Your Privacy is Important



dabow is committed to making sure your information remains safe.  Below are the ways we protect your accounts and information. We have also included some ways you can protect yourself.

Image

ONLINE SECURITY

Secure Online Login

When you sign in , your Login ID and Password are secure. The moment you click Enter and before your Access ID and Password leave your computer, encryption using Secure Sockets Layer (SSL) technology ensures the privacy of communication between you (your browser) and our servers.

BROWSER SECURITY INDICATORS

You may notice when you are on our homepage the small "lock" icon in the top left corner of the browser frame and the "s" in the Web address bar (for example, "https").

To provide the fastest access to our homepage for all of our customers and other visitors, we have made our site secure. Please be assured that your login ID and Password are secure and only our servers have access to them.

SECURITY

We are committed to protecting your online security. We offer these tips and best practices from Digital Defense on how to safeguard your accounts and privacy.


BUSINESS SECURITY

Protect Your Business from Email Phishing

"Email phishing" is a scheme where a bad actor intercepts payment instructions from a legitimate vendor to a business customer, changes the payment beneficiary information, and instructs the unsuspected business customer to make payment to the bad actor's account instead of the vendor's account. The bad guy ends up with the payment while the legitimate vendor does not get paid.

We highly recommend that you implement the following best practices to protect your company from becoming a victim of this scheme:

  • Do not follow payment instructions or changes to payment instructions by email.
  • If you receive payment instructions or changes to payment instructions by email, implement a callback procedure to contact your vendor or trading partner to verify the authenticity of the request.
  • Implement a process that requires additional review and approval of changes to wire templates and payment beneficiary information.
  • Never give sensitive data (such as account number or password) in response to an email request, instant message or on a social network site.
These are proven and longstanding fraud management and operating controls that are widely used by companies, including dabow.

In addition to the callback procedure above, we also recommend that you continue to use the additional recommendations on this page to protect your company:

FRAUD PREVENTION

Protect Your Business from Other Threats

  • Implement dual control to initiate and release funds transfers, where two employees and two separate computers are required to complete the transfer of funds, either through ACH or wire transfer.
  • Establish appropriate dollar limits for ACH and wire transfers, limiting the exposure in case of unauthorized attempts.
  • Do not open emails from unfamiliar sources, especially those with attachments or links.
  • Maintain current versions of antivirus software, run virus definition updates and virus scans on a regular basis.
  • Review employees' user online banking access activity periodically and remove former employees' accounts from your online banking system immediately.
  • Make your passwords longer, use a combination of upper and lowercase letters, numbers, and symbols.
  • Check for signs that the webpage is secure, for example, a web address that starts with "https" and shows a closed padlock.
  • Promptly review Wire, ACH, or other transaction confirmations to ensure authenticity. Notify your bank immediately if you notice any discrepancies or error

PRIVACY

Privacy

Read our privacy policies and learn how to keep your information private.

We recognize our obligation to keep information about you confidential and secure, and are committed to protecting your privacy.

LAST UPDATED: May 2019

 
 
 

Privacy Policy

Privacy Policy

FACTS

WHAT DOES dabow of North Texas LLC, dabowPaymentSolutions.com hereafter referred to as dabow DO WITH YOUR PERSONAL INFORMATION?

Why?

Financial companies choose how they share your personal information. Federal law gives consumers the right to limit some but not all sharing. Federal law also requires us to tell you how we collect, share, and protect your personal information. Please read this notice carefully to understand what we do.

What?

The types of personal information we collect and share depend on the product or service you have with us.  This information can include:

  • Social Security number and income
  • Account balances and payment history
  • Transaction history and overdraft history

When you are no longer our customer, we continue to share your information as described in this notice.

How?

All financial companies need to share customers’ personal information to run their everyday business. In the section below, we list the reasons financial companies can share their customers’ personal information; the reasons dabow chooses to share; and whether you can limit this sharing.

