To better serve legitimate Online Banking customers, Community West Bank collects generic information about visitors to our website. This information includes the date and time of access, the Internet service provider's address, referring site information, the web browsers used, and the operating systems used. Again, this is generic information for our monitoring purposes, and cannot be traced to a specific user or machine.
Community West Bank requires customers to utilize specific passwords for access to confidential and private information and reminds customers of their responsibility to safeguard login IDs and passwords. In addition, commercial customers should carefully screen those employees to whom user IDs and passwords are granted.
Community West Bank utilizes encryption, firewall, router, third party verification procedures and other security software and hardware to help prevent unauthorized eavesdropping of and access to customers' confidential and private information.
The Bank utilizes virus protection software to help prevent the spread of computer viruses and "cookies" to help authenticate our customers' identities and to help facilitate the exchange of information between Community West Bank systems and our customers' systems.
Please note the Bank may provide links outside of our website that are not under our control. These websites may not necessarily comply with Community West Bank's "Privacy Principles" and security standards; however, users are notified via "pop-up" when links redirect client's to websites outside of Community West Bank's website.
Community West Bank reminds all of its customers that confidential and private information may be compromised in both traditional and non-traditional banking activities. The Bank can only establish policies and procedures to help restrict use of and access to confidential and private information. If any Community West Bank customer believes that confidential and private information has been compromised, please contact the Bank immediately so that the potential breach can be investigated.