​Due to weather conditions, beginning on September 14, 2021 and until further notice, our Houston Four Oaks banking center lobby will be temporarily closed. Please visit the drive thru or the Westway banking center at 4424 West Sam Houston Parkway N. Suite 170, Houston, TX 77041 for all in-person banking needs.

We have scheduled enhancements for our website platform on Tuesday, September 14th, starting at 5:30 PM CST to approximately 7:00 PM CST. During this time, our website may not be available and/or may have reduced functionality.

Privacy & Security Center

As part of our business, we take certain measures to protect you and your information online.

What we do to protect you

At Texas Capital Bank, we take a variety of measures to ensure that your information is kept safe and secure.

    Privacy Notice

    Our privacy notice details our privacy and security practices regarding our relationship with you including how we share your information. This notice does not apply to business or commercial customers.

    Please visit the Disclosures page for more information.


    Online Privacy Policy

    Your online privacy is important to us.  The Online Privacy Policy explains the collection, use, sharing and protection of data and information that we gather when you use our website and mobile applications. 

    Please visit the Disclosures page for more information.


    California Privacy Rights

    If you are a California resident, California law may provide you with additional rights regarding our use of your personal information.

    • California Consumer Privacy Act (CCPA) provides consumers in California certain privacy rights and protections. To learn more, see the CCPA Privacy Statement in the Online Privacy Policy. 
    • California Consumer Privacy Notice provides consumers in California rights to restrict the sharing of personal and financial information with our affiliates (companies we own or control) and outside companies that we do business with. To learn more, see the California Consumer Privacy Notice in the Privacy Notice.

    Manage Your Privacy Preferences

    If you are a California resident and would like to manage your preferences, click the link below and complete the form.

    Manage Your Privacy Preferences

    Suspicious Login Filtering

    Behind the scenes, we analyze and filter login attempts from suspicious sources, proactively blocking them before they ever get to a login screen and preventing them from attempting fraudulent logins. 

    Strong Authentication Requirements

    We prompt you to create a unique username and password when you first access your account, and always require an additional authentication factor to log in.  This extra layer of security works to keep your account safe, even if someone else gets access to your username and password.

    Secure Online Messaging

    We provide a secure, encrypted messaging system you can use to discuss your accounts with our associates once you're logged in to the online banking portal.  We recommend you use this service for all online communications about your accounts, and as a reminder - we will never ask for confidential information like usernames, passwords, or account numbers via email.

    Security Alerts

    We provide the ability for you to configure text, email, and secure online notifications to inform you in real time about transactions and events that could have a security or fraud impact on your Texas Capital Bank accounts. You can set these alerts up in the Settings section of the online banking portal.

    Money Movement Approvals

    Our online banking platform provides multiple levels of approval for payment protection, requiring additional approval for outgoing payment transactions.

    Fraud & Protection Security Team

    Our dedicated fraud protection and security team is made up of former law enforcement, Certified Fraud Examiners, and IT security professionals. Together, they are experienced in proactively identifying and acting on fraudulent occurrences as well as providing counsel and advice.

    Identity Verification, Fraud Monitoring & Restricted Access

    We will always verify your identity before granting access to your information or accounts, and access to data is based on the “principle of least privilege”, meaning that employees can only see what they need to in order to perform their job function.

    Branch & Office Security

    All branches and office locations are protected by security mechanisms such as cameras, badging systems, and other methods to prevent theft of resources or information.  Employee-only areas are protected by badge readers based on job function and restricted based on role and time of day. All employees are trained and must adhere to our security policies and are trained, both at hire and on an ongoing basis.

    Employee Education

    All employees are trained and must adhere to our security policies and are trained, both at hire and on an ongoing basis.

    Fraud Resources

      How to identify phishing scams

      Phishing: is a type of cybercrime that involves a bad actor attempting to trick you into providing information, often by providing a link that captures the information you input. These emails are intended to appear as if they are coming from an entity you know or trust, and they often contain a call to action combined with a sense of urgency related to their request. 

      Watch out for these common phishing techniques:

      • Sender names
      • IP/Email extensions
      • Links and file attachments
      • Impersonal language
      • Poor grammar and punctuation

      How to identify check fraud

      A common type of fraud involving Commercial accounts is check fraud. This can occur by the fraudster obtaining only an account number and simply creating counterfeit checks to fit a particular con scheme. Fraudsters will find individuals online who later fall victim to the fraud scheme without realizing their involvement. The individual is given instructions along with a check that contains the commercial account information. The instructions normally request the individual to negotiate the item at a financial institution, then wire the funds to a different account, typically belonging to the fraudster using other people’s identifying information to mask the fraudsters identity.

      A good preventative measure is to review your accounts daily for potential fraudulent transactions. In the event there is confirmed fraud, immediately report the transaction to the bank. Protect your business accounts by obtaining more information on Treasury Products offered.

      How to identify a business email compromise attack

      One of the most common types of fraud is email compromise attacks. This cyber crime can target a business or an individual, and both can have devastating results. Be particularly wary of emails that have sense of urgency or last-minute changes to funding instructions. If you receive a suspicious email, make sure to avoid clicking links or downloading attachments. If you feel that your email has been compromised or have any questions, please contact via secure message inside OLB or give us a call at 877-839-2265, option 3, then option 2.

      Fraud Protection Checklist

      While no organization is immune from either internal or external fraud, it is imperative that you take preventive measures through use of technology and procedures.

      To get started, download the Fraud Protection Checklist.

      Anti-Fraud Solutions

      ACH Positive Pay

      Our system compares attempted ACH debits to preauthorized profiles, allowing it to post if coming from a preauthorized company or allowing you to verify the debit if coming from an unauthorized source.

      Check Positive Pay

      We compare the checks presented for payment each day with a check issue file, reporting any exceptions for you to decide whether to pay or not.

      Positive Pay Payee Verification

      An added enhancement to Check Positive Pay, this allows you to reduce the risk of payee name alterations by comparing the payee name on the check with that on your check issue file, allowing you the option to pay or return the items.

      ACH Blocks and Filters

      Whether at implementation of a new account or for accounts already in place, we can systematically block all incoming ACH transactions or return any transactions that are not from preauthorized companies.

      Check Debit Block

      We can set up an account to reject any checks presented, ensuring that accounts intended only for electronic transactions reject forged checks.

      Wire Transfer Email Notifications

      We can send you email notifications for ongoing wire transfers, including information about the receiving party, to help you recognize and quickly recall any unauthorized transaction and stop fraudsters from making additional transactions.

      Connect with an expert banker.

      Experience more with experienced bankers who are committed to helping you grow.

      Contact Our Experts