Customer Awareness Program

Internet Banking & Customer Awareness Program

The purpose of the Alma Bank ("the Bank") Internet Banking & Customer Awareness Program ("the Program") is to educate our business and commercial client Internet banking customers and ensure that these customers are aware of the risks of using Internet Banking and the appropriate safeguards to take.

The Program will inform and remind customers of the importance of security measures that can protect them from being victims of fraud. Specifically, the Program will address the importance of password security, using unique user accounts, and ensuring that customer computer systems used for Internet Banking have security software, such as firewalls, and updated anti-virus protection.

The Program will include education about security threats, provide information to help customers increase and maintain password security by enforcing a strong password requirement and periodic password changes.

The Bank strongly believes that public awareness of Internet banking risks and how to avoid them is the strongest weapon in the defense against customer monetary losses.

Regulatory References

On June 28, 2011, the FFIEC (Federal Financial Institutions Examination Council) issued a supplement to the Authentication in an Internet Banking Environment guidance released in October 2005. The purpose of the supplement is to reinforce the guidance's risk management framework and update the FFIEC member agencies expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online banking environment. The member agencies include the FRB, FDIC, NCUA, OCC and CFRB. 

The Program is in accordance with the originally issued Authentication in an Internet Banking Environment guidance and the supplement and any subsequent updates along with the New York State Department of Financial Service regulation 23NYCRR Part 500 pertaining to Cyber Security.

The Program

1. Alma Bank Contact Information

You are protected in a variety of ways when you use Internet Banking; however it is important to contact Alma Bank in the event you that your company's online access has been compromised. Also, report any unauthorized or unexpected transactions immediately.

Your account is protected against fraudulent transactions in a number of ways, so monitor your account balances and transactions frequently. If you want to report suspicious activity in your account(s), or if you have questions about the security of your account(s), you can call us at: 1-866-424-8229 or .

The security of your company's money and identity is as important to us as it is to you. Let's work together to protect it.

2. Unsolicited Customer Contact

Alma Bank will never contact customers on an unsolicited basis to request their security logon credentials, such as, the combination of the client's username and password. If you receive a request of this type, do not respond to it. Please call us immediately at 1-855-541-1000 or to report any activity of this nature.

Alma Bank will only contact its clients regarding online banking activity on an unsolicited basis for the following reasons:

  • Suspected fraudulent activity on your account
  • Inactive/dormant account
  • To notify you of a change or disruption in service or
  • To confirm changes submitted to your online banking profile

If you receive an unsolicited contact from an Alma Bank team member for any reason not cited above, your identity will be confirmed through a series of security questions and you will always have the option of hanging up and calling Alma Bank to confirm the validity of our request. Remember, Alma Bank will never ask for your logon security credentials.

3. Self Assessment

Internet Banking Business and Commercial customers are strongly encouraged to perform an annual Self-Assessment focusing on their online banking practices and network security. A Self-Assessment will evaluate whether the client has implemented sound business practices to address the 5 (five) key principles outlined in the Securing Your Business section below.

4. Securing Your Business

Is your company keeping information secure?

Are you taking steps to protect sensitive information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on 5 key principles:

  • Take stock: Know the nature and scope of the sensitive information contained in your files and on your computers.
  • Scale down: Keep only what you need for your business.
  • Lock it: Protect the information in your care.
  • Pitch it: Properly dispose of what you no longer need.
  • Plan ahead: Create a plan to respond to security incidents.

The following information is provided by the Federal Trade Commission, Bureau of Consumer Protection.

5. Take Stock

Know the nature and scope of the sensitive information contained in your files and on your computers.

  • Take inventory of all file storage and electronic equipment. Where does your company store sensitive data?
  • Talk with your employees and outside service providers to determine who sends sensitive information to your business, and how it is sent.
  • Consider all of the methods with which you collect sensitive information from customers, and what kind of information you collect.
  • Review where you keep the information you collect, and who has access to it.

6. Scale Down

Keep only what you need for your business.

