The privacy of your personal information is important to us. Custom Insurance Services, Inc. and Central City Financial Services, Inc. have adopted the following policy for how we deal with your non-public information:

  1. Types of non-public information collected. The specific information we collect is related to the insurance you requested and/or the nature of your business operations, and may include:
    1. Names.
    2. Dates of birth.
    3. Social security numbers, drivers license numbers and other identifying numbers.
    4. Financial account numbers.
    5. Medical information and health insurance information.
  2. Methods of information collection. We collect non-public information about customers, their employees and family members, and prospective customers, from the following sources:
    1. Information we receive from you on applications for insurance, or other information you provide to us
    2. Information we receive from the companies we represent which provide insurance policies to you.
    3. Information from consumer reporting and government agencies.
    4. Information from your communications and transactions with our agency and the companies we represent, including electronic and telephone communication.
    5. Information from visits to our web site.
  3. Ways we use your information.
    1. We do not disclose your personal information to third parties except as permitted or required by law.
    2. We may share your information with insurers, financial services companies and other parties that perform services on our behalf, in order to provide insurance products and services on your behalf.
  4. Ways we safeguard your non-public information. We utilize electronic, physical and procedural safeguards to protect your non-public information, including:
    1. Password policies e.g. complexity requirements.
    2. Physical security e.g. locked and monitored premises.
    3. Encryption of non-public information as it traverses the Internet, which may require you to support encrypted communications at your endpoint in order to be effective.
    4. Annual internal audits and employee training regarding our security and privacy practices.
    5. Reporting of breaches to affected individuals, financial and insurance companies, and other parties as may be required by applicable law.