Below are some of the safeguards we have in place to protect against security breaches in the online environment:
User ID and PasswordOur system is designed to limit online account access to those possessing the user ID and password associated with your account(s).
EncryptionWe have encryption technology in place that allows for the protection of data in transit between your computer and ours. The closed lock icon indicates whether a communication session is encrypted.
FirewallsOur computer systems include firewalls that we monitor and that are designed to protect against unauthorized access to our systems.
TimeoutOur system is designed to log you out automatically after several minutes of inactivity.
Your Account NumberGenerally, we only display the last four digits of your account numbers online. This prevents people looking over your shoulder from seeing the full number.
Cookies and Other Technologies:Our website utilizes a variety of technologies (such as cookies and web beacons), to collect, store, and aggregate data about usage. We may use electronic tags called "cookies" or other technology to help us understand and analyze use of our site. This work is either performed directly by us or by a third party we've hired to assist us. We collect information on what pages have been accessed and for how long and certain technical information regarding your computer and operating systems, such as your Internet protocol address, domain name and browser, etc. Cookies can also help in remembering certain user attributes.
Certain sections of our site require cookies to be enabled to enhance website performance. For example, cookies provide a secure way for us to verify your identity during your online session, enable us to personalize your experience on our site, and enhance site navigation. Cookies also help us to understand how people use our site so that we can improve site functionality.
When you come to our website, our web server sends a cookie to your computer. Standing alone, cookies do not identify you personally; they merely recognize your browser. We use two types of cookies on our website, temporary cookies and persistent cookies. Temporary cookies are used to store information during a browser session and will expire automatically when you close your browser. Persistent cookies are used to store information between visits to our website and are stored permanently or for a specified length of time.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (i.e. Internet Explorer) settings. If you disable cookies, you will not have access to many features that make your visit to our website fully functional.
Electronic images, also known as web beacons, is a technology we use at our site and functions similar to a cookie. A web beacon, sometimes called a single-pixel GIF, is a tiny invisible graphic that contains unique identifier. Web beacons are primarily used in the following ways: 1) to track online web movements of our users and inform us what content and/or ads are effective and, 2) to track receipt of emails to gauge the effectiveness of our communications.
We may use a third party to serve ads on our behalf across the Internet. The third party may also collect anonymous information about your visits to our website through the use of a web beacon, which we place on various web pages throughout our website that allows the third party to collect anonymous information. The third party may use information about your visits to our and other websites in order to provide ads about goods and services of interest to you. If you would like more information about this practice and to know your choices about not having this information used by the third party, visit www.atlassolutions.com/privacy.aspx. The third party reports the anonymous data that they collect on our behalf back to us. Once we receive the collected anonymous data from the third party, we may merge that anonymous data together with the personally identifiable information we currently have about you; this is done for the purposes of better serving you. When we merge this data, it is treated under this policy as personally identifiable information
Things you should do to protect yourself online:
User ID and PasswordFollow these rules to protect yourself:
- Never disclose your user ID or password to anyone.
- Memorize your user ID and password, do not write them down.
- Change your password frequently.
- Do not use birth dates, names, or other easily guessed letters or numbers.
Do not be fooled by fraud:
We will never send you an email asking for your user ID or password
When you have completed using our online site, log out (look for the "Log Out" link we provide). We suggest you do this before you shut your computer off and before you surf to any other websites.
Do not use email to send us sensitive information (such as social security numbers, account numbers, etc.).
Public Computers, Internet Access
Do not use public computers or public Internet access such as "Internet Cafés" or "Free Wifi" to conduct online banking.
Phishing, Spoofs, Hoaxes and Other Deceptive Emails
Be careful when responding to email messages that appear to be from us, a regulator or an auditor. Thieves or hackers send email messages direct you to click on a link which redirects you to a fraudulent website, or pop-up window where you may be asked to "confirm," "verify," "update", or otherwise provide sensitive information (such as your account number, password, PIN, or social security number). Sometimes these email messages will falsely say that your account will be shut down if you do not act quickly. Do not be intimidated by these threats. These links, websites and pop-up windows may look like ours, they are not. Clicking a link in one of these emails can expose your computer to viruses and spyware, even if you do not supply the sensitive information thieves want. We will never send you an email that asks you to verify an account number, password, PIN, or social security number. If you receive such a request, it is probably fraudulent. If you have any doubts about whether an email from us is authentic, do not reply to it, open any attachment or use the link in the email. Instead, contact us through our website or telephone number obtained through your own records. To contact Houghton State Bank please find the applicable telephone number on the Contact Us page.
Do not open attachments in email messages if you do not know the sender. Attachments can contain viruses and spyware. Delete unwanted email.
Links to Other Websites
If you click a link to another website, that website may collect, use, and disclose information about you in ways that are different from what we do. You should review that website's policies. We are not responsible for what the operators of other websites do with your information. We will give you a pop-up notice to let you know you are going to an unaffiliated third party's website.
Security for Your Own ComputerProtect your own computer by doing these things:
- Keep your operating system and browser up to date.
- Install a personal firewall.
- Install anti-virus software and keep it up to date.
- Scan your computer for spyware on a regular basis.
- Do not download programs or files from unknown sources.
- Install a pop-up blocker from a trustworthy source.
- Disconnect from the Internet when you are not online.
Our online banking system provides you with the date and time of your last session ("last login"). This allows you to check the most recent online session and could tell you whether someone else has been accessing your information.
Additional things you should do to protect yourself:
Your Account NumberDo not share your account number with anyone.
Your Account Number
Do not share your account number with anyone. Do not give your account number to someone over the phone, especially if you did not call them. Be aware of people who try to trick you by saying you must reveal your account number in order to award you a prize. Store new and canceled checks, account statements, and other sensitive information in a safe place.
Do not Share Your CardsDo not share your ATM, debit, or credit cards with anyone.
Review Your Accounts
Review your online account information frequently and your statements promptly. Let us know right away if you see something you do not recognize. Using our Account Alerts service can help you monitor your accounts. Balance Your checkbook every month. If you do not receive a statement, let us know right away.
Review Your Credit Reports
Obtain and review a copy of your credit report periodically. This is one way to find out about identity theft.
Check your mailbox every day. Consider dropping your outgoing mail in a US Postal Service mailbox (instead of your home mailbox). Use Online BillPay and sign up for Paperless Statements.
Do not give sensitive information to unknown callers. Hang up and call the company using a phone number that you located in the phone book or your own records. We will never make an unsolicited telephone call requesting sensitive information from you.
Shred materials containing sensitive information before you throw them away.
Do not carry your Social Security card, birth certificate, or passport in your wallet or purse.
Social Security Number
Do not print your Social Security number or driver's license on your checks.
If you are a victim of Identity Theft, follow these three steps:
Contact the fraud departments of each of the three major credit bureaus and report that your identity has been stolen. Ask that a "fraud alert" be placed on your file and that no new credit be granted without your approval.
For any accounts that have been fraudulently accessed or opened, contact the security departments of the appropriate creditors or financial institutions to close these accounts. To contact Houghton State Bank, go to the Contact Us page and find the applicable phone number or email us using the Report Internet Fraud subject option.
- File a report with your local police or the police where the identity theft took place. Get a copy of the report in case the bank or credit card company needs proof of the crime at a later date.