The Firm takes the privacy if our clients very seriously. At all times federal and state laws shall be adhered to in the sharing of Non-Public Personal Information. Access to Non-Public Personal Information to authorized employees who have undergone Background Checks and Credit Reports at hiring (“Cleared Employees”). Background checks will be performed on all Cleared Employees every three years thereafter
A security risk assessment shall be performed by a third party in order to minimize the Firm's risk of a security breach. The report should include an assessment of the locations, methods for storing, processing, transmitting and storing of client information as well assess the risk of potential internal and external threats tat could result in unauthorized disclosure, misuse, alteration, or destruction of non-public personal information or client information systems and assessments of the likelihood and potential damage to the firm and its clients. Remote desk-topping capabilities shall be included in the assessment. The assessment shall be performed at regular intervals to maintain the security of our clients information. Security of client information will be assessed prior to the implementation of any new software updates.
Client files shall not be removed from the office by anyone other than a Cleared Employee and then only to complete tasks relating to the file from home. In the event that a cleared employee does remove a file from the office, that file shall be returned the next business day. Computers with access to the Firm’s Network shall be logged off when the employee is not present. Tim will be in charge of assigning all user accounts, user names and Passwords. Passwords shall be changed every 180 days. Passwords shall be changed immediately when an employee leaves or is otherwise terminated. All passwords shall contain at least 8 characters of which there must be at least one capital letter and one number
Removable media containing non-public personal information shall only be used by the express permission of Hal or Tim and shall be treated with the utmost care. Removable media shall be deleted as soon as practically possible. From time to time the Firm will need to buy new equipment and dispose of old equipment. In the event any equipment is to be disposed of, the hard drive of any equipment shall either be destroyed or entirely wiped clean of all data prior to the equipment leaving the premises.
Emails containing non-public personal information shall be encrypted.
Employees shall only share Non-Public Personal Information with persons and/or companies that have been authorized by the client. In the closing process we are often required to share such information with other service providers (Lender’s, Insurance Companies, . . ) in order to facilitate the closing transaction. When possible obtain a written statement from the client authorizing those actions.
Client files shall be kept for 10 years. After a file is 7 years old, the file shall be reviewed and non-essential information shall be removed and destroyed. After the 10 year period has elapsed, the entire file shall be destroyed.
In the event a breach in a client’s privacy is detected, the client shall be notified of such breach as well as any lender involved in that client's transaction and local law enforcement.
The firm is subject to audits by its title underwriters, CFPB compliance companies, security risk assessment specialist such groups as part of the work that is performed for the firm. Each third party provider with access to non-public personal client shall be monitored and the firm shall have access to the results of all audits, security tests, intrusion logs or other evaluations.
Locks shall be placed on all office doors and all Non-public Personal information shall be stored behind locked doors.
Employees are only allowed to use company equipment for personal purposes before and after work and during their lunch break.
The Firms Privacy Policy shall be reviewed on an annual basis.
A security risk assessment shall be performed by a third party in order to minimize the Firm's risk of a security breach. The report should include an assessment of the locations, methods for storing, processing, transmitting and storing of client information as well assess the risk of potential internal and external threats tat could result in unauthorized disclosure, misuse, alteration, or destruction of non-public personal information or client information systems and assessments of the likelihood and potential damage to the firm and its clients. Remote desk-topping capabilities shall be included in the assessment. The assessment shall be performed at regular intervals to maintain the security of our clients information. Security of client information will be assessed prior to the implementation of any new software updates.
Client files shall not be removed from the office by anyone other than a Cleared Employee and then only to complete tasks relating to the file from home. In the event that a cleared employee does remove a file from the office, that file shall be returned the next business day. Computers with access to the Firm’s Network shall be logged off when the employee is not present. Tim will be in charge of assigning all user accounts, user names and Passwords. Passwords shall be changed every 180 days. Passwords shall be changed immediately when an employee leaves or is otherwise terminated. All passwords shall contain at least 8 characters of which there must be at least one capital letter and one number
Removable media containing non-public personal information shall only be used by the express permission of Hal or Tim and shall be treated with the utmost care. Removable media shall be deleted as soon as practically possible. From time to time the Firm will need to buy new equipment and dispose of old equipment. In the event any equipment is to be disposed of, the hard drive of any equipment shall either be destroyed or entirely wiped clean of all data prior to the equipment leaving the premises.
Emails containing non-public personal information shall be encrypted.
Employees shall only share Non-Public Personal Information with persons and/or companies that have been authorized by the client. In the closing process we are often required to share such information with other service providers (Lender’s, Insurance Companies, . . ) in order to facilitate the closing transaction. When possible obtain a written statement from the client authorizing those actions.
Client files shall be kept for 10 years. After a file is 7 years old, the file shall be reviewed and non-essential information shall be removed and destroyed. After the 10 year period has elapsed, the entire file shall be destroyed.
In the event a breach in a client’s privacy is detected, the client shall be notified of such breach as well as any lender involved in that client's transaction and local law enforcement.
The firm is subject to audits by its title underwriters, CFPB compliance companies, security risk assessment specialist such groups as part of the work that is performed for the firm. Each third party provider with access to non-public personal client shall be monitored and the firm shall have access to the results of all audits, security tests, intrusion logs or other evaluations.
Locks shall be placed on all office doors and all Non-public Personal information shall be stored behind locked doors.
Employees are only allowed to use company equipment for personal purposes before and after work and during their lunch break.
The Firms Privacy Policy shall be reviewed on an annual basis.