|
Stay InformedDon't let identity theft happen to you. Keep your personal information safe by staying alert.
|
|
Website Terms of UseWhen you access the Katahdin Trust website on the Internet (the "Site") to obtain information about products and services offered by Katahdin Bankshares Corp., Katahdin Trust, and their subsidiaries (the "Bank"), you are indicating that you accept and agree to the terms and conditions set forth here. Items posted on this Site may be copyrighted by the Bank, or others as indicated. The information and materials may not otherwise be displayed, downloaded, licensed, modified, published, re-posted, sold, transmitted, or otherwise used in any other manner, except as provided in these terms and conditions, without prior express written permission. Views expressed on this Site including third party postings or links do not necessarily reflect the views of the Bank. The Bank reserves the right to amend the pages of this Site, and will not provide notice of such amendments. Please review these pages to monitor amendments or other changes to the Site. Unless otherwise prohibited by law, any communication or material you transmit to this Site or Internet electronic mail is on a non-confidential basis and Katahdin Trust will ensure that the information will only be utilized in connection with our Privacy Policy. Katahdin Trust takes significant efforts to provide accurate, quality information. However, the Bank makes no guarantee or warranty, either expressed or implied, for any piece of information contained herein. Additionally, the Bank specifically disclaims any liability, of any kind, for any direct, indirect, consequential, or specific damages arising out of or in any way connected with your access or use of this Site, including liability associated with any virus which may infect a user's computer equipment. The Bank further assumes no liability or responsibility for the accuracy, timeliness or comprehensiveness of any information available on this Site. You agree to indemnity, hold harmless and defend Katahdin Trust and its affiliates from and against any and all claims, actions, suits, judgments and expenses (including court costs and reasonable attorney, accountant and expert witness fees) at your expense, arising from your failure to abide by these Terms of Uses, or misuse of the services it provides or this Site. Clicking on certain links within this Site will take you into other websites or material not under the control of the Bank. The Bank does not endorse or accept responsibility for any such website. The Bank has no control over any other website and is not responsible for the content on any website other than this one. Users assume, and the Bank expressly disclaims, any and all responsibilities when they go to other websites via the link(s) on this Site. It is expressly prohibited to attempt any unauthorized attempts to alter information or upload non-authorized materials, to attempt to circumvent or destroy security measures, or to use this Site for any reason other than that for which it was intended. You agree that your use of this Site shall be governed by Maine law and agree that jurisdiction and venue shall be located in Aroostook County, Maine. |
Online Banking SecurityAt Katahdin Trust, the security of customer information within our Online Banking service is a primary concern. We are strongly committed to protecting the security and confidentiality of customer information. We use the latest methods of security technology currently available to do so. To protect the integrity and confidentiality of customer information and transactions, Katahdin Trust has taken security measure precautions at three levels.
Data security between the customer browser and our Web server is handled through a security protocol called Secure Sockets Layer (SSL). SSL provides data encryption, server authentication, and message integrity for an Internet connection. In addition, SSL provides a security "handshake" that is used to initiate the connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Currently Katahdin Trust's online banking application supports data encryption at a high level (128 bit). Most supported web browsers support 128-bit encryption by default. Check with your browser manufacturer's website for more information. The World Wide Web interface receives SSL input and sends requests through a firewall over a dedicated private network to the Internet banking server. The World Wide Web interface is the only process capable of communicating through the firewall to the Internet banking server. Therefore, only authenticated requests communicate with the Internet banking server. The customer information database is housed on a Microsoft SQL Server, which implements Microsoft NT security in addition to the firewall technology. The customer database is stored on a RAID-5 drive array, which provides uninterruptible data access, even in the event of a hard drive failure. The Internet banking server is the only process able to send requests to the SQL database. This is just like the World Wide Web interface is only capable of communicating with the Internet banking server. Thus, the outside world is removed from the customer database by two dedicated private networks. A security analyzer constantly monitors login attempts and recognizes failures that could indicate a possible unauthorized attempt to log into an account. When such trends are observed, steps will be taken automatically to prevent that account from being used. Security concerns have been addressed from every angle within the architecture of the Internet banking application. Implementation of the SSL security protocol on the Web server and customer browser ensures authenticated data has been received from the customer. The three-tiered approach of the Internet banking application creates a double firewall which performs information requests over dedicated networks designed to handle specific functions. Placing all business logic and event logging within the Internet banking server creates a controlled environment which allows quick incorporation of Internet security technologies as they evolve. Finally, the security analyzer monitors login attempts in order to minimize the risk of unauthorized logins. |
|
Katahdin Trust will NEVER call, text or send emails asking you to provide sensitive banking information. You shouldn't respond to any attempts requesting that type of information. It's important to always access our website by typing in the URL (www.katahdintrust.com) and never access the website from a link provided in an email.
Fraudulent websites often try to mimic legitimate sites so they can gather personal information for financial gain or identity fraud. |
|
|
|
Mobile Check Deposit Safety TipsUse caution when using Mobile Deposit to make your deposits to ensure the safety and security of your deposited items. These tips will help protect your bank account.
|
|
Katahdin Trust recommends the following tips to keep you safe online:
For more information on how to keep yourself safe online, view the Cyber Security Customer Guide. |
|
|
|
What should business customers do to protect themselves?
MALWARE is malicious software designed to infiltrate or damage a computer system without the owner's informed consent. The damage can be any form of a variety of hostile, intrusive, or annoying software or program code. Malware includes computer viruses, worms, trojans, most rootkits, spyware, and other malicious or unwanted software. Many trojans now have remote administration capabilities that allow the perpetrator to control the victim's computer. ROOTKIT is a program or combination of several programs designed to hide or obscure the fact that a system has been compromised. A fraudster may use a rootkit to replace system executables, which may then be used to hide processes and files that the fraudster has installed. SPYWARE is software that is installed surreptitiously on a computer to intercept or take partial control over the user's interaction with the computer without the user's informed consent. While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information. They can also interfere with user control of the computer. This can include installing additional software or redirecting web browser activity. TROJANS are programs that appear to have some useful purpose, but in actuality contain malicious functionality. Trojan software hides its destructive portion during installation and program execution, often preventing anti-malware from recognizing it. |
Take Steps to Prevent Unwanted Credit Offers. After applying for a loan, homebuyers tend to get a lot of calls and mail from companies not affiliated with the bank trying to sell them things. To help reduce these unsolicited offers, there are a few options applicants can take to opt out of trigger leads. |
|