Home Page Navigation Contents Contact Sitemap Search

Secure data transfer

During the transfer between cus­tomer com­puter and the finan­cial institution’s server, data are encrypted, making it impos­sible for third par­ties to view them.

Encrypted data transfer

The e-banking sys­tems employed by Swiss finan­cial insti­tu­tions are among the most secure world­wide. Cus­tomer data are pro­tected from unde­sir­able third party access during transfer by imple­menting var­ious secu­rity pre­cau­tions. A dig­ital SSL cer­tifi­cate allows for checking the e-banking server's identity.

Data between the e-banking server and the cus­tomer com­puter are encrypted using at least a 128 bit key both ways. This modern and widely used tech­nology guar­an­tees a high stan­dard of secu­rity, pro­tecting the data recorded and trans­ferred from manip­u­la­tion. Encryp­tion takes place auto­mat­i­cally, without cus­tomers having to do any­thing spe­cial or needing to install any spe­cial software.

You can find fur­ther infor­ma­tion and an exact descrip­tion of cer­tifi­cate checks in our article on cer­tifi­cate checks.

Finan­cial insti­tu­tions use the most up-to-date secu­rity sys­tems to com­pre­hen­sively pro­tect their cus­tomers’ data and finances at any time.

What else would you like to learn about security when e-banking?

Reg­ister for a course now
and learn more:

Basic course

Find out about cur­rent Internet threats and some easy pro­tec­tive mea­sures, and how to securely use e-banking.

fur­ther information

Online course mobile banking/payments

Find out about mobile banking, mobile pay­ments and how to securely use these apps.

fur­ther information

Online course for the under-30s

Learn how to use your smart­phone securely. Next to basics, we will show you what you should know about social media, clouds, mobile banking and mobile payments.

fur­ther information

Course for SMEs

Is your organ­i­sa­tion suf­fi­ciently secure? Learn which mea­sures you can take to sig­nif­i­cantly strengthen your organisation’s IT security.

fur­ther information