To help fight the funding of terrorism and money laundering activities, the law requires all financial institutions to obtain, verify and record information that identifies each person or entity who opens an account. We are required by law to ask you to provide your name, address, date of birth and other information about you, your organization or persons related to your organization that will allow us to identify you before we approve your account. We also may ask you to provide certain identifying documents, such as your driver’s license or passport or your organization’s articles of incorporation and may obtain credit and other consumer reports to assist us in verifying your identity and in determining whether you satisfy our account criteria. Unless you provide the requested information and documentation, we may not be able to open your account.
By applying for an account with us, you agree to provide the information and documentation requested by IUR and consent to IUR’s acquisition of credit and other consumer reports about you for the purposes described above.

IUR maintain certain personally identifiable information regarding clients in its electronic databases to facilitate the processing of transactions on behalf of its clients to comply with rules, regulations and laws. The personally identifiable information stored is protected from unauthorized access, treated as confidential, and handled according to the terms of our privacy policy.
IB attests that personally identifiable information and customer information stored on our systems is protected as follows:
•IB’s Internet-facing servers are protected from access through firewalls and/or other security devices.
•The firm’s critical servers reside on isolated networks that have no direct Internet access.
•IB internal systems that store customer personally identifiable information locks people out of internal systems after a few unsuccessful login attempts.
•Access to shared drives is restricted to active employees and pre-authorized individuals on a “need to know” basis within IB through password-protected logins to the network.
•Encryption technology is employed for data transmissions across public networks and on portable media devices.
•System backups reside either in secure facilities at IB or in secure storage provided by a third party specializing in secure information management.
•Personally identifying information is generally not stored on laptop computers or other portable devices. Further all data stored on laptop hard drives is encrypted.
•All end-station computers use antivirus software that is regularly updated.
•Operating System security patches are applied to all systems on a regular basis.
•Employees are trained on the requirements to protect personal information.
•IB has adopted written policies and procedures, reasonably designed to protect personally identifiable information.

IUR further attests that should a breach occur, management will promptly take action to secure information, mitigate the breach, and notify, on a timely basis, any customers whose personally identifiable information could have been compromised.