Privacy and Security
|FACTS||WHAT DOES RED ROCK BANK DO WITH YOUR PERSONAL INFORMATION?|
|Why?||Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.|
|What?||The types of personal information we collect and share depend on the product or service you have with us. This information can include:
|How?||All financial companies need to share customers’ personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customers’ personal information; the reasons we choose to share; and whether you can limit this sharing|
|Reasons we can share your personal information||Does Red Rock Bank share?||Can you limit this sharing?|
|For our everyday business purposes—
such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus
|For our marketing purposes—
to offer our products and services to you
|For joint marketing with other financial companies||No||We Don’t Share|
|For our affiliates’ everyday business purposes—
information about your transactions and experiences
|No||We Don’t Share|
|For our affiliates’ everyday business purposes—
information about your creditworthiness
|No||We Don’t Share|
|For affiliates to market to you||No||We Don’t Share|
|For non–affiliates to market to you||No||We Don’t Share|
|Questions?||If you have any questions regarding this notice or the information shared by us, you may reach us in a manner that is convenient to you:
|Who we are
|Who is providing this notice?||Red Rock Bank|
|What we do
|How does Red Rock Bank protect my personal information?||To protect information your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings. FIB restricts access of personally identifiable financial information to those employees with a specific business reason for utilizing this data.|
|How does Red Rock Bank collect my personal information?||We collect your personal information, for example, when you
We also collect your personal information from others, such as credit bureaus, affiliates, or other companies.
|Why can’t I limit all sharing?||Federal law gives you the right to limit only
State laws and individual companies may give you additional rights to limit sharing.
|Affiliates||Companies related by common ownership or control. They can be financial and non-financial companies.
|Nonaffiliates||Companies related by common ownership or control. They can be financial and nonfinancial companies.
|Joint marketing||A formal agreement between nonaffiliated financial companies that together market financial products or services to you.
|Other Important Information
|You can help protect your privacy by using caution when disclosing your account numbers, social security numbers, etc. to other persons. If someone calls you, explains the call is on behalf of the bank and asks for your account number or any other identifying or account-related information, you should beware.
Red Rock Bank does not ask bank customers for personal information via email or phone. Anyone who receives an email or phone call that claims to be from Red Rock Bank and asks for account information should consider it to be a fraudulent attempt to obtain their personal account data and should not follow the instructions in the email or over the phone.
At Red Rock Bank, we recognize how important it is to protect your identity from unlawful use and to protect your accounts from fraud and unauthorized access. It is not our practice to ask for your Red Rock Bank account number, User ID, password, or PIN in e-mail. It is also not our practice to send e-mail that asks you to reply by sending personal information or threatens to close your account if you do not immediately provide personal information.
Unfortunately, millions of fraudulent e-mails are sent daily. They claim to be from or sent by a wide variety of sources, including Red Rock Bank. Exercise caution if you receive an e-mail expressing an urgent need for you to update your information, activate your online banking account, or verify your identity by clicking on a link. These e-mails may be part of a scam (called “phishing”) to capture your confidential account information and commit fraud. The senders of these e-mails can tamper with the sender information in an e-mail to make their e-mail look legitimate.
If you receive a fraudulent e-mail that appears to come from or be sent by Red Rock Bank, this does not mean that your e-mail address, name, or any other information has been taken from Red Rock Bank’s systems. The senders of fraudulent e-mails obtain e-mail addresses from many places on the Internet.
If you want to let us know about a suspicious e-mail you’ve received, please forward it to email@example.com.
Red Rock Bank is dedicated to protecting your information.
E-mail Security and Fraud Prevention Tips
Be wary of suspicious emails, especially ones seemingly urgent. Never open attachments, click on hyperlinks, or respond to e-mails from suspicious or unknown senders.
If you receive a suspicious email that you think is fraudulent, do not respond or provide any information. Forward the email to us at firstname.lastname@example.org.
Protect your online passwords. Don’t write them down or share them with anyone.
Never give personal information to a stranger who contacts you, whether by telephone, e-mail, or other means.
Be wary of offers involving money-back guarantees, up-front payments by you, or high pressure sales tactics.
Our website brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features a VeriSign-issued Digital ID for the bank’s Internet Service Provider hosting our website, Secure Sockets Layer (SSL) protocol for data encryption, and a router and firewall to regulate the inflow and outflow of server traffic.
Secure Data Transfer
Once a server session is established on an https secure page, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by VeriSign, data traveling between the user and the server is encrypted with Secure Sockets Layer (SSL) protocol. With SSL, data that travels between the bank and customer is encrypted and can only be decrypted with the public and private key pair. In short, the bank’s server issues a public key to the end user’s browser and creates a temporary private key. These two keys are the only combination possible for that session. When the session is complete, the keys expire and the whole process starts over when a new end user makes a server session.
Router and Firewall
Secure forms must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank.
Using the above technologies, your Internet loan application and check reorder transactions are secure.