  • Use Social Security numbers only for required and lawful purposes. Don't use SSNs as employee identifiers or customer locators.
  • Keep customer credit card information only if you have a business need for it.
  • Review the forms you use to gather data — like credit applications and fill-in-the-blank web screens for potential customers — and revise them to eliminate requests for information you don't need.
  • Change the default settings on your software that reads customers' credit cards. Don't keep information you don't need.
  • Truncate the account information on any electronically printed credit and debit card receipts that you give your customers. You may include no more than the last five digits of the card number, and you must delete the card's expiration date.
  • Develop a written records retention policy, especially if you must keep information for business reasons or to comply with the law.

7. Lock It

Protect the information that you keep.

  • Put documents and other materials containing sensitive information in a locked room or file cabinet.
  • Remind employees to put files away, log off their computers, and lock their file cabinets and office doors at the end of the day.
  • Implement appropriate access controls for your building.
  • Encrypt sensitive information if you must send it over public networks.
  • Regularly run up-to-date anti-virus and anti-spyware programs on individual computers.
  • Require employees to use strong passwords.
  • Caution employees against transmitting personal information via email.
  • Create security policies for laptops used both within your office, and while traveling.
  • Use a firewall to protect your computers and your network.
  • Set "access controls" to allow only trusted employees with a legitimate business need to access the network.
  • Monitor incoming Internet traffic for signs of security breaches.
  • Check references and do background checks before hiring employees who will have access to sensitive data.
  • Create procedures to ensure workers who leave your organization no longer have access to sensitive information.
  • Educate employees about how to avoid Phishing and phone pretexting scams.

8. Pitch It

Properly dispose of what you no longer need.

  • Create and implement information disposal practices.
  • Dispose of paper records by shredding, burning, or pulverizing them.
  • Defeat "dumpster divers" by encouraging your staff to separate the information that is safe to trash from sensitive data that needs to be discarded with care.
  • Make shredders available throughout the workplace, including next to the photocopier.
  • Use a "wipe" utility programs when disposing of old computers and portable storage devices.
  • Give business travelers and employees who work from home a list of procedures for disposing of sensitive documents, old computers, and portable devices.

10. Plan Ahead

Create a plan for responding to security incidents.

  • Create a plan to respond to security incidents, and designate a response team led by a senior staff person(s).
  • Draft contingency plans for how your business will respond to different kinds of security incidents. Some threats may come out of left field; others — a lost laptop or a hack attack, to name just two — are unfortunate, but foreseeable.
  • Investigate security incidents immediately.
  • Create a list of who to notify — inside or outside your organization — in the event of a security breach.
  • Immediately disconnect a compromised computer from the Internet.

11. Email Risk

Phishing is an email scam used to steal your personal information. Email may appear in your inbox, claiming to be from your financial institution or another source. It may appear authentic but be careful - any email requesting personal information or to "verify" account information is usually a scam. Do not respond to this type of email and do not click on any link in/from this email.

How to spot Phishing and other email scams:

  • Any email requesting personal information, or asking you to verify an account, is usually a scam, even if it looks authentic.
  • The email may ask you to change vendor payment information (e.g. wire instructions to a new correspondent bank).
  • The email may instruct you to click on a link, or call a phone number to update your account or even claim a prize, such as a sweepstakes or lottery.
  • The message will often threaten a dire consequence if you don't respond immediately, such as closing your account.

Example IRS Image

Follow these steps to avoid email scams:

  • Never respond to any email asking for confidential information, even if it appears urgent. Chances are it is a fraudulent email.
  • Never click on a link from an unknown email. Instead, type the known Website address for your bank or financial institution into your Internet browser.
  • Do not call any phone number provided in a suspicious email. It could be a fake phone number. Instead, call the phone number listed on the known website address for your bank.
  • Always use anti-virus and anti-spyware software on your computer, and keep them up-to-date.

Remember, email is not a secure form of communication. So feel free to use your email, but don't use it to send or receive confidential information. If you follow the four basic steps listed above, you can protect yourself from most phishing and other email scams.

