Skip Navigation Documents in Portable Document Format (.PDF) require Adobe Acrobat Reader 5.0 or higher to view. Download it now.

Consumer Privacy Policy

Through our everyday operations, Northstar Bank compiles and maintains confidential information on our customers. It is the policy of Northstar Bank to protect the privacy of this information by maintaining physical, electronic and procedural safeguards that comply with federal standards.

Northstar Bank takes your privacy very seriously. Please read the following to learn more about our Privacy Policy. This policy details how Northstar Bank receives, collects and uses information in connection with our website located at northstarathome.com.

The Privacy Policy can be viewed with Adobe Acrobat Reader.

View Northstar Bank's Consumer Privacy Policy (PDF). 


Northstar Bank Online Privacy Statement

Introduction

At Northstar Bank, we understand the importance of protecting your privacy and confidentiality. This Online Privacy Statement provides a summary of our online privacy practices, covering the online collection, use and disclosure of information collected from visitors to our online services. This includes but is not limited to: www.northstarathome.com and the Northstar Bank app. In addition, you may be subject to other contractual terms in accordance with products you select and their related service agreements. Our statement does not govern web sites of other parties to which we may provide links. If you choose to link to a web site not controlled by us, we recommend that you review the privacy and security policies of these companies.

Collecting Information

We may collect both "Customer Information" and "Aggregate Customer Information" from visitors to our online services. The term "Customer Information" means information that can identify or be traced back to a specific customer. The term "Aggregate Customer Information" is a compilation of information that does not identify a specific customer, such as date and time of visit, IP addresses, demographic information, web site pages visited, or the browser used. Customer information collected may include data such as name, address, email address, phone number, Social Security number, date of birth, driver's license, employer and account data.

Online Banking App

To ensure that our customers receive the best service possible when using the Northstar Bank app, some additional permissions may be required. Our app is intended for Northstar Bank customers only.

  • Our Online Banking app may allow access to the device’s camera to utilize Mobile Remote Deposit, with user’s permission.
  • Our Online Banking app may allow access to the device’s location for maps purposes, with user’s permission.
  • Our Online Banking app may allow access to the device’s files/media to utilize Secure Message Attachments, with user’s permission.
  • Our Online Banking app may allow access to the device’s contacts to facilitate Person-to-Person payments/recipients list, with user’s permission.

Website Technology

In an effort to provide our customers the finest online experience, Northstar Bank is constantly reviewing and incorporating the latest changes in internet technology. However, Northstar Bank does not automatically collect personal information from visitors to its web sites. Various tools and techniques are used to gather and analyze web site visits and sessions. When you use our Online Services, we may use “cookies” or other unique identifiers to monitor your experience. Cookies are electronic files recorded by your browser that keep track of your preferences on your device during your web site visits. We use cookies to record information on customer visits and use of our web site to administer and improve our site. We do not use cookies to store or transmit any personal identifying information. Temporary "session" cookies are also utilized to facilitate customer navigation within our site during each visit. Session cookies are deleted once you close your Internet browser. We may also use "persistent" cookies that are retained on your device after your visit ends (until you delete them manually or your browser deletes them based on the duration period contained within the persistent cookie’s file) so we can identity your preferences and enhance your next visit to our web site. In addition, cookies help us monitor Internet traffic from third-party web sites to our own as well as the most frequently used areas of our web sites or for reviewing the duration of the visit. We may provide this type of Aggregate Information to non-affiliated application service providers that compile statistical data or other information for us. This feedback and analysis allow us to continually update our web site. At your discretion, you can block cookies by changing the settings on your Internet browser or using software programs specifically designed to block cookies. You should be aware that by blocking cookies or using certain security software settings that these actions may prevent you from logging onto your accounts or limit your online activities.

In addition to cookies, we may also use other technology such as "pixel tags," "clear GIFs" or similar tools. A Pixel Tag is an electronic image, often a single-pixel (1x1), which is ordinarily not visible to visitors and may be used with cookies. Clear GIF (Graphics Interchange Format) is a type of picture file used on the internet with certain special characteristics which make it more useful than JPEG or other picture file formats in certain circumstances. Their use is common because they are invisible and very small, so they do not affect the download speed of a web page. These tools can be used to collect data, like cookies, regarding your operating system, browser, screen resolution and other technical information, as well as navigation and session information. This information is anonymous and does not include identifiable customer or personal information. Again, this data is used to continually improve our site and your visits.

