Privacy and Security
Privacy Statement Rev. Sept. 2016
Please click here to download a printable copy
|FACTS||WHAT DOES CHINO COMMERCIAL BANK DO WITH YOUR PERSONAL INFORMATION?|
|Why?||Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.|
|What?||The types of personal information we collect and share depend on the product or service you have with us. This information can include:
When you are no longer our customer, we continue to share your information as described in this notice.
|How?||All financial companies need to share customer’s personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customer’s personal information; the reasons Chino Commercial Bank chooses to share; and whether you can limit this sharing.|
|Reasons we can share your personal information||Does Chino Commercial Bank share?||Can you limit this sharing?|
|For our everyday business purposes— such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus||Yes||No|
|For our marketing purposes— to offer our products and services to you||Yes||No|
|For joint marketing with other financial companies||Yes||No|
|For our affiliates’ everyday business purposes— information about your transactions and experiences||No||We Don’t Share|
|For our affiliates’ everyday business purposes— information about your creditworthiness||No||We Don’t Share|
|For non–affiliates to market to you||No||We Don’t Share|
|Who we are|
|Who is providing this notice?||Chino Commercial Bank|
|What we do|
|How does Chino Commercial Bank protect my personal information?||To protect your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings.|
|How does Chino Commercial Bank collect my personal information?||We collect your personal information, for example, when you
We also collect your personal information from others, such as credit bureaus, affiliates, or other companies.
|Why can’t I limit all sharing?||Federal law gives you the right to limit only:
State laws and individual companies may give you additional rights to limit sharing.
|Affiliates||Companies related by common ownership or control. They can be financial and nonfinancial companies.
|Nonaffiliates||Companies not related by common ownership or control. They can be financial and nonfinancial companies.
|Joint marketing||A formal agreement between nonaffiliated financial companies that together market financial products or services to you.
The accuracy of the information Chino Commercial Bank maintains is very important. If you believe we have information about you that is incorrect, outdated or incomplete, or if the information you think is wrong appears on a statement or notice from us, you should call us at (909) 393-8880 or the telephone number shown on the statement or notice. We will look into the matter and correct our records as appropriate.
Our website brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features a VeriSign-issued Digital ID for the bank’s Internet Service Provider hosting our website, Secure Sockets Layer (SSL) protocol for data encryption, and a router and firewall to regulate the inflow and outflow of server traffic.
Once a server session is established on an https secure page, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by VeriSign, data traveling between the user and the server is encrypted with Secure Sockets Layer (SSL) protocol. With SSL, data that travels between the bank and customer is encrypted and can only be decrypted with the public and private key pair. In short, the bank’s server issues a public key to the end user’s browser and creates a temporary private key. These two keys are the only combination possible for that session. When the session is complete, the keys expire and the whole process starts over when a new end user makes a server session.
Secure forms must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank. Using the above technologies, your Internet loan application and check reorder transactions are secure.