FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Personal Products

Personal Account Services

Discover the CSB difference! Explore our comprehensive account services and elevate your banking experience. We're more than just an account, we're your financial partner.

Customer seated at a window with a smiling bank officer
Stylized paper money being dispensed from a slot

Allpoint

What is the Allpoint Network?
The Allpoint Network is a surcharge-free network of ATMs with over 55,000 locations throughout the United States, Canada, Mexico, Puerto Rico, United Kingdom and Australia. We are a proud member of the Allpoint Network, providing access to ATMs at your favorite retail locations. Get cash at the convenient location nearest you as often as you like; it’s all complimentary.

We Are Bringing Convenience and Savings

Get Cash Where You Shop*

Deposit Money into your Account

**Not all retail locations participate in every market. Check the Allpoint locator to be sure the location is surcharge-free.


Stylized calculator

Calculators

No need to crunch all of those numbers on your own! Our handy, online calculators can help with your financial forecasting.


Stylized credit card with exclamation point

Card Security

Debit Card Alerts:

CSB offers debit card alert services via text message and/or e-mail for customers. Help keep your account secure with real time alerts that can be customized based on specific transactions. To get started, follow the link below to our partner’s site to continue registration:

Please note that while you will be redirected to an external site to register, this is through a trusted third-party partner of Chelsea State Bank.

If you believe your debit or credit card has been lost or stolen, please let us know immediately.

 

Debit (Mastercard®)  ATM Card

During Business Hours:

Monday – Friday 8:30 AM – 4:00 PM

1 (734) 475-1355

After Business Hours:

1 (844) 791-0120

PIN Activation & Reset:
1 (800) 290-7893

 

Visa ® Credit Card:

24 hours a day, 7 days a week:

1 (800) 367-7576


Stylized notice page superimposed on a laptop

eStatements

eStatements are a great way to get all your banking notices in a timely and reliable fashion.

  • With eStatements you can have all your notices sent to you directly by e-mail. No more waiting for the mail to deliver your loan payment notices, reminders, transfer notifications, bank statements or any other banking communication. Plus, no paper used means you’re helping to make the world a little greener.

 

  • To enroll, simply log into your CSB online banking account, or access your account through our mobile app.
  • Navigate to “Documents”
  • Follow the prompts

Stylized shield with a check mark in a circle

ID Theft Protection

In a market overflowing with solutions that take a daunting do-it-yourself approach to credit re-establishment, ID TheftSmart’s licensed investigators simply do more. ID TheftSmart’s investigators have thousands of hours of experience — more than any other company in the industry — helping people to determine the extent of their exposure to risk, and to restore to a pre-theft status as quickly and efficiently as possible as an advocate on your behalf.

ID TheftSmart’s licensed investigators handle identity theft issues with a three-staged defense.

Identity Theft Protection:

  • Consult on best practices for managing Personal Identifying Information (PII)
  • Provide safety guidelines for communicating and interacting online
  • Provide cardholders information about their rights under federal and state laws
  • Consult on best practices for consumer privacy
  • Access to a personal advocate if identity theft occurs

Identity Theft Detection:

  • Provide an action plan when information has been compromised
  • Help with interpreting and analyzing credit report
  • Fraud alert assistance
  • Credit freeze consultation
  • Provide personal assistance when suspicious issues extend beyond initial findings

Identity Restoration:

  • Confirm identity fraud and identify its nature and scope
  • Assist in obtaining a police report
  • Provide tri-merged credit report and perform full non-credit searches
  • Work on behalf of members until all identity theft issues have been verifiably resolved
  • Place seven-year fraud victim statements with credit reporting agencies when applicable

ID TheftSmart’s licensed investigators attack the issue before, during, and after someone becomes the victim of identity theft. This multifaceted approach allows all members to benefit from the experience and expert consultation provided by the investigators. They address the issue of privacy and best practices before an event, action after a data exposure, and restoration services in the unfortunate event of an identity theft occurrence.

