Security Statement

At the Wealth Management group at First National Bank we understand the importance of customer security. Protecting your confidential financial information is our number one priority. the Wealth Management group at First National Bank maintains strict standards of security designed to ensure a secure exchange of information with our customers.

As part of our commitment, customer information and account data is protected by multiple security protocols: firewalls, data encryption, and a verifiable password. the Wealth Management group at First National Bank provides end-to-end encryption to secure transactions while in transit. Encryption technology transmits information sent over the Internet by encoding the transmitted data. A firewall is designed to protect information stored in our computer systems from unauthorized entry.

You will know when you’re in a safe environment when a “locked” icon is displayed at the bottom of the screen or https:// will appear in the address line. Although we provide a secure e-mail system directly from our site which uses data encryption to help protect your communications with us, we strongly urge you not to e-mail confidential information (such as social security numbers, account numbers, mother’s maiden name, annual income, source of income, etc.) to us.

In addition, the Wealth Management group at First National Bank strict security standards require all browsers that are used to access account information to have 128-bit encryption. Use of 128-bit encryption technology is one of the most secure forms of encryption currently available for commercial use on the Internet.

This Security Statement is a constant reminder to our customers that the security of their personal information is always of utmost concern.

What is encryption?

Encryption is the encoding of a file in order to protect its contents. This entails a word or a group of words essentially written in a secret code language — a language that is useless to anyone but you and your bank, to protect that message from unwanted viewing or tampering. The term "encryption" is a computer-age extension of the term "cryptic", which means something being hidden or mysterious.

Do you cache my information?

No. A cache is a stored file on your computer’s hard drive. When dealing with sensitive and secure data, we do not want the computer to store the information on your hard drive.

Can I use the back button?

When using the back button on a non-secure site, a cache, or a file stored on your computer’s hard drive, is created. On some secure sites, the back button is disabled. On other secure sites, the back button can be used, but instead of caching information, it allows the system to pull your information from the site’s secure server.

How is encryption used, and how does it relate to me?

Basic encryption involves the transmission of data from one party to another. The sender encodes the data by scrambling it, and then sends it on. The receiver must decode the data with the correct “decoder” in order to read and use it. Your computer, as well as our computer system, recognizes the mathematical formulas of the encrypted messages during transactions. The more powerful computer system you possess on your end, the higher level or grade of encryption you can use. There are two types of encryption that you should be familiar with - domestic grade and international grade - when deciding how you will do your remote or PC banking. Domestic grade encryption, also called 128-bit encryption, is a much faster and more powerful form of encryption. On the other end of the spectrum would be 40-bit, or international grade, encryption. The 40-bit means that there are two to the 40th power of possible keys that could access your account information, but only one that could be used per Internet banking transaction. This essentially means that the chances of cracking the code for a particular transaction in 40-bit encryption are very, very small. The 128-bit encryption requires more computer processing power than 40-bit encryption but is more secure. In fact, 128-bit encryption is 309,485,009,821,345,068,724,781,056 times more powerful than 40-bit encryption.

How do Web sites collect information?

Information can be collected in several ways, but typically "personally identifiable information" (information that can be traced to a single user) isn’t gathered on a widespread basis. Most information collected online is "usage data", or data limited to where an individual visits within a site and/or how much time is spent at a particular site. Online services, for example, may track sign-on and sign-off times for billing purposes. Individual Web sites (whether companies or individuals) may gather certain kinds of information about you when you visit their site. Many sites limit information gathering to broad usage statistics. Some Web site operators may collect information about you through your e-mail address, the means by which you connect to their site, by the use of "cookies" or voluntary questions directed at users.

Where does my information go when I provide it online?

You can reasonably assume that some level of information tracking will be done when you login to the Internet. However, unless a site or service provider posts its information gathering and dissemination practices, it's up to you to inquire about them. It's also up to you to decide whether you want to provide your name, mailing address, phone number or any other personal information if a Web site asks you to register.

What are cookies? Can I get rid of them?

Some Web sites transfer a file, often referred to as a "cookie", to your computer's hard drive, which enables them to track your activities on their site. While a code in the cookie file allows a site to label you as a particular user, it doesn't reveal your real name and address unless you've provided the site with such information or set up preferences in your browser to do so automatically. Newer versions of browser software enable you to decide whether you want to receive cookie files, and some programs notify you when a Web site is about to deposit a cookie file. To check whether cookie files have been placed on your computer, look for a hard drive file called "cookies.txt" if you have an IBM compatible PC or "magic cookies" if you have a Macintosh. You can delete these files from your hard drive. There are also utility software programs, called "cookie cutters" or "anonymizers" that allow you to edit cookie files selectively within Web browsers.

What is spamming?

Spamming is the practice of sending unsolicited electronic mail to many users simultaneously. The e-mail message itself is referred to as "spam".

Latest Updates

  • Retirement Plan Services Named Top 100 Adviser in U.S.

    4/4/2017 Read More
  • 2017 Outlook

    1/17/2017 Read More
  • December Investment Commentary

    1/17/2017 Read More

Join Our Newsletter

image description