13. Internet Risks

The Internet is a great place to browse and do business, however it can also be a dangerous place for identity theft if you don't know what to watch for or how to protect yourself. There are several types of malware — which means malicious software — that can infect your computer as you surf the web including:

  • Viruses
  • Spyware/Adware
  • Trojan Horses
  • Keystroke Loggers

These programs are becoming more sophisticated and ingenious in their ability to infect your computer. Many are designed to steal your personal and/or business information. While "surfing" the Internet, follow these steps to protect your computer from the majority of Internet crime:

  • Make sure you have anti-virus and anti-spyware software installed on your computer, keep them up-to-date, and run a full system scan at least weekly.
  • Keep your computer operating system up to date, and your firewall turned on.
  • If you download anything from the Internet such as music, movies, or pictures, make sure you do so only from trusted websites. Downloads can be infected with spyware/adware attached to the file.
  • Watch for signs of spyware—frequent pop-up ads, unexpected icons on your desktop, random error messages or sluggish computer performance are all signs of infection. The pop-up ads (adware) sometimes appear to offer free credit reports or credit scores as part of the scam. Alma Bank does not offer credit scores or credit reports. Run a full system anti-virus and anti-spyware scan to identify and safely remove spyware.
  • Be careful when using public computers to perform any type of personal transactions. Just logging into a website may give away passwords and other private information if spyware has been installed on that computer.

14. Telephone Risks

The telephone is one of the most often used sources for criminal activity. Here's how it works: Your phone rings. The caller claims to be from your financial institution, or any other source. They begin asking questions about you and your bank account information. Other telephone scams claim that you've won a sweepstakes and ask for personal information in order to claim the "prize." These are attempts to obtain account information and/or steal your identity, and it happens to millions of Americans every year. As a general guideline, be highly suspicious anytime you are requested to provide personal information over the phone.

Protect yourself from telephone scams by following these steps:

  • Never offer personal or business related information over the phone without verifying the caller's identity.
  • If you are uncertain of the identity of a caller, hang up and initiate the call yourself using a known phone number.
  • Do not call any phone number received in a voice message or email asking for personal information. It could lead you to a phony answering system.

15. Internet Banking Security

All information within our Internet Banking uses the Secure Socket Layer (SSL) protocol for transferring data. It creates a secure environment for the information being transferred between your computer and Alma Bank. In addition to the security features setup by Alma Bank, here are some tips to protect your information:

  • Never share or give out your Access ID, User Name, Passwords, or Security Challenge Questions and Answers.
  • Do not use personal information as your Access ID, User Name and Password.
  • Create difficult passwords that include letters & numbers and upper and lowercase letters.
  • Change your password frequently.
  • Avoid using public computers to access your Internet Banking.
  • Do not provide any personal information to web sites that do not use encryption or other secure methods of protection.
  • Ensure that your computer is equipped with up to date anti-virus software protection.

16. Commercial Banking Internet Security

In addition to the information provided regarding Internet Banking Security, commercial and small business account holders should institute additional measures in order to further protect their online banking for example:

  • Perform your own annual internal risk assessment and evaluation on all online accounts.
  • Establish internal policies regarding employee internet usage.
  • Ensure all company computers are equipped with up to date anti-virus protection software.

17. What Is Identity Theft?

Identify theft occurs when someone uses your personal information such as your Social Security number, account number or credit number, without your permission, to commit fraud or other crimes. Protect yourself by:

  • Reporting lost or stolen checks or credit cards immediately.
  • NEVER give out any personal information.
  • Shred all documentation that contains confidential information (i.e. bank and credit card statements, bills and invoices that contain personal information, expired credit cards and pay-stubs).
  • Check your credit report annually.

