Fidelity Online Banking runs on a robust Windows NT operating system. Included in this operating system is the capacity to allow only secure connections by end users. Utilizing Secure Socket Layer (SSL) technology, all transmissions of web pages and data between Fidelity and the customer or the Bank are completely encrypted and are unreadable to any person or group trying to "intercept" the transmission. SSL encryption is the industry standard and is commonly used in Internet applications that require security and privacy for sensitive data. State of the art firewall technology is also employed by Fidelity and by the Bank as the first line of defense in preventing unauthorized access to any information housed.
Passwords: Customers are required to enter their user ID and password to access Internet banking. Without the proper login, individuals cannot see or use any web pages within the Online Banking system.
Account Number Masking and Account Aliases: For security reasons, complete account number(s) never appear on the computer screen. When the account number needs to be displayed it appears as ####567 instead of 1234567. The masking will always occur from the left. Account "Aliases" are user-defined titles for the consumer's account (i.e., "My Checking") and is used when displaying account information on the screen.
Secure Connection: When consumers are accessing the online information, their connection is automatically converted into a secure Internet communications session.
Data Encryption: When consumers access their account information or any other sensitive data, an encryption system is automatically activated to protect the transmission of information from unauthorized sources.
Regardless of the efforts, the relative infancy of the Internet as a broad-based communication medium when combined with the "open" nature of the Internet make it impossible to guarantee absolute confidentiality in all circumstances. However, The First National Bank of Eagle Lake and Fidelity National Information Services continue to monitor and review the security procedures that are in place to protect customer information. These measures are updated as practices change and new technology becomes available.