 

Ready to protect your identity? Get in touch with a member of the Chelsea State Bank team to get started.

 


Option 1: Identity Management Service

$5 per person per month

Easily and efficiently self-monitor your identity within our ID TheftSmart portal.

Option 2: Credit Monitoring

$7 per person per month

Automatic credit monitoring by Experian Credit Bureau that will notify you of over 10 different credit fraud types including:

  • New accounts opened
  • Payment Delinquencies
  • Credit Inquiries
  • Public Record Changes
  • Change of Address
  • Credit Card Over Limit
  • Deceased
  • Lost or Stolen Card
  • New Unconfirmed Address
  • Settlement
  • Skip Cannot Locate
  • Fraud or Victim Statement
  • Major Derogatory

Option 3: Credit Monitoring by Three Bureaus

$9 per person per month

The same automatic notifications as option 2 but the most thorough credit monitoring available by 3 different international credit bureaus including:

  • New accounts opened
  • Payment Delinquencies
  • Credit Inquiries
  • Public Record Changes
  • Change of Address
  • Credit Card Over Limit*
  • Deceased*
  • Lost or Stolen Card*
  • New Unconfirmed Address*
  • Settlement*
  • Skip Cannot Locate*
  • Fraud or Victim Statement*
  • Major Derogatory 

*Experian Bureau only

Stylized paper curency and coins

IntraFi & CDARS

Access millions in FDIC insurance through a single, local bank relationship.  It pays to be safe!

All Benefits

Earn Interest

FDIC Insurance on Deposits > $250,000

Keep Large Cash Balances Secure

Deposit placement through CDARS or ICS is subject to the terms, conditions, and disclosures in applicable agreements. Although deposits are placed in increments that do not exceed the FDIC standard maximum deposit insurance amount (“SMDIA”) at any one destination bank, a depositor’s balances at the institution that places deposits may exceed the SMDIA (e.g., before settlement for deposits or after settlement for withdrawals) or be uninsured (if the placing institution is not an insured bank). The depositor must make any necessary arrangements to protect such balances consistent with applicable law and must determine whether placement through CDARS or ICS satisfies any restrictions on its deposits. A list identifying IntraFi network banks appears at https://www.intrafi.com/network-banks. The depositor may exclude banks from eligibility to receive its funds. The IntraFi hexagon and IntraFi logo are service marks, and ICS, CDARS, and Bank Safe, Bank Smart are registered services marks, of IntraFi Network LLC. BANK SAFE BANK SMART®Access multi-million-dollar FDIC insurance on large deposits placed into demand deposit accounts, money market accounts and CDS, earn interest, and maintain access to funds.All from a bank you already know and trust.


Stylized hand holding a phone

Mobile Deposit

Mobile Check Deposit lets you securely deposit checks using your smartphone – no branch visit required.  Simply log into your CSB Online Banking from your desktop or smartphone.

All Benefits

Deposit Checks 24/7 from anywhere*

Bank-Level Securirty & Encryption

Easy to use on iOS and Android Devices

*3rd Party Fees May Apply


Stylized smartphone displaying a locked padlock

On-Device Data Security

On-device data security: Enable security features on smartphones and tablets

Specific security features vary between devices and operating systems. Use whichever features your device offers that provide the best
security for your needs:

