Website Privacy and Data Security Statement
The types of personal information we collect, how we use it, who we share it with and why, and what we do to try to protect it.

The types of personal information we collect, how we use it, who we share it with and why, and what we do to try to protect it.
|
What do we collect? We collect and retain certain personal information from a variety of different data subjects. Our privacy statement applies mostly to those who visit and use our online and mobile resources, from whom we collect very little information unless it is voluntarily submitted to us. You can read here to learn about the categories of personal information we collect from all four groups of data subjects. |
Why do we use it? We use personal information received from visitors and users of our online and mobile resources to communicate directly with them. We provide further detail about our use of personal information here. |
|
When do we share it? We share personal information when needed to fulfill our legal obligations and when our vendors and business partners need it to perform under the contracts we have with them. We provide further detail about our sharing of personal information here. We do not sell or rent any personal information from any group of data subjects to third party data brokers or marketing companies. |
How do we protect it? We’ve invested in a Security Program that addresses both technical and operational matters. Our program includes incident response and management and vendor oversight components. You can read about those components here and here. |
Contacting Our Privacy Office
If you have any questions about our privacy and data security policies, procedures and practices, including anything we say in this privacy statement, we encourage you to contact our Privacy Office.
This privacy statement was amended as of February 1, 2026 and is effective as of that date. The English language version of this privacy statement is the controlling version regardless of any translation you may attempt.
You can use the links below to navigate to areas of this statement that apply specifically to you, or which may otherwise be of interest:
Some Important Vocabulary
What Personal Information Do We Collect?
How Do We Use the Personal Information We Collect?
When/With Whom Do We Share Personal Information?
How Do We Protect Collected Personal Information?
Your Rights And Options
Children’s Privacy
Submitting Information From Outside the United States
Changes To This Privacy Statement
Contacting Us
Although not itself a contract, this privacy statement is an important document that explains how we address some of our legal obligations, and your related legal rights, involving personal information. Clarity is therefore important. We’ll use this section to let you know about some words that have special meanings whenever you see them in this statement. Let’s start with the word “statement” itself: when we reference “this statement”, “this privacy statement” and “our statement”, we mean the Privacy and Data Security Statement you are reading now.
Wherever we say “Company”, “we”, “us”, or “our”, we mean Commonwealth Credit Union. We use the words “you” and “your” to mean you, the reader, and other visitors to our online and mobile resources who are, in all cases, over the age of 18. This age requirement is discussed in more detail later in this statement here. We also want to be very clear about exactly what parts of the Company corporate enterprise are covered by, and adhere to the policies and procedures explained in this statement.
When we talk about our “online and mobile resources”, we mean all websites, portals or other features we operate to allow you to interact with us and our systems, as well as the mobile apps we’ve created and distributed to let you interact with the content we provide.
An “affinity action” is when you “follow” us, “like” us or take a similar or analogous action on our external social media presence.
Finally, and perhaps most importantly, when we refer to “personal information”, we mean information that can be used to identify or easily be linked to you.
We collect personal information from four groups of data subjects:
The categories of information we collect from each of these groups, and the ways in which we use it, differs. As you may have noticed, it’s possible that the same person could fall into more than one group. For instance, someone who works for us might, on their day off, visit one of our general websites. Most of this statement addresses our processing and sharing of personal information collected from visitors to and users of our online and mobile resources. The immediately following paragraphs provide a quick summary overview about everyone else.
Our Customers
Typically, the categories of personal information collected from our customers will be identifying information such as name, address, telephone number, email address, date of birth, Social Security Number, account numbers, and other information related to your accounts. We use that information to open and maintain your accounts, process transactions, provide customer service, comply with legal and regulatory requirements, protect against fraud, and generally to offer products and services. For further information, please review our Financial Information Privacy Notice. Our customers enter into contracts with us. That contract is separate from this statement and has its own terms and conditions for notice of collection of personal information and governing our overall confidentiality, data privacy and data security obligations. As a result, those terms, and not this statement, apply to the personal information of customers.
