Tradition Capital Bank will be closing at 2:00pm on December 24th in observance of Christmas Eve. Please note the impacted processing cutoff times for December 24th - ACH Origination and Wire Origination is 12:00pm CST; Remote Deposits is 1:00pm CST. The bank is closed on Christmas Day.
Please read the following and click on the OK button to proceed.
Use of this website is at your own risk. Tradition Capital Bank is not liable for any damages that arise from use or access to this site. While we’ve done our best to provide accurate and complete information, we make no warranties about the accuracy of information contained on the site. Unauthorized use of this site and any of its features is prohibited and misuse constitutes criminal activity that is punishable by law.
For any questions regarding this policy, contact us:
Tradition Capital Bank | Attn: Privacy
7601 France Ave S, Suite 140 | Edina, MN 55435
Or email us at: privacystatement@tradition.bank
Phone (952) 806-6600 | Fax (952) 806-6699
The Fair Credit Reporting Act (FCRA) provides consumers the opportunity to “opt out,” which prevents the four major credit bureaus (TransUnion, Experian, Equifax and Innovis) from providing information about you to companies for the purpose of providing you with pre-approved offers of credit or insurance.
If you do not want to receive such offers, you may opt out by visiting www.optoutprescreen.com. You will have the option of opting out for five years, permanently, or the option to opt back in again.
You will be informed that it can take up to five business days to become effective. You will also be warned that companies may have already received your information and have mailed their offer, and it may take several months to stop receiving these types of offers.
Important information about opening a new business account. Effective May 11, 2018.
View PDFCriminals are constantly trying to steal consumers’ personal data using fake emails, websites, phone calls, and even text messages. They use a variety of ways to try to trick people into providing Social Security numbers, bank account numbers, and other valuable information. In many cases, their goal is to steal money from you. This article defines some terms used for different online scams and how they work, so you can protect your money.
How do scammers contact their victims?
Phishing is a term for scams commonly used when a criminal uses email to ask you to provide personal financial information. The sender pretends to be from a bank, a retail store, or government agency and makes the email appear legitimate. Criminals often try to threaten, even frighten people by stating “you’re a victim of fraud” or some other urgent-sounding message to trick you into providing information without thinking. Don’t do it.
Smishing is similar to phishing, but instead of using email, the criminal uses text messaging to reach you. Same idea, they pretend they are from an organization you might know and trust (such as a bank or the IRS) and try to get your personal information.
Vishing, similar to phishing and smishing, is when scammers use phone services such as a live phone call, a “robocall,” or a voicemail to try to trick you into providing personal information by sounding like a legitimate business or government official.
What are the different types of scams?
Government Impostor Scams are when fraudsters pretend to be an employee of the FDIC or other government agency, sometimes even using the names of real people. The March 2020 FDIC Consumer News issue has more on how to avoid being scammed by government impostors.
Remember, the FDIC does not send unsolicited correspondence asking for money or sensitive personal information, and we’ll never threaten you. Also, no government agency will ever demand that you pay by gift card, wiring money, or digital currency. The FDIC would never contact you asking for personal details, such as bank account information, credit and debit card numbers, social security numbers, or passwords.
Lotteries and Sudden Riches Scams are when you are told that you won a lottery, perhaps in a foreign country, or that you are entitled to receive an inheritance. You are told that in order to “claim” the lottery winnings or inheritance, you must pay “taxes and fees.” A fake cashier’s check might be sent to you, which the scammer asks you to cash and then wire back the funds to cover the taxes and fees. They disappear with your funds and you get nothing but taken advantage of by the criminal when the check is found to be fraudulent and your bank holds you responsible for the loss.
Online Auctions, Classified Listing Sites, and Overpayment Scams involve an online auction or classified listing site. The scammer offers to buy an item for sale, pay for a service in advance, or rent an apartment. The clue that it is a scam is that they send you a cashier’s check for an amount that is higher than your asking price. When you bring this to their attention, they will apologize for the oversight and ask you to quickly return the extra funds. The scammer’s motive is to get you to cash or deposit the check and send back legitimate money before you or your bank realize that the check you deposited is fake.