18. Check Your Credit Reports

Any consumer can request one free copy of his or her credit report per year from each of the 3 major credit reporting companies. Reviewing your credit report can help you find out if someone has opened unauthorized financial accounts, or taken out unauthorized loans, in your name. Contact the three major credit companies to request copies of your credit report:

  • Equifax (1-800-685-1111)
  • Experian (1-888-397-3742)
  • TransUnion (1-800-916-8800)

19. What Is an EFT (Electronic Funds Transfer)?

The electronic exchange or transfer of money from one account to another, either within a single financial institution or across multiple institutions initiated through electronic-based systems. The term includes, but is not limited to:

  • Point-of-sale transfers
  • Automated Teller Machine transfers (ATM)
  • Direct deposits or withdrawal of funds
  • Transfers initiated by telephone
  • Transfers resulting from debit card transactions, whether or not initiated through an electronic terminal
  • Transfers initiated through internet banking/bill pay

20. Is Your Account Protected?

Any fraudulent or unauthorized EFTs is protected. For a description on what an EFT is under Regulation E please refer to the section "What is an EFT?" Further information on Regulation E and how it applies to your account at Alma Bank is available here and on our website.

What are the applicable protections provided to consumers under the Act for consumers who use Internet banking and/or bill pay?

If you believe an unauthorized EFT has been made on your account, contact us immediately. If you notify us within two (2) business days after you learn of the unauthorized transaction, the most you can lose is $50. Failure to notify the Alma Bank within two (2) business days may result in additional losses.

22. No Liability Limit

Unlimited loss to a consumer account can occur if:

  • The periodic statement reflects an unauthorized transfer of money from your account, and you fail to report the unauthorized transfer to the Bank within 60 days after we mailed your first statement in which the problem or error appeared.

23. Exclusions From Protection

The term EFT does not include:

  • Checks – Any transfer of funds originated by check, draft or similar paper instrument or any payment made by check, draft or similar paper instrument at an electronic terminal.
  • Check Guarantee or Authorization – Any transfer of funds that guarantees payment or authorizes acceptance of a check, draft or similar paper instrument but does not directly result in a debit or credit to a consumer's account.
  • Wire or other similar transfers – Any transfer of funds through a wire transfer system that is used primarily for transfers between financial institutions or between businesses.
  • Securities and Commodities Transfers – Any transfer of funds for the primary purpose of the purchase or sale of a security or commodity, if the security or commodity is:
  • Regulated by the Securities and Exchange Commission or the Commodity Futures Trading
  • Purchased or sold through a broker-dealer regulated by the Securities and Exchange Commission or through a futures commission merchant regulated by the Commodity Futures Trading Commission.
  • Held in Book-entry form by a Federal Reserve Bank or federal agency.
  • Automatic transfers by account-holding institution – Any transfer of funds under an agreement between a consumer and a financial institution which provides that the institution will initiate individual transfers without a specific request from the consumer:
  • Between a consumer's accounts within the financial institution.
  • From a consumer's account to an account of a member of the consumer's family held in the same financial institution.
  • Between a consumer's account and an account of the financial institution, except that these transfers remain subject to § 205.10(e) regarding compulsory use and sections 915 and 916 of the act regarding civil and criminal liability. (Refer to "Coverage in Detail" section below for a detail explanation of protections provided under Regulation E).

Telephone-initiated transfers - Any transfer of funds that:

  • Is initiated by a telephone communication between a consumer and financial institution making the transfer; and.
  • Does not take place under a telephone bill-payment or other written plan in which periodic or recurring transfers are contemplated.
  • Small institutions. Any preauthorized transfer to or from an account if the assets of the account-holding financial institution were $100 million or less on the preceding December 31. If assets of the account-holding institution subsequently exceed $100 million, the institution's exemption for preauthorized transfers terminates one year from the end of the calendar year in which the assets exceed $100 million. . (Refer to "Coverage in Detail" section below for a detail explanation of protections provided under Regulation E).

24. FDIC – Electronic Funds Transfers (Regulation E)

This law is designed to protect consumers making electronic fund transfers. The term "electronic fund transfer" (EFT) generally refers to a transaction initiated through an electronic terminal, telephone, computer, or magnetic tape that instructs a financial institution either to credit or debit a consumer's asset account.

The Electronic Fund Transfer Act (also known as Regulation E) was issued by the Board of Governors of the Federal Reserve System and adopted in 1978 as an add-on to the Consumer Credit Protection Act. The law and regulation establish the basic rights, liabilities, and responsibilities of consumers who use electronic fund transfer services and of financial institutions that offer these services. For more information, please click here.

Business/Commercial clients are not covered by Regulation E.

