Privacy & Security | Katahdin Trust Company (Houlton, ME)

Federal Deposit Insurance Corporation FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Privacy & Security

Our commitment to your security means we want to make sure you're educated about key ways to guard against fraud and identity theft.

 

Stay Informed

Don't let identity theft happen to you. Keep your personal information safe by staying alert.

  • Know the precautions you can take
  • Access your accounts securely online
  • Ensure that your computer is protected

Our Privacy Policy

We take every step possible to safeguard your personal information. We want you to understand what information we collect and how we use it. 

View our Privacy Policy

 

Website Terms of Use

When you access the Katahdin Trust website on the Internet (the "Site") to obtain information about products and services offered by Katahdin Bankshares Corp., Katahdin Trust, and their subsidiaries (the "Bank"), you are indicating that you accept and agree to the terms and conditions set forth here.

Items posted on this Site may be copyrighted by the Bank, or others as indicated. The information and materials may not otherwise be displayed, downloaded, licensed, modified, published, re-posted, sold, transmitted, or otherwise used in any other manner, except as provided in these terms and conditions, without prior express written permission. Views expressed on this Site including third party postings or links do not necessarily reflect the views of the Bank. The Bank reserves the right to amend the pages of this Site, and will not provide notice of such amendments. Please review these pages to monitor amendments or other changes to the Site.

Unless otherwise prohibited by law, any communication or material you transmit to this Site or Internet electronic mail is on a non-confidential basis and Katahdin Trust will ensure that the information will only be utilized in connection with our Privacy Policy. Katahdin Trust takes significant efforts to provide accurate, quality information. However, the Bank makes no guarantee or warranty, either expressed or implied, for any piece of information contained herein. Additionally, the Bank specifically disclaims any liability, of any kind, for any direct, indirect, consequential, or specific damages arising out of or in any way connected with your access or use of this Site, including liability associated with any virus which may infect a user's computer equipment. The Bank further assumes no liability or responsibility for the accuracy, timeliness or comprehensiveness of any information available on this Site.

You agree to indemnity, hold harmless and defend Katahdin Trust and its affiliates from and against any and all claims, actions, suits, judgments and expenses (including court costs and reasonable attorney, accountant and expert witness fees) at your expense, arising from your failure to abide by these Terms of Uses, or misuse of the services it provides or this Site.

Clicking on certain links within this Site will take you into other websites or material not under the control of the Bank. The Bank does not endorse or accept responsibility for any such website. The Bank has no control over any other website and is not responsible for the content on any website other than this one. Users assume, and the Bank expressly disclaims, any and all responsibilities when they go to other websites via the link(s) on this Site.

It is expressly prohibited to attempt any unauthorized attempts to alter information or upload non-authorized materials, to attempt to circumvent or destroy security measures, or to use this Site for any reason other than that for which it was intended.

You agree that your use of this Site shall be governed by Maine law and agree that jurisdiction and venue shall be located in Aroostook County, Maine.

Our Accessibility Commitment

Katahdin Trust is committed to meeting the banking needs of all our customers, including those with disabilities. We provide access to a variety of products and services online, by phone, and in our offices to assist you with your banking needs. As part of this commitment, we are continually improving our website to make it more accessible.

We welcome your feedback. If you encounter any difficulty using our website or have suggestions about improving the usability or accessibility of our services, please call us at (207) 521-3221 or Toll-Free at 1-855-331-3221 Monday-Friday 8am-5pm, send an email to info@katahdintrust.com, or write to us at:

Katahdin Trust
Marketing Dept.
PO Box 36
Houlton, ME 04730

 

Online Banking Security

At Katahdin Trust, the security of customer information within our Online Banking service is a primary concern. We are strongly committed to protecting the security and confidentiality of customer information. We use the latest methods of security technology currently available to do so.

To protect the integrity and confidentiality of customer information and transactions, Katahdin Trust has taken security measure precautions at three levels.

  1. Customer information as it is sent from the customer's computer to the Web server.
  2. The environment in which the internet banking server and customer information database reside.
  3. Measures are in place to minimize the risk of unauthorized users from attempting to log into the online banking section of the web site.

Data security between the customer browser and our Web server is handled through a security protocol called Secure Sockets Layer (SSL). SSL provides data encryption, server authentication, and message integrity for an Internet connection. In addition, SSL provides a security "handshake" that is used to initiate the connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection.