Grandparent Scams happen when a fraudster hacks into someone’s email account and sends out fake emails to friends and relatives, perhaps claiming that the real account owner is stranded abroad and might need your credit card information to return home. If you receive such an email, make sure you contact the sender through other means before sending any money or personal information.
Secret or Mystery Shopper Employment Scams involve fake advertisements for job opportunities that claim to be “hiring” people to work from home. As the potential new “employee,” you might receive an official check as a starting bonus, and are asked to cover the cost of “account activation.” The scammer hopes to receive these funds before the official check clears and you realize you have been scammed. Another scenario involves an offer to work from home as a secret shopper to “assess the quality” of local money transfer businesses. You are sent a cashier’s check and instructed to deposit it into your bank account and withdraw the amount in cash. You are then instructed to use a local money transfer business to send the funds back to the “employer” and “evaluate” the service provided by the money transfer business.
Be sure to read the FDIC Consumer News on check fraud to learn more about scams involving checks. FDIC Consumer News: Beware of Fake Checks.
How can I avoid scams?
Be suspicious if someone contacts you unexpectedly online and asks for your personal information. It doesn’t matter how legitimate the email or website may look. Only open emails, respond to text messages, voice mails, or callers that are from people or organizations you know, and even then, be cautious if they look questionable.
If you think an email, text message, or pop-up box might be legitimate, you should still verify it before providing personal information. If you want to check something out, independently contact the supposed source (perhaps a bank or organization) by using an email address or telephone number that you know is valid, such as from their website or a bank statement.
Be especially wary of emails or websites that have typos or other obvious mistakes.
Additional Resources:
FDIC Video: FDICExplains: Phishing
Federal Trade Commission (FTC)
FTC: How to Recognize and Report Spam Text Messages
FTC: How to Recognize and Avoid Phishing Scams
FTC: How to Spot, Avoid and Report Fake Check Scams
FTC: Grandparent scams in the age of Coronavirus
Consumer Financial Protection Bureau (CFPB): Impostor Scams
Internet threats have changed significantly over the past several years. At Tradition Capital Bank, we have security measures in place to protect your account information. These security measures can’t be effective without your help and cooperation. Here are some precautions you can take to help safeguard your personal information from identity theft and account fraud.
Additional Tips for Business Online Banking
You are important to us and it is our goal to help prevent identity theft and account fraud from happening to you. If you experience any security-related events or notice suspicious activity within your accounts at our bank, contact us immediately. We will assist you in the investigation and guide you in necessary steps to handle these types of issues.
Cyber thieves are getting bolder every day and the level of sophistication has drastically increased. Business email compromise (BEC), also known as email account compromise (EAC) is one of the most common scams affecting businesses, and one of the most financially damaging online crimes.
Carried out by transnational criminal organizations that employ lawyers, linguists, hackers, and social engineers, BEC can take a variety of forms. But in just about every case, the scammers target employees with access to company finances and trick them into making Electronic Funds Transfers (EFT’s) to bank accounts thought to belong to trusted partners—except the money ends up in accounts controlled by the criminals. The perpetrators are so practiced at their craft that the deception is often difficult to uncover until it is too late.
How Criminals Carry Out BEC Scams
How to Protect Yourself
For further information and additional resources on BEC, visit www.FBI.gov.
What are the risk associated with mobile device apps?
Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar inputs, call logs, and location data—from your device. Apps may gather this information for legitimate purposes—for example, a ride-share app will need your location data in order to pick you up. However, you should be aware that app developers will have access to this information and may share it with third parties, such as companies who develop targeted ads based on your location and interests.
How can you avoid malicious apps and limit the information apps collect about you?
What additional steps can you take to secure data on your mobile devices?
For further information please visit www.cisa.gov