Customer Identification Policy

Important information about procedures for opening a new account:

To help the government fight the funding of terrorism and money laundering activities.  Federal law requires all financial institutions to obtain, verify, and record information that identifies each person who opens an account.  What this means for you:   When you open an account, we will ask for your name, address, date of birth, and other information that will allow us to identify you.  We may also ask to see your driver’s license or other identifying documents.

While the 1st Equity Bank may contact you regarding your account or suspicious activity, we will never call, text or email asking you for:

  • Account number
  • Username
  •  Password
  •  PIN
  •  Birthday
  •  Address
  •  Provide answers to a security question
  •  Other log in information or personal information
  •  Download an attachment

If someone calls asking for the above, hang up and call us back at 847-676-9200 to be sure you’re speaking to a REAL PERSON at 1st Equity Bank. Remember, we do not operate a call center and have no weekend or evening hours after 5PM. When you call you should be able to speak with the person who opened your account or a manager at the Bank.

ONLINE Safety Practices (Put in the section that is linked to Mobile and Online Banking) Users of 1st Equity Bank’s online banking system should follow the practices below to protect themselves online.

Password Practices

  • Don’t share your user ID or password with anyone. Make sure you safeguard your user ID and password information, and never leave it written down in an unsecured location.
  • Consider using a secure password app to manage your passwords. •
  •  Create strong passwords that contain a mix of uppercase letters, lowercase letters, numbers and special characters (!@#$%^&*). The longer the password the more secure your account and data will be.
  • Create a unique user ID and password for each site that you visit. Don’t use the same identifying information on multiple websites. In the case that one website were to be breached, it will make it harder for hackers to access your data. This also prevents you from having to update all of your credentials if one site is compromised.
  • Many websites force password changes every 30 or 60 days. If a website doesn’t do so, take the initiative and change your password on a regular basis.

Web Practices

  • Monitor your account activity. Log in and view your online account activity on a regular basis and review periodic account statements to make sure they’re accurate, on a monthly or quarterly basis.
  • Make sure you always log off from a website—don’t just close the page or “X” out.
  • Secure websites have a web address that includes an “s” (https rather than http). If this is lacking, the site is not genuine. Don’t log in or conduct business on sites that may not be secure.

Network and Computer Security Practices

  • Use your computer’s security monitoring software that includes anti-virus, anti-malware and firewall functions, and take advantage of security features like individual login accounts, when possible.
  • Keep your computer’s system security up to date by applying patches and updates whenever they become available.
  • Always enable passwords on your computer, wireless router or any other physical or wireless system.

Business Customer Practices

The Federal Financial Institutions Examination Council's (FFIEC) offers additional guidelines for business customers

  • Business customers should periodically perform a self-identified risk assessment to evaluate the effectiveness of the controls in place to minimize the risks of online transaction processing.
  • Business customers should understand the security features of the software and websites they utilize and take advantage of these features. Segregation of duties—the process of separating duties so no one person can perform all steps of a transaction—is an example of a very important security feature.
  • Additional information at: https://www.ffiec.gov/cybersecurity.htm