Customer Information

We use information provided by customers and visitors accessing our online services (such as applying for a product or service, opening accounts, requesting information, assisting in completing transactions, or for employment inquiries and applications) while staying in line with our disclosures and agreements. We may aggregate individual visitor or customer information for further analysis.

We may disclose customer and visitor information, as permitted by law, and: (1) consistent with our privacy notices and other account disclosures; (2) to comply with applicable laws; (3) to respond to governmental inquiries or requests; (4) to comply with legal processes; (5) for security purposes and to protect our customers, online services, brand, or other Northstar Bank legal interests.

eMail

Unless explicitly stated, email is not secure. We recommend that you do not send any confidential information through email. If you send email to us, we may retain the contents of your email message, your email address and our response. Under various Federal and State laws and regulations, customers and visitors may choose not to receive promotional emails from us by following the "unsubscribe" or "remove" instructions in the specific email from which they wish to opt-out. Even if you opt-out of receiving promotional emails from us, you may still receive transactional messages regarding your account.

Children's Online Privacy Protection Act Information

This website is not directed to children under age 13. We do not market to children, nor do we knowingly collect or retain personally identifiable information from children. If you are under 13, please do not enter your personal information. For more information about the Children’s Online Privacy Protection Act (COPPA), visit the Federal Trade Commission web site.

Security Practices

We continually review our security safeguards in order to protect customer and visitor information that we gather, transmit, and store in connection with our online services (e.g. opening an account, applying for a loan, etc.). We will never ask for personal identifiable information or login/password information in an email. Also, never click on an unverified link in an email. Many scams and threats arise within online environments. It is important to continually educate yourself on the latest events and keep your device, operating system and software up-to-date.

Online Planning Tools

We make several planning tools, such as mortgage and savings calculators, available to help you manage your financial plans. We do not currently store information that you enter into one of these planning tools or calculators. We do not represent the accuracy and use of these tools and you should independently verify the results.

Free Advice

Information on this site is gathered from what we believe are reliable sources, they are methods and tools to help you manage your finances. It is not guaranteed to be accurate, does not purport to be complete, and is not intended to be used as a sole basis for financial or investment decisions. Northstar Bank does not offer legal or tax advice. Please consult the appropriate professional regarding your own individual circumstances.

How to Contact Us

If you have any questions or concerns about our collection, use or disclosure of your personal information, please contact us using the contact form provided. Alternatively, you may call us at 866.269.8077.

Policy Changes

We reserve the right to change or amend this Online Privacy Statement at any time. Changes will be effective as of posting to the web site.

Click here to get Adobe Acrobat Reader


HOW YOU CAN PROTECT YOURSELF OR YOUR BUSINESS

Knowledge is protection. NORTHSTAR BANK is committed to helping you prevent fraud by raising awareness and sharing best practices.

Common scams:


Account Takeover Fraud

Account takeover happens when a fraudster poses as a Northstar Bank representative to get your personal or account information. Once the fraudster has access to your account, they can make unauthorized transactions. 

How you can best prevent account takeover fraud:

  1. If someone posing as Northstar Bank contacts you by phone, eMail, or text message and wants you to share your account information, consider it fraud.
  2. If you receive a text or eMail asking for account information, do not reply. Ignore the message and do not call any phone numbers listed.
  3. If you receive a phone call that seems to be a phishing attempt, simply end the call. Be aware that area codes can be misleading: a local area code does not always guarantee the caller is local. 

Fake Checks

Millions of consumers are being tricked into accepting genuine-looking checks and money orders and wiring money to fraudsters. Here are two examples:

  1. Sweepstake, lottery and grant fraud. Individual receives a check or money order with instructions to wire a portion to pay taxes or administrative fees.
  2. Overpayment. Scammer sends a check or money order for more than the amount for something the individual has for sale, with instructions to wire the extra to someone for shipping.


Identity Theft

Identity theft occurs when someone uses your address, name, Social Security number, credit card information, bank account number or other personal information without your knowledge to commit fraud or other crimes. With your personal information in their possession, identity thieves can establish credit, purchase items or borrow money in your name.

Your best protection:

  1. Never give out your personal or account information that is requested over the phone, mail or Internet unless you initiated the contact.
  2. Do not carry your social security number with you.
  3. Shred confidential papers. If you don’t have a shredder, ask for dates and times of our (free) community shred days.
  4. Check your credit report at least once a year.
  5. Reduce the circulation of your information through the mail by stopping to receive prescreened credit offers by calling 1-888-5OPTOUT.


