What This Means From a Customers Viewpoint

My non-public personal information is being protected

Our Resources For Compliance

REDS - Real Estate Data Shield

REDS can provide an entire office with the knowledge on how to handle non-public information or NPI.

REDS provides Compliance Solutions preparing you for Regulatory Scrutiny in an E-Learning Environment.

Prepare for lender and regulator compliance scrutiny. REDS Compliance Management Platform provides settlement service providers with mandated security compliance solutions: Information policy templates, online training, certification, and company security self-assessment tools

Position your company for lender compliance audits and contractual scrutiny. Access our compliance and data security training online from everywhere at home or work, day or night. You will be able to apply your learning experience instantly without interrupting your daily business.

Train your staff in privacy requirements and in safeguarding of personal information. Our Data Security Compliance Manual provides guidelines, procedures and policy templates. These help you to demonstrate compliance while minimizing risk and exposure to data breaches.

Sign Up Today

Iron Mountain

Compliant cost-effective shredding services for all size businesses for one-time and periodic document destruction.

Your business is producing more information than ever before—at a time when privacy and information disposal laws are increasing exponentially. As a result, you need to ensure that you’re not only protecting your sensitive business and customer information, but that you’re securely disposing of it.

With Iron Mountain’s Secure Shredding services, you’ll be able to safely and cost-effectively destroy unnecessary paper-based documents while overcoming your information privacy challenges:

Maintain a consistent, auditable chain of custody from pickup to destruction Stay current and compliant in an ever-changing regulatory climate. Retain complete visibility via reporting and online monitoring tools that help you keep control over your program, services, and costs.

Sign Up Today

Continuity Secure

Can assist an agent in developing the suggested Business Continuity Plan

A Company that experiences a computer outage lasting more than 10 days will never fully recover financially and 50% will be out of business within five years. An estimated 25% of businesses do not reopen following a major disaster. 70% of small firms that experience a major data loss go out of business within a year. Of those businesses that experience a disaster and have no emergency plan, 43% never reopen; of those that do reopen, only 29% are still operational two years later.

The Management Recovery Plan outlines tasks that need to be performed and issues that need to be considered by members of the Local Crisis Management Team when an incident occurs. The roles and tasks are designed to be implemented as an ideal division of labor. This creates an optimal separation of responsibilities so there are no redundancies and the incident is managed correctly. Different stages identify various steps throughout the Management Recovery Plan. Since the roles and responsibilities required on the management level are broader, more extensive involvement is required of the management team in each of the stages.

Sign Up Today

Datamotion

Enables an agent to encrypt data traveling through the internet.

DataMotion SecureMail is a simple yet powerful solution that will secure sensitive email and file attachments from accidental exposure and data theft. At the same time, it ensures compliance, guards your reputation, builds customer trust, and reduces business process costs. And, the best part is that SecureMail is incredibly simple to set up and easy to use. In fact, most of our customers tell us that if they had known how easy it was, they would have implemented secure email sooner.

Simple send and receive. SecureMail makes sending and receiving secure email simple. Just click a button in your email client, and your message will be securely delivered. No special software or passwords need to be exchanged with recipients. And, you can easily access your message from your tablet, smartphone, desktop, or web email clients. Replies are securely delivered to your inbox and unencrypted automatically, ready to read without needing any additional steps. For those that prefer a portal, local language is automatically detected.

Maintain a consistent, auditable chain of custody from pickup to destruction Stay current and compliant in an ever-changing regulatory climate. Retain complete visibility via reporting and online monitoring tools that help you keep control over your program, services, and costs.

Sign Up Today

YourDox

Document and file security for your entire business

Pioneer Technology Group, specializes in secure technology for title agencies, registers of deeds, county recorders, and courthouses across the U.S. Our team consists of title industry veterans, and we have over 150 years of combined experience providing independent agents with title technology.

With our YourDox system, your agency files will be protected by industry leading data security. Plus, you'll get automatic document delivery and state of the art technology that gives you the best marketing advantage in the title business.

With YourDox, you'll have the file security you need:

You'll also have our Lifetime Marketing Advantage:

Sign Up Today

Arthur J. Gallagher

Risk management services for the Fidelity Pak.

The passage of Dodd‐Frank in 2010, establishment of the Consumer Financial Protection Bureau (CFPB) and the increased enforcement by the FTC of the Gramm‐Leach‐Bliley Act (GLB) requires that all “financial institutions”, including title agents, protect the personal non‐public financial data of their customers against theft by third parties. Cyber liability insurance protects the agent against liability arising from theft or disclosure of your customers’ personal information from your paper or electronic files. In addition, this insurance will also reimburse the agent for any government imposed fines/penalties as a result of a theft of data or breach of security.

Sign Up Today