As a result, it is critical that business/commercial clients implement sound security practices within their places of business as outlined in this Program to reduce the risk of fraud and unauthorized transactions from occurring. Good practices can keep business/commercial client's information secure.

Corporate Account Takeover is a form of identity theft in which criminals steal your valid online banking credentials. The attacks are usually stealthy and quiet. Malware introduced onto your systems may go undetected for weeks or months. Account-draining transfers using stolen credentials may happen at any time and may go unnoticed depending on the frequency of your account monitoring efforts.

The good news is, if you follow sound business practices, you can protect your company:

  • Use layered system security measures: Create layers of firewalls, anti-malware software and encryption. One layer of security might not be enough. Install robust anti-malware programs on every workstation and laptop. Keep the programs updated.
  • Manage the security of online banking with a single, dedicated computer used exclusively for online banking and cash management. This computer should not be connected to your business network, should not retrieve any email messages, and should not be used for any online purpose except banking.
  • Educate your employees about cyber crimes. Make sure your employees understand that just one infected computer can lead to an account takeover. Make them very conscious of the risk, and teach them to ask the question: "Does this email or phone call make sense?" before they open attachments or provide information.
  • Block access to unnecessary or high-risk websites. Prevent access to any website that features adult entertainment, online gaming, social networking and personal email. Such sites could inject malware into your network.
  • Establish separate user accounts for employees accessing financial information and limit administrative rights. Many malware programs require administrative rights to the workstation and network in order to steal credentials. If your user permissions for online banking include administrative rights, don't use those credentials for day-to-day processing.
  • Use approval tools in cash management to create dual control on payments. Requiring two people to issue a payment — one to set up the transaction and a second to approve the transaction — doubles the chances of stopping a criminal from draining your account.
  • Review or reconcile accounts online daily. The sooner you find suspicious transactions, the sooner the theft can be investigated.

Security Tips

1. Mobile Device Security

  • Configure your device to require a passcode to gain access if this feature is supported in your device.
  • Avoid storing sensitive information. Mobile devices have a high likelihood of being lost or stolen so you should avoid using them to store sensitive information (e.g. passwords, account numbers, etc.). If sensitive data is stored, enable encryption to secure it.
  • Keep your mobile device's software up-to-date. These devices are small computers running software that needs to be updated just as you would update your PC. Use the automatic update option if one is available.
  • Review the privacy policy and data access of any applications (apps) before installing them. Only download apps from trusted app stores (Apple, Google Play).
  • Disable features not actively in use such as Bluetooth, Wi-Fi, and infrared. Set Bluetooth-enabled devices to non-discoverable when Bluetooth is enabled.
  • Delete all information stored on a device before the device changes ownership. Use a "hard factory reset" to permanently erase all content and settings stored on the device.
  • "Sign out" or "Log off' when finished with an app rather than just closing it.
  • Utilize antivirus software where applicable (i.e. Android, Windows, etc.).
  • Do not jailbreak or otherwise circumvent security controls.

2. Online Security

  • Never click on suspicious links in emails, tweets, posts, or online advertising. Links can take you to a different website than their labels indicate. Typing an address in your browser instead of clicking a link in an email is a safer alternative.
  • Only submit sensitive information to websites using encryption to ensure your information is protected as it travels across the Internet. Verify the web address begins with "https://" (the "s" is for secure) rather than just "http://". Some browsers also display a closed padlock.
  • Do not trust sites with certificate warnings or errors. These messages could be caused by your connection being intercepted or the web server misrepresenting its identity.
  • Avoid using public computers or public wireless access points for online banking and other activities involving sensitive information when possible.
  • Always "sign out" or "log off' of password protected websites when finished to prevent unauthorized access. Simply closing the browser window may not actually end your session.
  • Be cautious of unsolicited phone calls, emails, or texts directing you to a website or requesting information.
  • If you download anything from the Internet (such as music, pictures, videos, software, etc.), make sure you download only from a trusted source. Downloaded files can contain harmful threats to your PC, such as viruses, malware, spyware, etc.
  • Make online purchases only from trusted web sites. Research unknown companies before making an initial purchase. The Better Business Bureau is a good resource.