  • Password, passcode, or PIN: Setting a password, passcode, or PIN to access your device is generally simple and effective. Use a code
    that is four digits or longer, and keep it secret, like you do for your email password or passphrase.
  • Unlock pattern: Some handheld devices let you set unlock patterns that function like PINs. Use a pattern with some complexity (for
    example, with at least five points), keep it secret, and protect it from observers. Additionally, be aware that smudges on the face of your
    device may reveal your pattern to unauthorized users.
  • Device lockout: Most handheld devices provide a lockout option that locks the device if someone makes several consecutive unsuccessful
    attempts to enter the password, PIN, or pattern. Using the lockout option can thwart a brute-force attempt to guess your password, PIN, or
    pattern. Setting the lockout limit to 10 attempts is usually sufficient.
  • Auto-wipe: Auto-wipe is similar to the lockout option, but more secure. After several consecutive unsuccessful password, pattern, or PIN
    attempts, the device will automatically erase (wipe) all stored data and reset itself to the factory defaults.
    When you use the auto-wipe option, make sure to back up your data regularly (for example, to a desktop computer or a cloud storage
    service). Consult your device’s documentation for instructions on backing up data.
  • Encryption: Certain handheld devices are capable of employing data encryption. Consult your device’s documentation or online support
    resources for information about available encryption options.

The following common features are frequently useful, but can also create security risks. You may want to consider disabling them:

  • Bluetooth: Consider disabling Bluetooth connectivity on your device unless you need it. Hackers and data thieves can use Bluetooth
    connections to “eavesdrop” on your device and access your sensitive data
  • GPS: Consider disabling Global Positioning System (GPS) and other location services unless you need them. Your physical location (or the
    locations of your device) is a piece of sensitive data that you may not want stored or broadcast. Conversely, if your device is GPS-enabled,
    some apps and services (such as Find My iPhone) can help locate your device if it is lost or stolen.

Find, Lock, or Erase a lost or stolen device
Android Device

  • Find, lock, or erase a lost Android device
  • If you lose an Android phone or tablet, or Wear OS watch, you can find, lock, or erase it. If you’ve added a Google Account to your device, Find My
    Device is automatically turned on. Learn how to make sure that your device can be found if it gets lost.
    To find, lock, or erase an Android phone, that phone must:
    • Be turned on
    • Be signed in to a Google Account
    • Be connected to mobile data or Wi-Fi
    • Be visible on Google Play
    • Have Location turned on
    • Have Find My Device turned on
    If you used your lost phone for 2-step verification, you must have a backup phone or backup code.
    Remotely find, lock, or erase
    1. Go to android.com/find and sign in to your Google Account.
    • If you have more than one phone, click the lost phone at the top of the screen.
    • If your lost phone has more than one user profile, sign in with a Google Account that’s on the main profile. Learn about user
    profiles.
    2. The lost phone gets a notification.
    3. On the map, you’ll get info about where the phone is.
    • The location is approximate and might not be accurate.
    • If your phone can’t be found, you’ll see its last known location, if available.
    4. Pick what you want to do. If needed, first click Enable lock & erase.
    • Play sound: Rings your phone at full volume for 5 minutes, even if it’s set to silent or vibrate.
    Secure device: Locks your phone with your PIN, pattern, or password. If you don’t have a lock, you can set one. To help
    someone return your phone to you, you can add a message or phone number to the lock screen.
    Erase device: Permanently deletes all data on your phone (but might not delete SD cards). After you erase, Find My Device
    won’t work on the phone.
    Important: If you find your phone after erasing, you’ll likely need your Google Account password to use it again. Learn about
    device protection.
    Apple Devices
    • If your iPhone, iPad, or iPod touch is lost or stolen
    • If you lose your iPhone, iPad, or iPod touch or think it might be stolen, these steps might help you find it and protect your information.
      If Find My [device] is enabled on your missing device
      You can use the Find My app to find your device, take additional actions to help you recover it, and keep your information safe.
      1. Sign in to iCloud.com/find on the web or use the Find My app on another Apple device.
      2. Find your device. Open the Find My app or go to iCloud.com and click Find iPhone. Select a device to view its location on a map. If the device is nearby,
      you can have it play a sound to help you or someone nearby find it.
      3. Mark As Lost. This will remotely lock your device with a passcode and you can display a custom message with your phone number on your missing
      device’s Lock screen. It will also keep track of your device’s location. If you added credit, debit, or prepaid cards to Apple Pay, the ability to make
      payments using Apple Pay on the device is suspended when you put your device in Lost Mode.
      4. Report your lost or stolen device to local law enforcement. Law enforcement might request the serial number of your device. Find your device serial
      number.
      5. If your missing device is covered by AppleCare+ with Theft and Loss, you can file a claim for your lost or stolen iPhone. Skip to step 7 below.
      6. Erase your device. To prevent anyone else from accessing the data on your missing device, you can erase it remotely. When you erase your device, all of
      your information (including credit, debit, or prepaid cards for Apple Pay) is deleted from the device, and you won’t be able to find it using the Find My app
      or Find iPhone on iCloud.com. After you erase a device, you can’t track it. If you remove the device from your account after you erase it, Activation
      Lock will be turned off. This allows another person to turn on and use your device.
      7. Report your lost or stolen device to your wireless carrier, so they can disable your account to prevent calls, texts, and data use. Your device might be
      covered under your wireless carrier plan.
      8. Remove your lost or stolen device from your list of trusted devices.

