Security Statement
This Internet Banking System includes a combination of industry-approved security technologies to protect data for the bank and for you, our customer. In order to enable the positive identification of Retail Internet Banking websites, each server has been issued a digital certification by an industry leading trust vendor, Thawte or Verisign. The system also features password-controlled system entry, Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol for data encryption, and a router loaded with a firewall to regulate the inflow and out flow of server traffic.
Secure Access and Verifying User Authenticity
To begin a session with the server, the user must key in a Login ID and a password. Our system allows three (3) invalid attempts before employing a lockout mechanism to deter users from repeated login attempts. After three unsuccessful login attempts, the system locks the user out. A designated wait period or a phone call to the bank is required to reentry into the system. Upon successful login, the Digital ID from Thawte or Verisign authenticates the user’s identity and establishes a secure session with the customer.
Secure Data Transfer
Once the server session is established, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by Thawte or Verisign, data traveling between the user and server is encrypted with SSL/TLS protocol. With SSL/TLS, data traveling between the bank and the customer is encrypted and can only be decrypted with the public and private key pair. The bank server issues a public key to the end user’s browser and creates a temporary private key. These two keys are the only combination possible for that session. Once the session is complete, the keys expire and the entire process starts over when a new end user initiates a server session.
Router and Firewall
Data requests must filter through a router and firewall prior to reaching the server. A router works in conjunction with the firewall, blocking and directing traffic coming in to the server. The configuration begins by blocking ALL traffic and then opening up entrances only to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank.
By using the above technologies, your Internet Banking transactions are secure.