Custom Image

Security Statement

Security Statement

This Internet Banking System brings together a combination of industry-approved security technologies to protect data for Texas Leadership Bank and you, our customer. It features password-controlled system entry, a VeriSign-issued Digital ID for the Bank's server, Secure Sockets Layer (SSL) protocol for data encryption, and a router loaded with a firewall to regulate the inflow and outflow of server traffic.

Secure Access and Verifying User Authenticity

To begin a session with the Bank's server the user must key in a Log-In ID and password. Our system, the Internet Banking System, allows for three attempts to log in prior to the lock-out mechanism. This "3 strikes and you are out" method should deter users from repeated login attempts. If locked out, you will be required to wait a period of time before attempting to log back in or you will need to call the Bank to verify the password before re-entry into the system. Upon successful log in, the Digital ID from VeriSign, the experts in digital identification certificates, authenticates the user's identity and establishes a secure session with that visitor.

Secure Data Transfer

Once the server session is established, the user and the server are in a secured environment. Because the server has been certified as a 128-bit secure server by VeriSign, data traveling between the user and the server is encrypted and can only be decrypted with the public and private and key pair. In short, the Bank's server issues a public key to the end-user's browser and creates a temporary private key. There two keys are the only combination possible for that session. When the session is complete, the keys expire and the whole process starts over when the end-user establishes a server session.

Router and Firewall

All requests must filter through a router and firewall before they are permitted to reach the server. A router (a piece of hardware) works in conjunction with the firewall (a piece of software) to block and direct traffic coming to the server. The configuration begins by disallowing ALL traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the Bank.

The use of all the above technology ensures your Internet banking transactions are secure.