If you use Family Sharing, any family member can help locate another member’s missing device. Just have your family member sign in to iCloud with their
Apple ID, and you can find any device that you or your family members use with Family Sharing.

If Find My [device] isn’t turned on on your missing device
If you didn’t turn on Find My [device] before your device was lost or stolen, it can’t be used to locate your device. But you can use these steps to help protect
your data:
1. Change your Apple ID password. By changing your Apple ID password, you can prevent anyone from accessing your iCloud data or using other services
(such as iMessage or iTunes) from your missing device.
2. Change the passwords for other internet accounts on your device. This can include email accounts, Facebook, or Twitter.
3. Report your lost or stolen device to local law enforcement. Law enforcement might request the serial number of your device. Find your device serial
number.
4. Report your lost or stolen device to your wireless carrier. Your carrier can disable the account, preventing phone calls, texts, and data use.
5. Remove your lost or stolen device from your list of trusted devices.
Find My [device] is the only way that you can track or locate a lost or missing device. If Find My [device] isn’t enabled on your device before it goes missing,
there’s no other Apple service that can find, track, or flag your device for you.

Social engineering, phishing, and other malicious activities
9 Examples of Social Engineering Attacks
Examples of social engineering range from phishing attacks where victims are tricked into providing confidential information, vishing attacks where
an urgent and official sounding voice mail convinces victims to act quickly or suffer severe consequences, or physical tailgating attacks that rely on
trust to gain physical access to a building.
The nine most common examples of social engineering are:
1. Phishing: tactics include deceptive emails, websites, and text messages to steal information.
2. Spear Phishing: email is used to carry out targeted attacks against individuals or businesses.
3. Baiting: an online and physical social engineering attack that promises the victim a reward.
4. Malware: victims are tricked into believing that malware is installed on their computer and that if they pay, the malware will be removed.
5. Pretexting: uses false identity to trick victims into giving up information.
6. Quid Pro Quo: relies on an exchange of information or service to convince the victim to act.
7. Tailgating: relies on human trust to give the criminal physical access to a secure building or area.
8. Vishing: urgent voice mails convince victims they need to act quickly to protect themselves from arrest or other risk.
9. Water-Holing: an advanced social engineering attack that infects both a website and its visitors with malware.
The one common thread linking these social engineering techniques is the human element. Cybercriminals know that taking advantage of human
emotions is the best way to steal.
Traditionally, companies have focused on the technical aspects of cybersecurity – but now it’s time to take a people-centric approach to cyber
security awareness.
How Does Social Engineering Happen?
Social engineering happens because of the human instinct of trust. Cybercriminals have learned that a carefully worded email, voicemail, or text
message can convince people to transfer money, provide confidential information, or download a file that installs malware on the company
network.
Consider this example of spear phishing that convinced an employee to transfer $500,000 to a foreign investor:
1. Thanks to careful spear phishing research, the cybercriminal knows the company CEO is traveling.
2. An email is sent to a company employee that looks like it came from the CEO. There is a slight discrepancy in the email address – but the spelling of
the CEO’s name is correct.
3. In the email, the employee is asked to help the CEO out by transferring $500,000 to a new foreign investor. The email uses urgent yet friendly
language, convincing the employee that he will be helping both the CEO and the company.
4. The email stresses that the CEO would do this transfer herself but since she is travelling, she can’t make the fund transfer in time to secure the
foreign investment partnership.
5. Without verifying the details, the employee decides to act. He truly believes that he is helping the CEO, the company, and his colleagues by
complying with the email request.
6. A few days later, the victimized employee, CEO, and company colleagues realize they have been a victim of a social engineering attack and have
lost $500,000.
Examples of Social Engineering Attacks
Savvy cybercriminals know that social engineering works best when focusing on human emotion and risk. Taking advantage of human emotion is
much easier than hacking a network or looking for security vulnerabilities.
These examples of social engineering emphasize how emotion is used to commit cyber-attacks:
Fear
