Microsoft Word Privacy Statement and External Links Disclaimer

Transcript

1 Privacy Statement and External Links Disclaimer External Links Disclaimer titutes consent to the following terms. The New South web site Access to or use of the New South Credit Union web site cons a provides links to other web sites for convenience and informationa l purposes only. Users should be aware that when they select the New South Credit Union site. Linked sites are not under the link on our web site to an external web site, they are leaving control of New South Credit Union, and New the contents of any linked site or any lin k South Credit Union is not responsible for contained in a linked site, or any changes or updates to su ch sites. New South Credit Union is not responsible for any sion transmission received from a linked site. In addition, New is no t responsible for any web casting or any other form of transmis Credit Union of the site, its imply endorsement by New South received from any linked site. The inclusion of a link does not content, advertisers or sponsors. External sites may contain info rmation that is copyrighted with restrictions on reuse. Permis sion ource and cannot be obtained from New South Credit Union. The to use copyrighted materials must be obtained from the original s ion, its directors, officers, volunteers, and employees. terms of this disclaimer extend to New South Credit Un Privacy Disclosure FACTS: What Does New South Credit Union Do With Your Personal Information? Why? on. Federal law gives consumers the right to limit some but Financial companies choose how they share your personal informati not all sharing. Federal law also requires us to tell you how read we collect, share, and protect your personal information. Please this notice carefully to understand what we do. What? The types of personal information we collect and share depend on the product or service you have with us. This information can include: ƒ Social Security number and account balances ƒ account transactions and checking account information ƒ credit history and wire transfer instructions When you are no longer our member, we continue to shar e your information as described in this notice. How? to run their everyday business. In the section below, we li All financial companies need to share members’ personal information st South Credit Union chooses to the reasons financial companies can share their members' personal information; the reasons New share; and whether you can limit this sharing. Does New South Can you limit this Reasons we can share your personal information Credit Union share? sharing? For our everyday business purposes — No Yes such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or to report to credit bureaus For our marketing purposes — Yes No to offer our products and services to you For joint marketing with other financial companies No Yes For our affiliates’ everyday business purposes — No We don't share information about your transactions and experiences For our affiliates’ everyday business purposes — information about your No We don't share creditworthiness For non-affiliates to market to you No We don't share Questions? Call (865) 523-0757

2 What we do How does New South Credit unauthorized access and use, we use security To protect your personal information from Union protect my personal measures that comply with federal law. Thes e measures include computer safeguards and information? secured files and buildings. How does New South Credit We collect your personal information, for example, when you Union collect my personal information? ƒ open an account or apply for a loan ƒ make a wire transfer or provide account information ƒ make deposits or withdrawals from your account s, such as credit bureaus, affiliates, or other We also collect your personal information from other companies. Why can’t I limit all sharing? Federal law gives you the right to limit only sharing for affiliates’ everyday business purposes — information about your ƒ creditworthiness ƒ affiliates from using your information to market to you ƒ sharing for non-affiliates to market to you you additional rights to limit sharing. State law and individual companies may give Definitions Affiliates Companies related by common ownership or control. They can be financial and non-financial companies. ƒ New South Credit Union has no affiliates Non-affiliates Companies not related by common ownership or control. They can be financial and non-financial companies. ƒ Non-affiliates we share with can include insurance companies, government agencies, plastic card processors (credit/debit/ATM), financial statement publishers or printers, mailhouse, mortgage service companies, consumer reporting agencies, data processors, check/share draft printe rs, and direct marketing companies Joint Marketing A formal agreement between nonaffiliated financia l companies that together market financial products or services to you. ƒ Our joint marketing partners include CUNA Mutual Group's MEMBERCONNECT

Related documents

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations

-53 NIST Special Publication 800 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations JOINT TASK FORCE TRANSFORMATION INITIATIVE This publication is available fre...

More info »
LaneEtAlPrivacyBigDataAndThePublicGood

LaneEtAlPrivacyBigDataAndThePublicGood

This is a prel version of the book Privacy, Big Data , and the Public Good : iminary er, and for Lane, Victoria Stodden, Stefan Bend nt, ed. Julia Helen Niss enbaum Frameworks Engageme Unive rsity Pre...

More info »
The Digital Person: Technology and Privacy in the Information Age

The Digital Person: Technology and Privacy in the Information Age

GW Law Faculty Publications & Othe r Works Faculty Scholarship 2004 y in the g it al P e rson: T echnolog y a nd P r i v The D c i a I m a t ion A ge nfor a niel J . S olo ve D Ge orge W ashington U n...