Keystroke logging / Keylogging

Keystroke logging (often called keylogging) is the action of tracking/logging the keys struck on a keyboard. Keyloggers are “Trojan” software programs that target your computer’s operating system and are installed via a virus. The fraudster can steal your user ID and password and anything else you have typed while online.


Malware (Malicious Software)

Malware (malicious software) is software that is designed to infiltrate or damage a computer system without the owner's knowledge or consent. This software is used to steal personal information and illegally obtain funds. Common forms include: Keystroke Loggers and Trojan Horses.


Pharming

Pharming redirects legitimate domain name requests to fraudulent websites, where users get prompted to enter personal data, such as passwords or credit card numbers. Similar to phishing, fraudulent sites are often made to look like legitimate ones. What differentiates pharming from phishing scams is that the fraudster does not have to rely on having the user follow a link in an email. Even if the user correctly enters a website address into a browser's address bar, the fraudster can still redirect the user to a fraudulent website.


Phishing

Fraudulent E-mails can often appear to come from a reputable source – this is called spoofing/phishing because the sender's true identity is concealed. Never click on a link in a suspicious e-mail message. The fraudulent e-mails request you to access a website and validate or confirm your personal information. These websites appear to be genuine and may ask you to provide personal information. The site may even direct you to call a provided phone number to verify account information.

It may not always be easy to recognize fraud emails or pop-ups but the following are some precautions to be aware of:

  • Urgent Emails
    Watch out for e-mails with links, attachments or pop-ups that state an urgent reply is needed.
  • General Greetings
    Watch out for e-mails or pop-ups that provide a general greeting and don't identify you by name.
  • Typos and Errors
    Fraudulent e-mails or pop-ups may have typographical or grammatical errors. Watch out for poor visual and design quality.


Caller ID Spoofing

Caller ID spoofing occurs when a scammer deliberately falsifies the information transmitted to your caller ID display to disguise their identity and make you think the call is coming from a trusted source.  For more information, best practices on how to protect yourself or if you think you have been a victim of a Caller ID spoofing scam, you can file a complaint with the Federal Communications Commission.

 

Social Networking Risks

Online social networking can be a great way to exchange ideas, information, photos and games. However, the more information you provide about yourself, the easier it is for people to use these details to commit fraud.

Your best protection:

Do not reveal too much information on your social networking and only share your page with people you know.


Prevention Tips:

Your Best Protection to Prevent Online Fraud from Happening to you.

  • Use anti-virus and anti-spyware, as well as a firewall, and keep the software updated.
  • Only use a secure wireless network to conduct your banking. If you have a wireless router at home or work, ensure it is locked.
  • Businesses should perform a risk assessment and controls evaluation periodically.
  • Never follow a link in an email message that asks you to provide sensitive personal or financial information.
  • Never share your internet banking passwords.
  • Never give out your personal or account information that is requested over the phone, mail or Internet unless you initiated the contact
  • Frequently monitor your account activity – we recommend daily monitoring.
  • Reconcile all accounts and statements quickly.
  • Never send your personal information via unsecured email.
  • Only use your credit card number on Internet sites that have a secure, encrypted system (look for the "HTTPS" in the address line or lock icon).
  • Choose passwords and PINs that are difficult to guess, do not write them down and change them – we recommend to change them every 30-60 days.
  • When you have completed a bank transaction, be sure to properly log out instead of just closing the browser window.
  • When your computer is not in use, disconnect it from the Internet.
  • Stay informed.
  • Use a dedicated PC for conducting financial transactions. Turn it off when you’re done using it. No e-mail, Internet surfing or other applications on this PC. Segregate the PC from the business network.
  • Purchase insurance to reduce the risk of loss should fraud occur.
  • Businesses should use dual control. If you use our Online Cash Management to originate ACH files, establish procedures that require one individual to input the ACH file information and a different individual to verify, authorize and send the file to NORTHSTAR BANK.


HOW NORTHSTAR BANK PROTECTS YOU OR YOUR BUSINESS

Multi-factor Authentication

To ensure we offer the highest level of security for our internet banking customers, we have an additional layer of security to our log in process. At initial internet banking log in, you will select three challenge questions. If you log in to a computer or device that does not recognize you, you will be prompted to answer one of the questions to ensure your identity.