Currently Katahdin Trust's online banking application supports data encryption at a high level (128 bit). Most supported web browsers support 128-bit encryption by default. Check with your browser manufacturer's website for more information.
Requests for online banking information are passed on from the Web server to the Internet banking server. The Internet banking application is designed using a three-tiered architecture. The three-tiered architecture provides a double firewall, completely isolating the Web server from the customer information SQL database.

The World Wide Web interface receives SSL input and sends requests through a firewall over a dedicated private network to the Internet banking server. The World Wide Web interface is the only process capable of communicating through the firewall to the Internet banking server. Therefore, only authenticated requests communicate with the Internet banking server.

The customer information database is housed on a Microsoft SQL Server, which implements Microsoft NT security in addition to the firewall technology. The customer database is stored on a RAID-5 drive array, which provides uninterruptible data access, even in the event of a hard drive failure. The Internet banking server is the only process able to send requests to the SQL database. This is just like the World Wide Web interface is only capable of communicating with the Internet banking server. Thus, the outside world is removed from the customer database by two dedicated private networks.

A security analyzer constantly monitors login attempts and recognizes failures that could indicate a possible unauthorized attempt to log into an account. When such trends are observed, steps will be taken automatically to prevent that account from being used.

Security concerns have been addressed from every angle within the architecture of the Internet banking application. Implementation of the SSL security protocol on the Web server and customer browser ensures authenticated data has been received from the customer. The three-tiered approach of the Internet banking application creates a double firewall which performs information requests over dedicated networks designed to handle specific functions. Placing all business logic and event logging within the Internet banking server creates a controlled environment which allows quick incorporation of Internet security technologies as they evolve. Finally, the security analyzer monitors login attempts in order to minimize the risk of unauthorized logins.

Security and Safety Tips

While anyone can be a victim of fraud and identity theft, many ways exist to minimize your risk.

 

Katahdin Trust will NEVER call, text or send emails asking you to provide sensitive banking information. You shouldn't respond to any attempts requesting that type of information.

It's important to always access our website by typing in the URL (www.katahdintrust.com) and never access the website from a link provided in an email.

  • Never give out your social security number, account number, or personal credit information over the phone unless you initiate the call to a number that you know is legitimate.
  • Tear up or shred receipts, bank statements and unused credit card offers before throwing them away.
  • Keep an eye out for missing mail. If a statement, check or bill is missing, someone may have changed your mailing address.
  • Don't mail bills from your own mailbox. Drop them in a post box or at the post office.
  • Review your monthly accounts regularly for any unauthorized charges.
  • Order copies of your credit report annually, and report and correct mistakes. View a free copy of your credit report.
  • Choose to do business with companies you know are reputable, especially on the Internet.
  • Keep your browser's padlock or key icon active when doing business online.
  • Don't open e-mail from unknown sources.
  • Use virus detection and anti-spyware software.
  • Protect your PINs (don't carry them in your wallet!) and passwords. One strategy for improving online security is the use of a passphrase — which is a short sentence or a random series of words. These are particularly attractive because of their length but when they include numbers, special characters, spaces and capitalization they can very secure. The key is to choose something which is meaningful and memorable, but that can’t be easily guessed. An example would be to use the first letters of a favorite nursery rhyme, or a phrase that makes sense to you and would be something that you would remember. An example of this is Katahdin Trust Company is my favorite place to work, could look like this: Ktc0imfp!w
  • Don't carry your Social Security card in your wallet.
  • Report any suspected fraud to us immediately, and notify the fraud divisions of the three major credit bureaus: Trans Union (800) 916-8800, Experian (888) 397-3742 and Equifax (800) 525-6285.

Fraudulent websites often try to mimic legitimate sites so they can gather personal information for financial gain or identity fraud.

Online Romance Imposter Scams

Tech Support Imposter Scams

ATM Safety Tips

 

Protecting Your ATM Card

  • Always protect your ATM card. Keep it in a safe place, just like you would cash, credit cards or checks.
  • Don't leave your ATM card lying around the house or on your desk at work. No one should have access to the card but you. Immediately notify us if it's lost or stolen.
  • Keep your Personal Identification Number (PIN) a secret. Never write it down anywhere, especially on your ATM card.
  • Never give any information about your ATM card or PIN over the telephone. For example, if you receive a call, supposedly from your bank or possibly the police, wanting to verify your PIN, do not give that information. Notify the police immediately.

