Your TRUST is important to us.
Our customers trust us to protect their financial assets and their personal financial information. This trust is our most valuable asset and it is critical to customer satisfaction and our success.
We place a top priority on SAFEGUARDING your financial PRIVACY.
We take pride in our record of protecting customer privacy. We remain committed to maintaining confidentiality and being responsible in the use of our customers' information. This commitment is fundamental to our way of doing business.
We use a combination of SAFEGUARDS to keep customer information CONFIDENTIAL and SECURE.
SECURING and PROTECTING your financial PRIVACY is a partnership.
You should take steps to help maintain the privacy of your personal financial information. This includes using care in the handling of your account numbers and other sensitive information.
Some limited and RESPONSIBLE SHARING of information is necessary and beneficial to customers.
When banks use customer information, they do so to help serve their customers better.
Banks share some information about customers internally or with service providers and vendors to offer the protection and services you expect. For instance, banks sometimes must use customer information to detect or prevent fraud, such as someone trying to access a customer’s account through forgery or other means. Information sharing is also necessary for customers to get checks approved by merchants, to use debit cards or to use automated teller machines owned by other institutions.
Banks often contract with outside firms for check printing, data processing or other services to maintain accounts and process transactions. These types of arrangements enable banks to operate more efficiently and hold down costs to customers. We take great care in the selection of any service provider we work with. Each new contract that we enter into will prohibit that vendor from using customer information for any purpose other than to provide the service specified.
When reviewing loan requests and handling loans on an ongoing basis, banks and other lenders share borrower information internally and with credit bureaus, as allowed by law. Sharing of credit information within the financial system is critical to sound lending and to the strength of the banking sector. This efficient flow of information also presents consumers with more credit opportunities, enables banks to respond more quickly to loan requests and reduces the cost of credit.
Banks sometimes share customer information internally or with affiliated or outside companies to develop or market products they believe their customers will value. If we ever choose to share customer information with an outside company for the purpose of marketing non-financial products or services, you will be informed beforehand and given an option to block your information from being shared.
Finally, you should know that all banks are required to collect and share some information to comply with federal and state laws and regulations.
We strive to ENSURE that the customer information we maintain is ACCURATE.
If you find an error in any statement or other communication we send to you, please contact us promptly so we can correct our records.
The information age is challenging all businesses to embrace technology while preserving consumer trust. We are committed to continuing our tradition of safeguarding customer information. If you have a question about our privacy policies or practices, please call us.
Types of information Triad Bank collects.
Non-public personal information is information that is not available to the public. This information is personally identifiable financial information that is provided by a consumer to a financial institution, which results from any transaction with the consumer, any service performed for the consumer or is otherwise obtained by Triad Bank, N.A.
Examples of non-public personal and confidential Information collected by Triad Bank, N.A. includes, but is not limited to the following:
Confidential Information includes, but is not limited to the following: