Your Privacy is Important

® is committed to making sure your information remains safe.  Below are the ways we protect your accounts and information. We have also included some ways you can protect yourself.



Secure Online Login

When you sign in , your Login ID and Password are secure. The moment you click Enter and before your Access ID and Password leave your computer, encryption using Secure Sockets Layer (SSL) technology ensures the privacy of communication between you (your browser) and our servers.


You may notice when you are on our homepage the small "lock" icon in the top left corner of the browser frame and the "s" in the Web address bar (for example, "https").

To provide the fastest access to our homepage for all of our customers and other visitors, we have made our site secure. Please be assured that your login ID and Password are secure and only our servers have access to them.



Protect Your Business from Other Threats

  • Implement dual control to initiate and release funds transfers, where two employees and two separate computers are required to complete the transfer of funds, either through ACH or wire transfer.
  • Establish appropriate dollar limits for ACH and wire transfers, limiting the exposure in case of unauthorized attempts.
  • Do not open emails from unfamiliar sources, especially those with attachments or links.
  • Maintain current versions of antivirus software, run virus definition updates and virus scans on a regular basis.
  • Review employees' user online banking access activity periodically and remove former employees' accounts from your online banking system immediately.
  • Make your passwords longer, use a combination of upper and lowercase letters, numbers, and symbols.
  • Check for signs that the webpage is secure, for example, a web address that starts with "https" and shows a closed padlock.
  • Promptly review Wire, ACH, or other transaction confirmations to ensure authenticity. Notify your bank immediately if you notice any discrepancies or error



Read our privacy policies and learn how to keep your information private.

We recognize our obligation to keep information about you confidential and secure, and are committed to protecting your privacy.


Information Use and Collection:
We recognize your expectation of and respect your right to privacy. Furthermore, we maintain strict standards of security and confidentiality designed to prevent misuse of any information our customers share with us. We collect, retain and use information about customers only where we reasonably believe it would be useful and allowed by law to administer specific business relationships and to provide products, services and other opportunities to our customers. We use information we collect to identify you, to communicate with you, to help us respond to your questions, and to understand which of our products and services will best meet your needs.  Read More below


Privacy Policy

Information Sharing and Disclosure:
Protecting personally identifiable information about merchants and consumers is an important part of our business. We will not reveal specific information about customer accounts or other personally identifiable data to unaffiliated third parties for their independent use. We share and disclose such information only as described below:

dabow® will send personally identifiable information about you to other companies or people when: 
1) we have your consent to share the information; 
2) we need to share your information to provide the product or service you have requested; 
3) we need to send the information to companies who work on behalf of dabow® to provide a product or service to you (unless we tell you differently, these companies do not have any right to use the personally identifiable information we provide them beyond what is necessary to assist us in providing a product or service to you); and 
4) we also may release personally identifiable information when we believe release is appropriate to comply with applicable law; enforce or apply other agreements; or protect the rights, property, or safety of dabow® our users, or others. This includes exchanging information with other companies and organizations for fraud protection and risk reduction.

Maintenance of Accurate Information:
In order to attain the most complete and accurate records, we consistently maintain customer information. If you have reason to believe that your account information or records are incorrect, please contact us at We respond to requests to correct inaccurate information in a timely manner.

Limiting Employee Access to Information:
Information security is critical to our business. We work to protect the security of your information during transmission. We store information gathered on secure servers located in a locked data center. The number of employees involved in the management of the data center that have physical access to these servers is limited. We use firewalls and other security technology to prevent our servers from being accessed by unauthorized persons. Employee access to customer information is limited to only those employees who need the information in order to service our customers. We have educated our employees so they understand the importance of confidentiality and customer privacy, and they have been trained to adhere to the strictest of security measures. Customer information is dealt with in the most professional manner possible, and we believe in taking appropriate disciplinary measures where necessary to enforce employee privacy responsibilities.

Disclosure of Privacy Principles to Customers:
In continuing our commitment to provide quality products and superior service to you, we will make the privacy policy available to you. We reserve the right to change this policy at any time. We may receive personal information when you use our website to apply online for products, access or provide account information and send us e-mail. We also track the hyperlink you use to find our website. This information helps us evaluate the effectiveness of our website and improve its content. We may use the information we receive to customize your visit to our website and to design products and services that meet your needs. We may also use the information to communicate with you by e-mail. We have taken a number of steps to keep your personal information secure when accessing our website





  • Keep your personal information private and secure. If you are being asked to provide your personal information, make sure you know you are communicating with someone you know to be valid.  Use a shredder to destroy any personal documents that are no longer useful.
  • Place passwords on your credit card, bank, and phone accounts. Avoid using easily available information such as your birth date, your Social Security number or your phone number.
  • Do not give out personal information over the phone, through the mail, or on the Internet unless you initiated the contact or you are certain you are communicating with someone you know to be valid.
  • Deposit your outgoing mail in post office collection boxes or at your local post office. If you're planning to be away from home and can't pick up your mail, call the U.S. Postal Service at 800.275.8777 to request a vacation hold.
  • To obstruct identity thieves who may pick through your trash or recycling bins to capture your personal information, tear or shred any documents that contain your personal information. To opt out of receiving offers of credit in the mail, call: 888.5.OPTOUT  / 888.567.8688.
  • When going out, carry only the identification information, credit and debit cards that you may actually need.

The Internet Of Things

Technology is making life easier for all of us every day, and chances are, you are already utilizing products that are considered IoT devices. IoT or the Internet of Things, refers to the collection of devices connected and controlled over the Internet.

"Alexa, turn the air down to 72 degrees"

"Hey Google, add milk to my shopping list"

"Hey Siri, play classical music"

...all will become more familiar everyday commands as more households and businesses alike embrace IoT. Recent estimates project the number of Internet connected devices to reach 26 billion by 2020, with some studies suggesting an even higher adoption.

It is exciting to experience these innovative products but there is always the need to be aware of the security risks associated with any internet-connected device.

What are some items that make up the Internet of Things?

IoT products are often referred to as "smart" and include mobile phones, cars, refrigerators, coffee makers, televisions, microwave ovens, fitness bands, thermostats, smart watches, webcams, light switches, door locks, door bells, copy machines, digital assistants and medical devices; almost anything that has an on/off switch and connects to the Internet directly or to is controlled by Internet connected devices.

What are the security risks and concerns of using IoT products?

Many popular IoT products, are manufactured with a goal of convenience for the user through the integration of devices and systems, but not always with security top of mind.

Tracking Your Activity

With your smart phone's range of sensors such as GPS, and connectivity options (Cell, Wi-Fi and Bluetooth), your device can potentially monitor your movements and location, throughout the day. Smart assistants have access to your calendar, contacts, purchase history and more to make your life more convenient.

Tracking Your Home

IoT devices such as Smart Thermostats use sensors, real-time weather forecasts, and occupancy detectors to monitor actual activity in your home. As the smart assistants become "smarter" they record requests to improve responses.


IoT devices often sense and collect consumer and personal information and share this with other IoT devices. Have you ever had that feeling you were being followed when you received a notification for a product or service that you had not expressed interest in but it seemed to align with your personal preferences? This may be a sign of IoT sharing.

Not Engineered with Security in Mind

Many manufacturers are designing their products with rigorous security standards. Unfortunately, there are others introducing low-cost, quick-to-market IoT-enabled devices with little to no embedded security defense mechanisms, placing your privacy at risk.

How can you protect yourself in this brave new world of the Internet of Things?

Here are some suggestions:

  1. Do not store personal identifying information on any device.
  2. Ensure your home network only allows access to authorized users. If devices are password-protected, switch to a two-step authentication process and create complex passwords (Password 1234 will not work!). For instance, develop a password with a combination of lower and upper case letters, numbers and symbols or a passphrase, movie or song that you can remember easily but that has been adapted to make it difficult to decipher. For example, "The Wizard of Oz" could be re-configured into the password, Th3WZRD!ov0Z. Be sure to use unique complex passwords on each of your devices and change them every other month. Or if your home network is capable of creating a secure "Guest" wireless network, attach IoT devices to the Guest wireless instead.
  3. Most hacks occur via WiFi or wireless networking, and unsecured WiFi systems are among the easiest to access. The first line of defense against unauthorized access is to make it difficult to gain entry to your network. Again, good password hygiene is imperative.
  4. IoT products from a reputable manufacturer. Thoroughly research any IoT devices you are planning to purchase to determine if the manufacturer conducted comprehensive security testing. Publications such as Consumer Reports often provide detailed reviews of these types of products.
  5. As a consumer, make a point to conduct research and review user agreements (and other fine print), and consent to IoT updates or purchases only when you feel confident in their security. Find out what information is gathered and stored by your device as well as how the manufacturer uses the information. Privacy principles dictate that users should be able to keep control of their data as well as to be able to opt out of the "smart" environment without incurring negative consequences.
  6. Your smart phone is often the device used to manage other IoT devices, opening up an avenue for hackers to gain entrance to your home. Keep your smart phone protected with a strong and unique password that is separate from your internet passwords. Also, install smart phone software updates when they become available.
  7. Use and update anti-virus and anti-malware software on all of your Internet connected devices.

The Internet of Things will never be completely safe; but neither is the world outside of the Internet. Just as you take proper precautions to ensure your house is entirely secure against theft, employ the same types of best practices to defend against a potential data breach.

These helpful tips are provided by Digital Defense, Inc., a computer security company to help insure the privacy and security of our nation's financial information.

Questions about our Privacy, Security or Services,
Please contact: Sherri Williams, ETA CPP
Phone: 972-542-1297
Toll Free: 866-481-1110
Fax: 469-202-7537

Looking for support? Our team is always ready to help. Contact us at:

Ready to get started with dabow®? Contact us at:

© 2021 Dabow of North Texas LLC . All Rights Reserved. Contact Us: Phone: 866-481-1110 E-Mail: We are located at 102 N Louisiana Drive Suite 205, Celina, TX 75009
Website Produced by
Back Lot Productions & Promotions