Privacy and Security

Privacy Statement

FACTS WHAT DOES GREAT NORTH BANK DO WITH YOUR PERSONAL INFORMATION?
Why? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.
What? The types of personal information we collect and share depend on the product or service you have with us. This information can include:

  • Social Security number
  • Income
  • Account Balances
  • Payment History
  • Credit History
  • Credit Scores

When you are no longer our customer, we continue to share your information as described in this notice

How? All financial companies need to share customers’ personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customers’ personal information; the reasons Great North Bank chooses to share; and whether you can limit this sharing
Reasons we can share your personal information Does Great North Bank share? Can you limit this sharing?
For our everyday business purposes—
such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus
Yes No
For our marketing purposes—
To offer our products and services to you
No We Don’t Share
For joint marketing with other financial companies Yes No
For our affiliates’ everyday business purposes—
Information about your transactions and experiences
No We Don’t Share
For our affiliates’ everyday business purposes—
Information about your creditworthiness
No We Don’t Share
For nonaffiliates to market to you No We Don’t Share
Questions? Call 715-528-4844

 

What we do
 

How does Great North Bank protect my personal information?

To protect your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings. 

We also maintain other physical, electronic and procedural safeguards to protect this information and we limit access to information to those employees for whom access is appropriate.

How does Great North Bank collect my personal information? We collect your personal information, for example, when you

  • Open an Account
  • Pay Your Bills
  • Apply for a Loan
  • Use Your Credit or Debit Card
  • Make Deposits or Withdrawals from Your Account

We also collect your personal information from others, such as credit bureaus, affiliates, or other companies.

Why can’t I limit all sharing? Federal law gives you the right to limit only

  • sharing for affiliates’ everyday business purposes – information about your creditworthiness
  • affiliates from using your information to market to you
  • sharing for non-affiliates to market to you

State laws and individual companies may give you additional rights to limit sharing. See below for more on your rights under state law.

Definitions
Affiliates Companies related by common ownership or control. They can be financial and non-financial companies.

  • Great North Bank has no affiliates. 
Nonaffiliates Companies not related by common ownership or control. They can be financial and non-financial companies.

  • Great North Bank does not share with nonaffiliates so they can market to you.
Joint marketing A formal agreement between nonaffiliated financial companies that together market financial products or services to you.

  • Our joint marketing partners include insurance agents, credit card processors and tax service providers.
Other Important Information

For Alaska, Illinois, Maryland and North Dakota Customers.  We will not share your personal information with nonaffiliates either for them to market to you or for joint marketing – without your authorization.

For California Customers.  We will not share personal information with nonaffiliates either for them to market to you or for joint marketing – without your authorization.  We will also limit our sharing of personal information about you with our affiliates to comply with all California privacy laws that apply to us.

For Massachusetts, Mississippi, and New Jersey Customers.  We will not share personal information from deposit or share relationships with nonaffiliates either for them to market to you or for joint marketing – without your authorization.

For Vermont Customers.  We will not share personal information with nonaffiliates either for them to market to you or for joint marketing without your authorization, and we will not share personal information with affiliates about your creditworthiness without your authorization.

Security Statement

Our website brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features a VeriSign-issued Digital ID for the bank’s Internet Service Provider hosting our website, Secure Sockets Layer (SSL) protocol for data encryption, and a router and firewall to regulate the inflow and outflow of server traffic.

Secure Data Transfer

Once a server session is established on an https secure page, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by VeriSign, data traveling between the user and the server is encrypted with Secure Sockets Layer (SSL) protocol. With SSL, data that travels between the bank and customer is encrypted and can only be decrypted with the public and private key pair. In short, the bank’s server issues a public key to the end user’s browser and creates a temporary private key. These two keys are the only combination possible for that session. When the session is complete, the keys expire and the whole process starts over when a new end user makes a server session.

Router and Firewall

Secure forms must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank.

Using the above technologies, your Internet loan application and check reorder transactions are secure.