Reasons we can share your personal information

Does dabow   share?

Can you limit this sharing?

For our everyday business purposes — such as to process your transactions, maintain your account(s), respond to court orders and legal investigations, or report to credit bureaus

Yes

No

For our marketing purposes — to offer our products and services to you

No

No

For joint marketing with other financial companies

No

We don't share.

For our affiliates’ everyday business purposes — information about your transactions and experiences

Yes

No

For our affiliates’ everyday business purposes — information about your creditworthiness

No

We don't share.

For non-affiliates to market to you

No

We don't share.

Questions?

What we do

How does dabow  protect my personal information?

To protect your personal information from unauthorized access and use, we use security measures that comply with federal law. These measures include computer safeguards and secured files and buildings.

We hold our employees to strict standards of conduct to ensure the confidentiality of customer information, and we require companies that we do business with to protect your information.

How does dabow collect my personal information?

We collect your personal information, for example, when you:

  • Open an merchant account
  • Pay your bills
  • Use your credit or debit card to make payment on your account or purchase supplies

We also collect your personal information from others, such as credit bureaus, affiliates, or other companies.

Why can’t I limit all sharing?

Federal law gives you the right to limit only:

  • Sharing for affiliates’ everyday business purposes—information about your creditworthiness
  • Affiliates from using your information to market to you
  • Sharing for non-affiliates to market to you
  • We only utilize the information needed to conduct the business of your merchant account on your behalf. Without it we would not be able to serve you adequately.

State laws and individual companies may give you additional rights to limit sharing.

 

Definitions

Affiliates

Companies related by common ownership or control. They can be financial and nonfinancial companies, such as POS equipment, paper supplies etc.

Non-affiliates

Companies not related by common ownership or control. They can be financial and nonfinancial companies.

  • dabow   does not share with non-affiliates so they can market to you

Joint Marketing

A formal agreement between nonaffiliated financial companies that together market financial products or services to you.

  • dabow does not jointly market
Image

Tips

PREVENT IDENTITY THEFT

PREVENT IDENTITY THEFT

  • Keep your personal information private and secure. If you are being asked to provide your personal information, make sure you know you are communicating with someone you know to be valid.  Use a shredder to destroy any personal documents that are no longer useful.
  • Place passwords on your credit card, bank, and phone accounts. Avoid using easily available information such as your birth date, your Social Security number or your phone number.
  • Do not give out personal information over the phone, through the mail, or on the Internet unless you initiated the contact or you are certain you are communicating with someone you know to be valid.
  • Deposit your outgoing mail in post office collection boxes or at your local post office. If you're planning to be away from home and can't pick up your mail, call the U.S. Postal Service at 800.275.8777 to request a vacation hold.
  • To obstruct identity thieves who may pick through your trash or recycling bins to capture your personal information, tear or shred any documents that contain your personal information. To opt out of receiving offers of credit in the mail, call: 888.5.OPTOUT  / 888.567.8688.
  • When going out, carry only the identification information, credit and debit cards that you may actually need.
DEAL WITH IDENTITY THEFT
AVOID PHISHING

The Internet Of Things

Technology is making life easier for all of us every day, and chances are, you are already utilizing products that are considered IoT devices. IoT or the Internet of Things, refers to the collection of devices connected and controlled over the Internet.

"Alexa, turn the air down to 72 degrees"

"Hey Google, add milk to my shopping list"

"Hey Siri, play classical music"

...all will become more familiar everyday commands as more households and businesses alike embrace IoT. Recent estimates project the number of Internet connected devices to reach 26 billion by 2020, with some studies suggesting an even higher adoption.

It is exciting to experience these innovative products but there is always the need to be aware of the security risks associated with any internet-connected device.

What are some items that make up the Internet of Things?

IoT products are often referred to as "smart" and include mobile phones, cars, refrigerators, coffee makers, televisions, microwave ovens, fitness bands, thermostats, smart watches, webcams, light switches, door locks, door bells, copy machines, digital assistants and medical devices; almost anything that has an on/off switch and connects to the Internet directly or to is controlled by Internet connected devices.