You receive a voicemail that says you’re under investigation for tax fraud and that you must call immediately to prevent arrest and criminal
investigation. This social engineering attack happens during tax season when people are already stressed about their taxes. Cybercriminals prey on
the stress and anxiety that comes with filing taxes and use these fear emotions to trick people into complying with the voicemail.
Greed
Imagine if you could simply transfer $10 to an investor and see this grow into $10,000 without any effort on your behalf? Cybercriminals use the
basic human emotions of trust and greed to convince victims that they really can get something for nothing. A carefully worded baiting email tells
victims to provide their bank account information and the funds will be transferred the same day.
Curiosity
Cybercriminals pay attention to events capturing a lot of news coverage and then take advantage of human curiosity to trick social engineering
victims into acting. For example, after the second Boeing MAX8 plane crash, cybercriminals sent emails with attachments that claimed to include
leaked data about the crash. In reality, the attachment installed a version of the Hworm RAT on the victim’s computer.
Helpfulness
Humans want to trust and help one another. After doing research into a company, cybercriminals target two or three employees in the company
with an email that looks like it comes from the targeted individuals’ manager. The email asks them to send the manager the password for the
accounting database – stressing that the manager needs it to make sure everyone gets paid on time. The email tone is urgent, tricking the victims
into believing that they are helping out their manager by acting quickly.
Urgency
You receive an email from customer support at an online shopping website that you frequently buy from telling you that they need to confirm your
credit card information to protect your account. The email language urges you to respond quickly to ensure that your credit card information isn’t
stolen by criminals. Without thinking twice and because you trust the online store, you send not only your credit card information but also your
mailing address and phone number. A few days later, you receive a call from your credit card company telling you that your credit card has been
stolen and used for thousands of dollars of fraudulent purchases.
Download the Definitive Guide to People-Centric Security Awareness to learn how focus on human emotion and risk can instill a security culture in
your organization that protects against social engineering attacks.
How to Protect Against Social Engineering
“People affect security outcomes more than technology, policies or processes. The market for security awareness computer-based training (CBT) is
driven by the recognition that, without perfect cybersecurity protection systems, people play a critical role in an organization’s overall security and
risk posture. This role is defined by inherent strengths and weaknesses: people’s ability to learn and their vulnerability to error, exploitation and
manipulation. End-user-focused security education and training is a rapidly growing market. Demand is fueled by the needs of security and risk
management (SRM) leaders to help influence the behaviors that affect the security of employees, citizens and consumers.”
(Gartner Magic Quadrant for Security Awareness Computer-Based Training, Joanna Huisman, 18 July 2019)
To protect against social engineering attacks requires a focus on changing behavior. When company employees understand how easy it is to be
tricked or scammed by a social engineering attack, they are more likely to be vigilant and suspicious of emails, voicemails, texts, or other cyber-
attack approaches.
Changing human behavior is not easy and does not happen overnight. We know from first-hand experience that the best way to instill a cyber
security aware culture and to create internal cyber heroes is with a people-centric approach to security awareness training.
To effectively protect your company against social engineering requires a focus on five people-centric elements as the foundation for security
awareness training:
1. High Quality Content: engages users and provides a training program that resonates and changes behavior.
2. Personalized Campaigns: provide content that employees can relate to and apply to their day-to-day.
3. Collaborative Partner: work with a partner who uses a consultative approach to understand your unique needs to deliver a custom security
awareness program designed specifically for your organization.
4. Security Awareness 5-Step Framework: a training and awareness program built on a proven methodological approach to learning and changing
behavior.
5. Security Awareness As A Service: provides flexibility and support to effectively deploy, measure, and report results of phishing simulations,
awareness training, and campaign visibility.
How to Stay Protected Against Social Engineering
To stay protected against social engineering attacks, it’s important to recognize the power of ego. Each of us wants to believe that we would
