General Overview

When you use AIB Social Media Channels you will be deemed to have read and are agreeing to comply with and be bound by the AIB Social Media Terms of Use and Privacy Statement.

AIB has embraced social media and opened a new channel of communication with our customers. From tweeting security tips and reminders to always taking personal or account-specific conversations offline, we assist our customers in protecting their personal and financial information.

Our Social Media Channels are public, meaning anyone can view our posts, comments and tweets. Unless you protect the information you choose to post (something you can do in some social network settings), this content will be viewable to anyone and is potential viewable in search-engine results (like on Google or Yahoo!).

Our social networking pages are continually monitored. It is our aim to respond to your question, issue or comment publicly. Alternatively, we will contact you directly where appropriate.

We encourage you to engage with us through these channels and every attempt will be made to respond to most postings. We may not be able to respond to your queries immediately and some responses may be limited. Depending on the nature of your request it may be necessary for us to contact others areas of AIB. In such cases, we will endeavour to advise you that your request may take longer to process.

There may be some questions and comments that we cannot directly address. These may include questions directly related to financial matters, ongoing legal matters, regulatory issues, or certain other elements of our business.

We recommend against and, in fact, discourage clicking on links posted by other users. We cannot guarantee the validity of these and they may pose risks to your computer or take you to inappropriate sites.

Our Social Media Channels should not be used to report phishing or any other criminal activity. If you find a Social Media Channel pretending to represent AIB that is not directly listed on our website, please report it to Additionally, any suspicious email activity should also be forwarded to