We may also collect and record your preferred language for the limited purpose of tailoring our communications and services. This information is used solely to enhance your user experience and will not be used in a manner that discriminates against you or affects your eligibility for our products or services. We handle language preference data in accordance with applicable privacy and consumer protection laws.
Our Workforce and Job Applicants
We collect and retain the types of professional or employment related personal information you would expect an employer to have about its existing and former workforce and new job applicants. We provide legally required notices of collection and describe our use and sharing of the personal information of our workforce and applicants in greater detail in confidential internal human resource manuals and documents accessible to members of our workforce, or by publication on the proprietary workforce/applicant portals and apps we operate. In some cases, such portals and apps may be operated by third parties who transfer the personal information to us. In those situations, the legal responsibility to provide notice usually rests with the third party, not us.
Like all large corporate enterprises, we buy goods and services, lease equipment and office space and attend industry events. In doing so, we interact with many existing and potential vendors and business partners from whom we necessarily collect certain personal information in connection with our contractual and business relationships. This information is typically limited to minimum business contact information. We use and share personal information collected from our vendors and business partners to manage, administer and perform under our contracts with them, or share information about our products. We describe our use of vendor and business partner personal information in greater detail in our confidential contracts with those parties or on the internal vendor management portals we operate.
Visitors and Users of our Online and Mobile Resources
If you visit and/or use our online and mobile resources, we collect, retain and share certain personal information about you. The remainder of this privacy statement applies entirely to such visitors and users of our online and mobile resources. Thus, the words “you” and “your” mean only that category of data subjects.
Generally, we collect personal information through automated/technical means and when you voluntarily provide it to us. We describe that automatic collection here. We describe that type of voluntary submission immediately below. By using our online and mobile resources, you are signifying to us that you agree with this section of our privacy statement and that we may use and disclose your information as described.
Voluntarily Submitted Information
If you choose to participate in, or make use of certain activities and features available via our online and mobile resources, you will need to provide us with information about yourself. The types of personal information you will be submitting to us in those situations is almost always limited to basic identifiers such as your name, email address, mailing address and phone number. Here are some of the ways you voluntarily give us your personal information:
Automatically Collected Information
When you visit or use our online and mobile resources, basic information about your internet/electronic activity is automatically collected through your browser via tracking technologies, such as “cookies.” As just about everyone knows by now, cookies are small text files downloaded onto your computer or mobile device. Cookies allow us to collect your IP address and recognize your computer or mobile device and store some information about your preferences for using our online and mobile resources or past actions, such as:
Additional information about cookies and tracking technologies is available here.
If you access our online and mobile resources from a phone or other mobile device, the mobile services provider may transmit to us certain information such as uniquely identifiable mobile device information. That, in turn, allows us to collect mobile phone numbers and associate them with the mobile device identification information. Some mobile phone service providers also operate systems that pinpoint the physical location of devices and we may receive this geolocation data as well.
Finally, when you use our online and mobile resources, we may allow third party service providers to place their own cookies or similar technologies in order to engage in the same types of collection we describe above. For example, we use third party “web analytics” services such as those offered by Google Analytics. For more information on how Google specifically uses this data, go to www.google.com/policies/privacy/partners/. You can learn more about how to opt out of Google Analytics by going to https://tools.google.com/dlpage/gaoptout.
User Beware: External Sites, Apps, Links and Social Media
We maintain a presence on one or more external social media platforms such as Twitter, Facebook, YouTube and LinkedIn. We may further allow the community features of our online and mobile resources to connect with, or be viewable from, that external social media presence. Similarly, our online and mobile resources may contain links to other websites or apps controlled by third parties.