3. General PC Security

  • Maintain active and up-to-date antivirus protection provided by a reputable vendor. Schedule regular scans of your computer in addition to real-time scanning.
  • Update you software frequently to ensure you have the latest security patches. This includes your computer's operating system and other installed software (e.g. web browsers, Adobe Flash Player, Adobe Reader, Java, Microsoft Office, etc.).
  • Automate software updates, when the software supports it, to ensure it's not overlooked.
  • If you suspect your computer is infected with malware, discontinue using it for banking, shopping, or other activities involving sensitive information. Use security software and/or professional help to find and remove malware.
  • Use firewalls on your local network to add another layer of protection for all the devices that connect through the firewall (e.g. PCs, smart phones, and tablets).
  • Require a password to gain access. Log off or lock your computer when not in use.
  • Use a cable lock to physically secure laptops when the device is stored in an untrusted location.
  • Keep your computer's operating system up-to-date with the latest security patches provided by the operating system vendor. Turn on automatic updates and keep your firewall on at all times.
  • Take immediate action if you see signs of spyware on your PC. This includes pop-up ads, icons on your desktop, error messages, sluggish/slow PC performance.

4. Passwords

  • Create a unique password for all the different systems/websites you use. Otherwise, one breach leaves all your accounts vulnerable.
  • Never share your password over the phone, in texts, by email, or in person. If you are asked for your password it's probably a scam.
  • Use unpredictable passwords with a combination of lowercase letters, capital letters, numbers, and special characters.
  • The longer the password, the tougher it is to crack. Use a password with at least 8 characters. Every additional character exponentially strengthens a password. Passphrases are most effective. A passphrase is a short sentence and generally easier to remember.
  • Avoid using obvious passwords such as:
    • Names (your name, family member names, business name, user name, etc.)
    • Dates (birthdays, anniversaries, etc.)
    • Dictionary words
  • Choose a password you can remember without writing it down. If you do choose to write it down, store it in a secure location.

5. Email Security

  • Scrutinize emails carefully before clicking on links or opening attachments in emails, even if they appear to be from someone you know. Many times, these emails will appear to be authentic and claim to be from your bank, credit card Company, or another trusted source. They may ask you to verify information about your account. DO NOT respond to these emails, DO NOT click on links in these emails, and DO NOT open attachments in these emails.
  • Do not call phone numbers provided in a suspicious email. It is likely a "fake" phone number monitored by a criminal. Always contact your bank, credit card Company, or other trusted business using a phone number provided on their published website or other trusted source.
  • Email is not secure, and you should never send an email to your bank that contains confidential information. At Alma Bank, you can send us confidential information electronically as follows:
  • Log in to Internet Banking and click SEND US A SECURE MESSAGE in the upper right corner of the screen.

6. Other Tips

  • Balance your bank account on a monthly basis to ensure all transactions that appear on your account are legitimate. Remember, you only have 60 days after receiving your statement to report and recover unauthorized charges on your account.
  • Sign up for text message balance alerts to receive your account balance on a daily or weekly basis automatically.
  • Sign up for Internet banking so you can check your account activity from your PC or mobile device at any time.
  • Don't use your mailbox for outgoing mail as criminals often monitor mailboxes in an effort to steal important information, bills, or checks you are sending via mail.
  • Use a cross-cut paper shredder to destroy all documents that contain personal and/or confidential information. Straight line cut paper shredders are less effective than cross-cut pa per shredders.
  • Don't write your PIN anywhere on your debit card or keep your PIN in your wallet or purse.
  • Place your garbage out for collection in the morning instead of at night. This reduces opportunities for "dumpster divers" to steal information that may be in your garbage.

Alma Bank Customer Accessibility Services

Whether you choose to bank online, by phone, at our ATMs or in person, Alma Bank makes your accessibility a priority. Our commitment to the experience of each customer starts with making banking accessible to every customer. 

From Alma Bank Branches to ATMs, online banking to alternate format statements, we are committed to meeting our customers' needs.

