does 1st Security Bank protect my personal information?

To protect your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings.

How does 1st Security Bank collect my personal information?

We collect your personal information, for example, when you:

We also collect your personal information from others, such as credit bureaus, affiliates, or other companies.

Why can't I limit all sharing?

Federal law gives you the right to limit only:

State laws and individual companies may give you additional rights to limit sharing.

Definitions

Affiliates: Companies related by common ownership or control. They can be financial and nonfinancial companies.
Non affiliates: Companies not related by common ownership or control. They can be financial and nonfinancial companies.
Joint marketing: A formal agreement between nonaffiliated financial companies that together market financial products or services to you.

Security

Our privacy policies are unimportant if we cannot maintain the security of our systems. All of our sensitive information forms are submitted and stored securely using tried and proven industry standard protocols. While no security system is 100% airtight (you should be wary of anyone making that claim) we have taken every reasonable, prudent, and effective step to maintain the security of our systems.

Data Communications Security

Information you send us must pass through your own computer, your own Internet Service Provider, our Internet Provider, and eventually to us. As soon as the personal information that you have put into your browser leaves your computer, it is encrypted using "SSL" (Secure Sockets Layer) technology. Any network between you and us, including your ISP and our ISP, will only see garbled encrypted data if they were to "eavesdrop" on our connection. Netscape Navigator and Internet Explorer indicate that the transfer is secure via two mechanisms. First, the URL on any secured page will begin with https:// rather than http://. Secondly, the browser may display a lock, a blue bar, or other indicator showing that your data will be encrypted prior to transmission.

Once we receive your encrypted information, our system decrypts your data, and places it into a password-protected database on a secured network that is again accessed through another password-protected system, located behind a firewall. This triple protection is the digital equivalent of our "Fort Knox" that protects your sensitive data. The only other way to get at this information is to use our Web site and the administration password that you supply during the account creation process. This is why you should keep this password in a safe place, and why we only send your password to your e-mail address. However, as soon as we send your password in e-mail, you should immediately log in and change your password to prevent someone on the Internet from obtaining your password, and hence, access to your private information.

How we use Cookies

It is our goal to provide the most intuitive and hassle-free experience at our Web site. As a result, we use a technology called a "cookie." The way a cookie functions is that our Web site, after authenticating who you are by having you verify your e-mail address and password, passes a unique cookie to your computer. Once your computer obtains this cookie, it will present this cookie back to us. Our site checks to see if the cookie that you are presenting to us matches what we initially gave you. If it does, then we allow you access to our site without having to re-enter your username. This cookie only exists while the browser is running. It is always a good idea to quit the browser (or restart the computer) if you share your computer with others.

We also use cookies to help keep track of the representative you are working with (if any). This cookie contains no private information, and will remain on your computer even if you quit the browser.