never be tricked or scammed by a phishing email or other social engineering attack. However, as we know, cybercriminals rely on all aspects of
human emotion and nature to subtly deceive and trick people into acting.
It’s only with first-hand experience of being phished or violated by another social engineering approach that people really appreciate how social
engineering works. By using a people-centric approach to security awareness training that uses phishing simulations, engaging and relevant
content, and an understanding of human nature – you can stay protected against social engineering.
-Risks of public Wi-Fi
What is public Wi-Fi?
Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the
Internet for free. These “hotspots” are so widespread and common that people frequently connect to them without thinking twice. Although it
sounds harmless to log on and check your social media account or browse some news articles, everyday activities that require a login — like
reading e-mail or checking your bank account — could be risky business on public Wi-Fi.
What are the risks?
The problem with public Wi-Fi is that there are a tremendous number of risks that go along with these networks. While business owners may
believe they’re providing a valuable service to their customers, chances are the security on these networks is lax or nonexistent.
Man-in-the-Middle attacks
One of the most common threats on these networks is called a Man-in-the-Middle (MitM) attack. Essentially, a MitM attack is a form of
eavesdropping. When a computer makes a connection to the Internet, data is sent from point A (computer) to point B (service/website), and
vulnerabilities can allow an attacker to get in between these transmissions and “read” them. So what you thought was private no longer is.
Unencrypted networks
Encryption means that the information that is sent between your computer and the wireless router are in the form of a “secret code,” so that it
cannot be read by anyone who doesn’t have the key to decipher the code. Most routers are shipped from the factory with encryption turned off by
default, and it must be turned on when the network is set up. If an IT professional sets up the network, then chances are good that encryption has
been enabled. However, there is no surefire way to tell if this has happened.
Malware distribution
Thanks to software vulnerabilities, there are also ways that attackers can slip malware onto your computer without you even knowing. A software
vulnerability is a security hole or weakness found in an operating system or software program. Hackers can exploit this weakness by writing code to
target a specific vulnerability, and then inject the malware onto your device.
Snooping and sniffing
Wi-Fi snooping and sniffing is what it sounds like. Cybercriminals can buy special software kits and even devices to help assist them with
eavesdropping on Wi-Fi signals. This technique can allow the attackers to access everything that you are doing online — from viewing whole
webpages you have visited (including any information you may have filled out while visiting that webpage) to being able to capture your login
credentials, and even hijack your accounts.
Malicious hotspots
These “rogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable. Say you’re
staying at the Goodnyght Inn and want to connect to the hotel’s Wi-Fi. You may think you’re selecting the correct one when you click on
“GoodNyte Inn,” but you haven’t. Instead, you’ve just connected to a rogue hotspot set up by cybercriminals who can now view your sensitive
information.
How to stay safe on public Wi-Fi
The best way to know your information is safe while using public Wi-Fi is to use a virtual private network (VPN), like Norton Secure VPN, when
surfing on your PC, Mac, smartphone or tablet. However, if you must use public Wi-Fi, follow these tips to protect your information.
Don’t:
• Log into any account via an app that contains sensitive information. Go to the website instead and verify it uses HTTPS before logging in
• Leave your Wi-Fi or Bluetooth on if you are not using them
• Access websites that hold your sensitive information, such as such as financial or healthcare accounts
• Log onto a network that isn’t password protected
Do:
• Disable file sharing
• Only visit sites using HTTPS
• Log out of accounts when done using them
• Use a VPN, like Norton Secure VPN, to make sure your public Wi-Fi connections are made private
-Mobile application delivery/marketplace
Apple App Store Google Play Store
• As of 11/18/2020 the only reputable places to download and install / update apps are the Google play store for Android devices and
the Apple app store for Apple devices. These stores come pre-installed.
Trademarks:
Android and Google Play are registered trademarks of Google, Inc.
Apple, iPhone, iPad, and iPod Touch are registered trademarks of Apple Inc. App Store and Apple Pay are a service mark
of Apple Inc.
Norton Secure VPN is a Copyright of NortonLifeLock Inc.
Other names may be trademarks of their respective owners.


