At your request, we are initiating a review of your transaction, which may include a review of your personal information, including but not limited to, your transaction with our institution or any affiliates, your personally identifying information, and any other private information required to respond sufficiently to your request. DISCLAIMER: IF YOU UPLOAD CONTENT INTO THIS COMPLAINT FORM, YOU ACKNOWLEDGE THAT BY USING THIS SYSTEM ANY CONTENT UPLOADED INTO THIS COMPLAINT FORM MAY BE USED FOR THE FOLLOWING PURPOSES: (1) TRAINING; (2) AUDITS; (3) LITIGATION; (4) INVESTIGATION; AND , (5) REPORTING TO LENDERS, EXAMINERS, REGULATORS, OR GOVERNMENTAL AGENCIES.
By submitting these complaint details, you authorize us to review your personal information included on this form and contained in other records in order to investigate and respond to your submitted complaint.
If you included information regarding a legal representative or attorney, we assume you consent to us communicating with your representative and releasing information to such individuals or entities as is necessary to respond to your complaint. By including the representative information, you consent to us contacting your authorized representative on your behalf to communicate any information necessary to sufficiently respond to your complaint.
You also agree not to insert or upload any “Destructive Mechanisms” which means computer code that: (i) is designed to disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions or any other software, firmware, hardware, computer system or network (sometimes referred to as “viruses” or “worms”); (ii) would disable or impair system or any other software, firmware, hardware, computer systems or networks in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks” or “drop dead” devices); (iii) would permit third parties to access the system or any other software, firmware, hardware, computer systems or networks to cause such disablement or impairment (sometimes referred to as “traps,” “access codes” or “trap door” devices); or (iv) which contains any other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause such programs to cease functioning or to damage or corrupt data, storage media, programs, equipment or communications or otherwise interfere with operations.
By checking the box “I Agree to the Terms and Conditions”, you certify that the information provided on this form is true and correct to the best of your knowledge.