Using an ATM

  • Be aware of your surroundings, particularly at night. If you see or sense suspicious people or circumstances, don't use the machine at that time.
  • Have your ATM card ready and in your hand as you approach the ATM. Don't wait to get to the ATM and then take your card out of your wallet or purse.
  • Visually inspect the ATM for possible skimming devices. Potential indicators include adhesive to attach the device, scratches, damaged or crooked pieces. This can also include loose or extra attachments on the card slot, or noticeable resistance when pressing the keypad.
  • Be careful that no one can see you enter your PIN at the ATM. Use your other hand or body to shield the ATM keyboard as you enter your PIN into the ATM.
  • To keep your account information confidential, always take your receipts or transaction records with you.

Special Precautions for Using an ATM at Night

  • Park close to the ATM in a well-lighted area.
  • Take another person with you, if at all possible.
  • If the lights at the ATM are not working, don't use it.
  • If shrubbery has overgrown or a tree blocks the view, select another ATM.

Mobile Check Deposit Safety Tips

Use caution when using Mobile Deposit to make your deposits to ensure the safety and security of your deposited items. These tips will help protect your bank account.

  • Treat your mobile device with the same care as you do your personal computer.
  • Don't store sensitive information like passwords and social security numbers on your mobile device.
  • Password protect your mobile device and lock it when you’re not using it.
  • Be aware of your surroundings. Don’t type any sensitive information if others around you can see.
  • Protect your phone from viruses and malware by installing mobile security software.
  • Download the updates for your phone and mobile apps.
  • Use discretion when downloading apps. Apps can contain malicious software, worms, and viruses. Beware of apps that ask for unnecessary "permissions".
  • If you change your phone number or lose your mobile device, let us know right away.
  • Wipe your mobile device before you donate, sell or trade it. This can be done by using specialized software or using the manufacturer's recommended technique. Some software allows you to wipe your device remotely if it is lost or stolen.
  • Monitor your accounts regularly and report suspicious activity to us immediately.
  • Always sign off completely when you finish using Online Banking or the Mobile App, rather than just closing your browser.

7 Tips for Protecting Yourself Online

Though the internet has many advantages, it can also make users subject to fraud, identity theft and other scams. The Internet offers the potential for safe, convenient new ways to shop for financial services and conduct banking business, any day, any time. However, safe banking online involves making good choices – decisions that will help you avoid costly surprises or even scams.

 

Katahdin Trust recommends the following tips to keep you safe online:

  1. Keep your computers and mobile devices up to date. Having the latest security software, web browser, and operating system are the best ways to protect against viruses, malware, and other online threats. Turn on automatic updates so you receive the latest updates as they become available.
  2. Use strong passphrases. This is a short sentence or a random series of words. These are particularly attractive because of their length but when they include numbers, special characters, spaces and capitalization they can very secure. The key is to choose something which is meaningful and memorable, but that can’t be easily guessed. An example would be to use the first letters of a favorite nursery rhyme, or a phrase that makes sense to you and would be something that you would remember. An example of this is Katahdin Trust Company is my favorite place to work, could look like this: Ktc0imfp!w
  3. Watch out for phishing scams. Phishing scams use fraudulent emails and websites to trick users into sharing private account or login information. Don't click on links or open any attachments or pop-up screens from sources you're not familiar with.
  4. Keep personal information personal. Hackers can use social media profiles to figure out your passwords and answer those security questions in the password reset tools. Lock down your privacy settings and avoid posting things like birthdays, addresses, mother’s maiden name, etc. Don't accept requests to connect from people you don't know.
  5. Secure your internet connection. Always protect your home wireless network with a password. When connecting to public Wi-Fi networks, be cautious about what information you're sharing.
  6. Shop safely. Before shopping online, be sure the website uses secure technology. When you're at the checkout screen, verify that the web address begins with https. Also, check to see if a padlock symbol appears on the page.
  7. Read the site’s privacy policies. Though long and complex, privacy policies tell you how the site protects the personal information it collects. If you don’t see or understand a site’s privacy policy, consider doing business elsewhere.

For more information on how to keep yourself safe online, view the Cyber Security Customer Guide.

12 Ways to Protect Your Mobile Device

Your mobile device provides convenient access to your email, bank and social media accounts. Unfortunately, it could provide the same convenient access for criminals. Katahdin Trust recommends following these tips to keep your information – and your money – safe.