Feedback And Requests

If you have a request or just want to let us know how we're doing on meeting your needs and how we might improve. Please call us at 1-855-541-1000.

Customers who are deaf or hard of hearing can dial 711 to use TTY or a Telecommunications Relay Service (TRS), or use a preferred relay service to connect to TD at 1-855-541-1000.

Alternate Statement Format

Customers can request their monthly checking and/or savings account statements in a variety of alternate formats, including braille, or audio CDs.

To request this service, please call 1-855-541-1000 anytime or visit an Alma Bank Branch. Please note that there may be an additional fee.

Enlarged Processed Check Images

Upon request, we will provide enlarged check images of the front and back of the processed checks associated with your account along with your monthly statement (minimum number of 4 checks per page). 

To request this service, please call 1-855-541-1000 anytime or visit an Alma Bank Branch. Please note that there may be an additional fee.

Mail In Deposits

Customers have the option to mail in their deposits to any branch location. Be sure to include the deposit account information, as well as the total amount of deposit. 

Find an ALMA Bank location

Telephone Banking Services

There are several telephone banking options to make managing your finances more convenient:

Bank by Phone

Call 1-866-424-8229 to access your account information and conduct transactions 24/7 with this easy-to-follow automated system available in English and Spanish.

Customer Care Line

Help is available at 1-855-541-1000.

TTY and Telecommunications Relay Services

Callers who are deaf, hard of hearing, deafblind, or have speech impairment may contact Alma Bank through TTY (Text Telephone), Video Relay or other Operator Assisted Relay services. Dial 711 or your preferred Telecommunications Relay Service and connect to Alma Bank at 1-855-541-1000

Automated Teller Machines (ATMs)

All of our ATMs are accessible to customers with disabilities.

Audio capability

Access in English by plugging in a standard headset – you'll be guided through your transaction while the screen appears blank. A braille sticker on all ATMs directs vision-impaired customers to the audio jack.

Design Features

All ATMs provide height and reach requirements to support wheelchair accessibility and are fully compliant with ADA guidelines.

Bank Locations

Our Alma Bank locations are designed with accessibility and convenience in mind:

  • All branches feature accessible doors, vestibules as well as wheelchair-access to ATMs and service areas;
  • Retrofitting of older locations to enhance accessibility is an ongoing effort;
  • Where possible, at least one parking space is reserved for customers with disabilities. Extended evening and weekend hours provide added time and convenience;
  • Extended evening and weekend hours provide added time and convenience.
  • Find an ALMA Bank location

Employment Opportunities

Join a team that celebrates excellence and diversity.

Find out more

Enabling A Comfortable Online Experience

There are a number of accessibility features on your computer and mobile device that can help maximize the comfort of your online experience. Things like:

  • Increasing the size of the text on the screen Magnifying the contents on the screen Enabling high-contrast text
  • Having the words on the screen read out loud to you
  • For help on customizing any of these features, choose the appropriate link(s) for your operating system and/or browser below.

Operating Systems

Browsers

To learn how to use the zoom magnification features or enable high-contrast text, choose the link for your browser:

Additional Resources

The following links are provided solely as a convenience to our Business/Commercial Online Banking clients. Alma Bank neither endorses nor guarantees in any way the organizations, Services or advice associated with these links. Alma Bank is not responsible for the accuracy of the content found on these sites.

Identity Theft, Privacy, and Security Publications for Businesses

OnGuard Online: Learn how to avoid Internet fraud, secure your computer, and protect your personal information.

For more information and tips on how to safe-guard your online security, take a look at the following videos and links

FDIC Consumer Protection

ID Theft

NACHA Fraud Resources

US Department of Homeland Security

Federal Communication Commission - Business Cyber-planner

National Institute of Standards and Technology (NIST)'s Computer Security Resource Center

SANS (SysAdmin, Audit, Network, Security) Institute's Twenty Most Critical Internet Security Vulnerabilities

U.S. Computer Emergency Readiness Team (US-CERT)

Carnegie Mellon Software Engineering Institute's CERT Coordination Center

Center for Internet Security (CIS)

Institute for Security Technology Studies

Back to Top