What are the security risks and concerns of using IoT products?

Many popular IoT products, are manufactured with a goal of convenience for the user through the integration of devices and systems, but not always with security top of mind.

Tracking Your Activity

With your smart phone's range of sensors such as GPS, and connectivity options (Cell, Wi-Fi and Bluetooth), your device can potentially monitor your movements and location, throughout the day. Smart assistants have access to your calendar, contacts, purchase history and more to make your life more convenient.

Tracking Your Home

IoT devices such as Smart Thermostats use sensors, real-time weather forecasts, and occupancy detectors to monitor actual activity in your home. As the smart assistants become "smarter" they record requests to improve responses.

Privacy

IoT devices often sense and collect consumer and personal information and share this with other IoT devices. Have you ever had that feeling you were being followed when you received a notification for a product or service that you had not expressed interest in but it seemed to align with your personal preferences? This may be a sign of IoT sharing.

Not Engineered with Security in Mind

Many manufacturers are designing their products with rigorous security standards. Unfortunately, there are others introducing low-cost, quick-to-market IoT-enabled devices with little to no embedded security defense mechanisms, placing your privacy at risk.

How can you protect yourself in this brave new world of the Internet of Things?

Here are some suggestions:

  1. Do not store personal identifying information on any device.
  2. Ensure your home network only allows access to authorized users. If devices are password-protected, switch to a two-step authentication process and create complex passwords (Password 1234 will not work!). For instance, develop a password with a combination of lower and upper case letters, numbers and symbols or a passphrase, movie or song that you can remember easily but that has been adapted to make it difficult to decipher. For example, "The Wizard of Oz" could be re-configured into the password, Th3WZRD!ov0Z. Be sure to use unique complex passwords on each of your devices and change them every other month. Or if your home network is capable of creating a secure "Guest" wireless network, attach IoT devices to the Guest wireless instead.
  3. Most hacks occur via WiFi or wireless networking, and unsecured WiFi systems are among the easiest to access. The first line of defense against unauthorized access is to make it difficult to gain entry to your network. Again, good password hygiene is imperative.
  4. IoT products from a reputable manufacturer. Thoroughly research any IoT devices you are planning to purchase to determine if the manufacturer conducted comprehensive security testing. Publications such as Consumer Reports often provide detailed reviews of these types of products.
  5. As a consumer, make a point to conduct research and review user agreements (and other fine print), and consent to IoT updates or purchases only when you feel confident in their security. Find out what information is gathered and stored by your device as well as how the manufacturer uses the information. Privacy principles dictate that users should be able to keep control of their data as well as to be able to opt out of the "smart" environment without incurring negative consequences.
  6. Your smart phone is often the device used to manage other IoT devices, opening up an avenue for hackers to gain entrance to your home. Keep your smart phone protected with a strong and unique password that is separate from your internet passwords. Also, install smart phone software updates when they become available.
  7. Use and update anti-virus and anti-malware software on all of your Internet connected devices.

The Internet of Things will never be completely safe; but neither is the world outside of the Internet. Just as you take proper precautions to ensure your house is entirely secure against theft, employ the same types of best practices to defend against a potential data breach.

These helpful tips are provided by Digital Defense, Inc., a computer security company to help insure the privacy and security of our nation's financial information.

Image
Sherri Williams
Sherri WilliamsPresident
Questions about our Privacy, Security or Services, Please contact: Sherri Williams, ETA CPP E-Mail: Sherri@dabowpay.com Phone: 972-542-1297 Toll Free: 866-481-1110 Fax: 469-202-7537
© 2019 Dabow of North Texas LLC . All Rights Reserved. Contact Us: Phone: 866-481-1110 E-Mail: Sales@dabowpay.com
Website Produced by
Back Lot Productions & Promotions