Provent

Take action to protect your personal and financial information and reduce your chances of identity theft with Deluxe Provent ® an integrated suite of identity theft protection services that provides identity theft protection on all fronts, including: Prevention, Detection and Restoration.

Click here to enroll.


Q-Cards/eAlerts

Q-Cards/eAlerts notify you of account activity by sending you an e-mail when certain criteria is met. You can be notified when your account balance goes above or below a pre-determined amount you set.

Internet Banking > Other Services tab > Q-Cards tab


Regulation E

The main objective of regulation E is to protect our customers who engage in electronic fund transfers (EFTs). When you opted-in, this was a way for us to identify that you approved NORTHSTAR BANK to authorize and pay overdrafts and assess fees. 

Any account that enters into and EFT agreement, whether that agreement is between you and NORTHSTAR BANK or you and a third party (for pre-authorized debits or credits) is covered by regulation E. EFT transactions include:

  • ATM deposits/withdrawals
  • Any transfer of funds initiated through an electronic terminal, telephone or computer.
  • Transfers sent via ACH (i.e. social security direct deposits, payroll direct deposits).
  • Transfers from an account authorized by the use of debit card information, even if no electronic terminal is used in the transaction.
  • Transfers via ACH where a consumer has provided a check to enable the merchant or payee to capture the routing number, account number and serial number to initiate the transfer.
  • Payments made by a bill payer under a bill payment service available to a consumer via computer or other electronic means. (Unless the terms of the bill payer service specifically state payments are made by check, draft or similar paper instrument.)


SSL Technology

We use proven technology and established procedures for keeping your information secure. Whenever we ask for personal information on our website or internet banking we use Secure Socket Layer (SSL) technology to keep it confidential.


User IDs and Passwords

In order to access your accounts online you must enter a unique user login ID and password. We strongly recommend that you choose a password that you can remember (without writing it down) but does not use information that can be easily guessed by someone. Avoid the use of birthdays, children's names, pet names, etc. The best password is one that is a random combination of 7-10 characters and contains numeric, alphabetic and special characters. Do not reveal your user login ID or password to anyone and change your password every 30-60 days.


WHAT IF SOMETHING IS SUSPICIOUS?

NORTHSTAR BANK may contact you to review general banking or account information, but we will never randomly contact you (via phone, text, letter or e-mail) asking for your personal account information.

Please immediately contact your local NORTHSTAR BANK office if you notice suspicious account activity.

Steps You Should Take if you are a Victim:

  1. Contact your local NORTHSTAR BANK branch or any of your financial institutions.
    Colby Green, VP - Lenox Branch Manager / Community Engagement Officer 586.727.8842
    Lori Kociba, Ubly Accounts Specialist 989.658.2180
    Christine McNabb, AVP - St. Clair Branch Manager 810.329.6364 
    Sandy Schultz, AVP - Fort Gratiot Branch Manager 810.488.8083
    Marie Stafford, Bad Axe & Pigeon Branch Manager 989.269-3599
    Chantal Tran, Ann Arbor Accounts Specialist 734.527.4116
    Joe Turner, AVP - Akron & Caro Branch Manager 989.673.1100
    Amber Voigt, AVP - Algonac Branch Manager 810.794.8230

  2. Cancel all credit/debit/ATM cards immediately – keep all toll-free numbers, along with account numbers, in a safe place where you can find them easily.

  3. File a police report immediately, in the jurisdiction in which your identification was stolen. This shows credit providers you were diligent and it is a first step toward an investigation.

  4. File a complaint with the Federal Trade Commission or contact the FTC's identity theft hotline at 877-ID THEFT / 877.438.4338.


ADDITIONAL RESOURCES

American Bankers Association - Protect Yourself and Your Money

Federal Deposit Insurance Corporation (FDIC) - Cybersecurity

Federal Deposit Insurance Corporation (FDIC) - Consumer Protection

Federal Deposit Insurance Corporation (FDIC) - Consumer Assistance Topics

Federal Trade Commission - Bureau of Consumer Protection

Federal Trade Commission - Protecting Personal Information: A Guide for Business

Northstar Bank. Guiding the Way.

Find Us

We have locations all across Michigan, so stop in and visit us.

Our locations

Contact Us

If you have any questions at all, feel free to contact us, we're here to help.

Message us