Stylized plaque displaying currency coming from a slot

Overdraft Protection

CSB Overdraft Protection offers you a personal line of credit combined with the simplicity and convenience of your checking account — and you are in complete control. Best of all, you don’t have to worry about inadvertent overdrafts in your checking account. With Overdraft Protection, you avoid costly overdraft charges and embarrassing check returns.

All Benefits

Stylized letter envelope encircled by two arrows

Reorder Checks

Effective June 3, 2025, we are changing vendors for personal and business checks.  This switch provides a more cost-effective solution for our customers.  The link to order checks will be updated on June 3, 2025, to reflect this change. Customers can expect a higher quantity of checks per book and lower prices per book of checks.

We are here to help.  We have three simple ways you can reorder your checks – just find the right solution for you!

  1. Send a request through online banking or in the mobile app
  2. Visit one of our branches
  3. Order online: https://orders.mainstreetinc.com/ConsumerReorder?UseHeader=Yes&cid=2193

Stylized shield with up arrow in a circle

Secure Upload

You can securely upload any files that you need to get to us. Simply drag and drop the files from the folder they are in — or use “Browse Files” to browse and select the files the traditional way. Multiple files can be selected at a time.


Stylized gift envelope with ribbons and bow

Visa Gift Cards

It works just like a credit or debit card, and is accepted worldwide. Load the card for any amount between $25 and $500, and make your gift-giving easy! 

  • Perfect gift for any occasion
  • Accepted worldwide and online
  • Easily replaced if lost or stolen
  • Available for amounts of $25 to $500 

Purchase your card at any of our convenient branch locations today!


Stylized paper currency with left and right arrows

Wire Instruction

Incoming Wire Instructions:

  • If you are having money sent to your Chelsea State Bank account, you can use the below instructions — or provide this info to the sending institution for reference.

Incoming Domestic Wire Instructions:

  • Receiving bank routing number: 072403635
  • Receiving bank name: Chelsea State Bank
  • Beneficiary: Receiving customer name & last four digits of account number

Incoming Foreign Wire Instructions:

  • Intermediary institution: United Bankers’ Bank
  • SWIFT code: UBBKUS44
  • Receiving bank routing number: 091001322
  • Receiving bank name: United Bankers’ Bank (Bloomington, MN USA)
  • Receiving bank account number: //FW091001322UBBKUS44
  • Beneficiary bank name: Chelsea State Bank (1010 S Main St, Chelsea MI)
  • Beneficiary bank account number: 072403635
  • For credit to: Receiving customer name & last four digits of account number