We are not responsible for either the content on, or the privacy practices of, social media platforms, or any third party sites or apps to which we link. Those apps, sites and platforms are not controlled by us and therefore have their own privacy policies and terms of use. To be clear: neither this statement nor the terms of use appearing on or in any of our online and mobile resources apply to our social media presence or any third party sites or apps to which we may link. That means even if you take an affinity action on our specific social media presence, and identifiers about you are automatically collected and given to us as a result, that collection and transfer is governed by the privacy policies and other terms of the applicable social media platform and are not our responsibility. If you have questions about how those apps, sites and platforms collect and use personal information, you should carefully read their privacy policies and contact them using the information they provide.
We use the personal information we collect only in the manner and through the means allowed by applicable law.
That means we determine whether we have a lawful basis/legitimate business purpose to use your personal information before doing so. As stated in applicable law, such lawful bases/legitimate business purposes include receiving express consent, operating our business, performing a contract, and complying with a legal obligation. More specifically, we use the personal information of each group of data subjects as follows:
We use the automatically collected personal information described here to compile generic reports about popular pages/features of our online and mobile resources, and to see how users are accessing our online and mobile resources and in some cases (such as affinity actions) send materials to you. We use the personal information you voluntarily submitted, as described here, to respond back directly to you and/or send you the information you requested or about which you inquired. We also may use any such personal information you provide to customize our programs and newsletters to make them more relevant to you. We do not sell or rent personal information automatically collected by, or which you voluntarily provide when using our online and mobile resources.
We use and retain your personal information in accordance with applicable law and as long as necessary to carry out the purposes described above in accordance with our internal data retention procedures.
We may share your personal information as described below. This sharing applies to the personal information of all four groups of data subjects.
Affiliates
We may share personal information with other corporate affiliates who will use such information in the same way as we can under this statement.
Legal Requirements
We may disclose personal information to government authorities, and to other third parties when compelled to do so by such government authorities, or at our discretion or otherwise as required or permitted by law, including responding to court orders and subpoenas.
To Prevent Harm
We also may disclose such information when we have reason to believe that someone is causing injury to or interference with our rights or property, or harming or potentially harming other persons or property.
Business Sale/Purchase
If we, or any of our affiliates, sell or transfer all or substantially all of our assets, equity interests or securities, or are acquired by one or more third parties as a result of an acquisition, merger, sale, reorganization, divestiture, consolidation, or liquidation, personal information may be one of the transferred assets.
We also share personal information with those of our vendors and business partners who need it to perform under the contracts we have with them. As part of our Security Program, we have adopted standards for those vendors and business partners who receive personal information from us. We attempt to bind such vendors and business partners to those standards via written contracts. Such standards include expectations that when we share personal information with our vendors and business partners, they will comply with all applicable privacy and data security laws and regulations and our Security Program, and will contractually require and cause their subcontractors and agents to do the same.
For any personal information our vendors and business partners process or store at their own locations, we further expect them to use technology infrastructure meeting, at least at the facilities level, minimum recognized standards for security controls. Such recognized standards include those published by the International Standards Organization, the National Institute of Standards and Technology or any reasonably equivalent standards.
Please note, however, that we cannot guarantee that all of our vendors and business partners will agree to the above-described contractual requirements; nor can we ensure that, even when they do agree, they will always fully comply.
We have adopted, implemented and maintain an enterprise-wide corporate information security and privacy program that includes technical, organizational, administrative, and other security measures designed to protect, as required by applicable law, against reasonably anticipated or actual threats to the security of your personal information (the “Security Program”). Our Security Program was created by reference to widely recognized industry standards such as those published by the International Standards Organization and the National Institute of Standards and Technology. It includes, among many other things, procedures for assessing the need for, and as appropriate, either employing encryption and multi-factor authentication or using equivalent compensating controls. We therefore have every reason to believe our Security Program is reasonable and appropriate for our business and the nature of foreseeable risks to the personal information we collect. We further periodically review and update our Security Program, including as required by applicable law.