VIEW OUR MOBILE BANKING APP PRIVACY POLICY

 
  1. Use the passcode lock on your smartphone and other devices. This will make it more difficult for thieves to access your information if your device is lost or stolen.
  2. Log out completely when you finish a mobile banking session.
  3. Protect your phone from viruses and malware by installing mobile security software.
  4. Use caution when downloading apps. Apps can contain malicious software, worms, and viruses. Beware of apps that ask for unnecessary “permissions.”
  5. Download the updates for your phone and mobile apps.
  6. Avoid storing sensitive information like passwords or a social security number on your mobile device.
  7. Let us know immediately if you change your phone number or lose your mobile device.
  8. Be aware of shoulder surfers. The most basic form of information theft is observation. Be aware of your surroundings, especially when you’re punching in sensitive information.
  9. Wipe your mobile device before you donate, sell or trade it. This can be done by using specialized software or using the manufacturer’s recommended technique. Some software allows you to wipe your device remotely if its lost or stolen.
  10. Beware of mobile phishing. Avoid opening links and attachments in emails and texts, especially from senders you don’t know. And be aware of ads claiming that your device is infected.
  11. Watch out for public Wi-Fi. Public connections aren't very secure, so don’t perform banking transactions on a public network. If you need to access your account, try disabling the Wi-Fi and switching to your mobile network.
  12. Report any suspected fraud to your bank immediately.
 

ACH Fraud Prevention Tips

Malicious software, also known as malware, infects computers by keystroke logging or keylogging. This allows the criminal to obtain user ID and password, which leads them to information about account balances, activity and potential victim accounts.

What should business customers do to protect themselves?

  • One of the most effective controls is for business customers to always initiate ACH and wire transfer payments under dual control. For example, one individual initiates the payment file creation and another approves the file for release.
  • The combination of dual control and the use of multiple factors to prove identity is very effective in preventing an attack. Multiple factors are more challenging to compromise. For example, the use of 1) something the person knows (PIN, password), and 2) something the person has (password-generated token, USB token) could reduce the risk of an attack substantially.
  • Limit administrative rights on users' workstations. This will help to prevent the downloading of malware or other viruses by users.
  • Ensure that your operating system and its components are up-to-date with current software 'patches.' For example, the use of the most current firewalls, malicious code filtering, virus protection and spyware removal software will help in the control of network intrusion tactics.
  • Business customers should be reconciling their bank accounts daily. Many corporate clients, particularly small business clients, may not typically reconcile their bank account on a daily basis, or use treasury management services such as debit blocks or positive pay. Therefore, the entry will post and the two-day return time will have passed before the unauthorized debit is noticed.
  • Remember return time frames for CCDs (entries to corporate accounts) have a two-day return time frame for unauthorized entries. This time frame is distinct from entries to consumer accounts, such as PPDs, which have a 60-day return time frame for unauthorized.

MALWARE is malicious software designed to infiltrate or damage a computer system without the owner's informed consent. The damage can be any form of a variety of hostile, intrusive, or annoying software or program code. Malware includes computer viruses, worms, trojans, most rootkits, spyware, and other malicious or unwanted software. Many trojans now have remote administration capabilities that allow the perpetrator to control the victim's computer.

ROOTKIT is a program or combination of several programs designed to hide or obscure the fact that a system has been compromised. A fraudster may use a rootkit to replace system executables, which may then be used to hide processes and files that the fraudster has installed.

SPYWARE is software that is installed surreptitiously on a computer to intercept or take partial control over the user's interaction with the computer without the user's informed consent. While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information. They can also interfere with user control of the computer. This can include installing additional software or redirecting web browser activity.

TROJANS are programs that appear to have some useful purpose, but in actuality contain malicious functionality. Trojan software hides its destructive portion during installation and program execution, often preventing anti-malware from recognizing it.

Take Steps to Prevent Unwanted Credit Offers.

After applying for a loan, homebuyers tend to get a lot of calls and mail from companies not affiliated with the bank trying to sell them things. To help reduce these unsolicited offers, there are a few options applicants can take to opt out of trigger leads.

 Stop Unwanted Offers

View a copy of my credit report

Fight identity theft by monitoring and reviewing your credit report. View a free copy of your credit report now. It's quick, easy and secure.

 

Find Us
Branches & ATMs
Call Us
Talk with a local banker
Email Us
With secure messages
Chat with Us
We are here to help
Back to Top