More info »
privacybook

privacybook

R ⃝ Foundations and Trends in Theoretical Computer Science Vol. 9, Nos. 3–4 (2014) 211–407 c ⃝ 2014 C. Dwork and A. Roth DOI: 10.1561/0400000042 The Algorithmic Foundations of Differential Privacy Cyn...

More info »
Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities

Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities

T O N F E J M U T Global Justice S R T A I C P Information E E D Sharing Initiative United States Department of Justice Privacy, Civil Rights, and Civil Liberties Policy Development Guide For State, L...

More info »
Handbook AS 353   Guide to Privacy, the Freedom of Information Act, and Records Management

Handbook AS 353 Guide to Privacy, the Freedom of Information Act, and Records Management

Summary of Changes Handbook AS-353, Guide to Privacy, the Freedom of Information Act, and Records Management Handbook AS-353, , has Guide to Privacy, the Freedom of Information Act, and Records Manage...

More info »
IPR-Report-Print-Version

IPR-Report-Print-Version

A QUESTION OF TRUST REPORT OF THE INVESTIGATORY POWERS REVIEW by DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation JUNE 2015 Presented to the Prime Minister pursuant to section 7 of th...

More info »
2013 01073

2013 01073

Vol. 78 Friday, No. 17 January 25, 2013 Part II Department of Health and Human Services Office of the Secretary 45 CFR Parts 160 and 164 Modifications to the HIPAA Privacy, Security, Enforcement, and ...

More info »
WJP ROLI 2017 18 Online Edition 0

WJP ROLI 2017 18 Online Edition 0

l i a a o a i z a n r a s n i a i i a a n a e r d v v z F o i g a w i B o l l o l o m s d J a I o b e r t u g e s a t a u l a n i e i m e o B u B B n i l m z a r y g h s a a B r l k a m a n i o r J l ...

More info »
Christl Networks  K .indd

Christl Networks K .indd

Wolfie Christl, Sarah Spiekermann Networks of Control

More info »
untitled

untitled

L IBERT Y AND S ECURITY IN ORLD A C HANGING W 12 December 2013 Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies

More info »
Microsoft Word   privacy deathof.doc

Microsoft Word privacy deathof.doc

The Death of Privacy? * A. Michael Froomkin The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informa- tional privacy obsolete. The first part of ...

More info »
Microsoft Word   Ohm Final Article.doc

Microsoft Word Ohm Final Article.doc

B P ROMISES OF P RIVACY : R ESPONDING ROKEN TO THE S URPRISING F AILURE OF A NONYMIZATION * Paul Ohm Computer scientists have recently undermined our faith in the privacy- protecting power of anonymiz...

More info »
Exemption 6

Exemption 6

417 Department of Justice Guide to the Freedom of Information Act Exemption 6 Personal privacy interests are protected by two provisions of the Freedom of 1 Information Act, Exemptions 6 and 7(C). Und...

More info »
Microsoft Word   Rubinstein   Final.docx

Microsoft Word Rubinstein Final.docx

VOTER PRIVACY IN THE AGE OF BIG DATA RA S. R UBINSTEIN * I In the 2012 presidential election, the major candidates and political parties assembled extraordinarily detailed political dossiers on every ...

More info »
Review Doc 2016  466 1.docx

Review Doc 2016 466 1.docx

-130 CIRCULAR NO. A EADS OF EXECUTIVE DEPARTMENTS AND AGENCIES TO THE H Managing Information as a Strategic Resource SUBJECT: Introduction 1. 2. Purpose Applicability 3. Basic Considerations 4. Policy...

More info »
WJP ROLI 2018 June Online Edition 0

WJP ROLI 2018 June Online Edition 0

It a a J a azil ari aso vi a J ze Br swan a F bodi ada am um J aly er oon Boli Bulg Beli a aic Bot arus Chile K Can Cam apan a h Belgi ados Cam Bel bi a Burkin Chin or dan azakh a K as Barb e gl ades ...

More info »
Implementation Handbook For The Convention On The Rights Of The Child

Implementation Handbook For The Convention On The Rights Of The Child

IMPLEMENTATION HANDBOOK FOR THE CONVENTION ON THE RIGHTS OF THE CHILD FULLY REVISED THIRD EDITION IMPLEMENTATION HANDBOOK IMPLEMENTATION HANDBOOK FOR THE CONVENTION ON THE FOR THE CONVENTION ON THE RI...

More info »
Draft NISTIR 8062, Privacy Risk Management for Federal Information Systems

Draft NISTIR 8062, Privacy Risk Management for Federal Information Systems

(provided here for historical purposes) has been superseded by The attached DRAFT document the following publication: Publication Number: Internal Report (NISTIR) 8062 NIST Title: Privacy Risk Managem...

More info »