Our Incident Response and Management Plan
Despite the significant investment we’ve made in, and our commitment to, the Security Program including enforcement of our third party oversight procedures, we cannot guarantee that your personal information, whether during transmission or while stored on our systems, otherwise in our care, or the care of our vendors and business partners, will be free from either failed or successful attempts at unauthorized access or that loss or accidental destruction will never occur. Except for our duty under applicable law to maintain the Security Program, we necessarily disclaim, to the maximum extent the law allows, any other liability for any such theft or loss of, unauthorized access or damage to, or interception of any data or communications including personal information.
All that said, as part of our Security Program, we have specific incident response and management procedures that are activated whenever we become aware that your personal information was likely to have been compromised. Those procedures include mechanisms to provide, when circumstances and/or our legal obligations warrant, notice to all affected data subjects within the timeframes required by law, as well as to give them such other mitigation and protection services (such as the credit monitoring and ID theft insurance) as may be required by applicable law. We further require, as part of our vendor and business partner oversight procedures, that such parties notify us immediately if they have any reason to believe that an incident adversely affecting personal information we provided to them has occurred.
If we are using your personal information to send you marketing materials, such as newsletters or product alerts via text or email, you may opt out by following the opt-out instructions in the email or other communication (e.g., by responding to the text with “STOP”). In addition, certain of our online and mobile resources will provide a centralized opt-out link allowing you to opt out of any programs in which you may have enrolled using that particular online and mobile resource. When we receive your request, we will take reasonable steps to remove your name from our distribution lists, but it may take time to do so. You may still receive materials for a period of time after you opt out. In addition to opting out, you have the ability to access, amend and delete your personal information by contacting us using the contact information below. Opting out of or changing affinity actions or other submissions or requests made on our external social media presence, will likely require that you do so directly on that applicable platform as we do not control their procedures.
Some browsers have a “do not track” feature that lets you tell websites that you do not want to have your online activities tracked. At this time, we do not specifically respond to browser “do not track” signals.
We control and operate the online and mobile resources from within the United States of America (the “U.S.”). Information collected through the online and mobile resources may be stored and processed in the United States or any other country in which Company or its affiliates or third-party service providers maintain facilities. Although we do not actively block or monitor visitors from other countries, the online and mobile resources are directed only at visitors from the U.S. As such, this privacy statement is consistent with U.S. law and practice and is not adapted to other laws (including European data security and privacy laws). Company will apply the applicable laws of the U.S. including as embodied in this privacy statement in place of data protections under your home country's law. That is, you freely and unambiguously acknowledge that this privacy statement, not your home country's laws, controls how Company will collect, store, process, and transfer your personal information.
The Law Varies from Place to Place: The GDPR and CCPA
Privacy and data protection laws vary around the world and among the several United States. Most prominently, residents of California and data subjects whose personal information was obtained from them while they were in the European Economic Area, United Kingdom, and Switzerland, have certain additional rights in cases where the party collecting that information is governed by the applicable law. We have reviewed our business operations and data-related business practices with legal counsel in the context of the General Data Protection Regulation under European law (the “GDPR”) and the California Consumer Privacy Act (the “CCPA”). As a result of this review, as of the effective date of this Privacy Policy, we do not believe we are governed by either the GDPR or CCPA. We have, however, as required by certain data protection and privacy laws, such as the GDPR and CCPA, and as a good business practice generally, adopted and implemented the above-described data security program that includes technical, organizational, and administrative measures reasonably designed to protect, in a manner consistent with accepted industry standards, the privacy of those with whom we do business and to reduce the likelihood of unauthorized access to, or unauthorized use of, personal information we collect.
We reserve the right to change or update this statement from time to time. Please check our online and mobile resources periodically for such changes since all information collected is subject to the statement in place at the time of collection. Typically, we will indicate the effective/amendment date at the beginning of this statement. If we feel it is appropriate, or if the law requires, we’ll also provide a summary of changes we’ve made near the end of the new statement.
If you have questions about our privacy statement or privacy practices, please contact our Privacy Office: