Website Login

Information And Data Privacy


3. Information & Data Privacy

Adopt and maintain a written privacy and information security program to protect Non-public Personal Information as required by local, state and federal law.

Purpose: Federal and state laws (including the Gramm-Leach-Bliley Act) require title companies to develop a written information security program that describes the procedures they employ to protect Non-public Personal Information. The program must be appropriate to the Company’s size and complexity, the nature and scope of the Company’s activities, and the sensitivity of the customer information the Company handles. A Company evaluates and adjusts its program in light of relevant circumstances, including changes in the Company’s business or operations, or the results of security testing and monitoring.

What This Means From a Customer's Viewpoint

"My non-public personal information is being protected."

Our Resources For Compliance

Click a logo for more information.

Iron Mountain

Compliant cost-effective shredding services for all size businesses for one-time and periodic document destruction.

Your business is producing more information than ever before—at a time when privacy and information disposal laws are increasing exponentially. As a result, you need to ensure that you’re not only protecting your sensitive business and customer information, but that you’re securely disposing of it.

With Iron Mountain’s Secure Shredding services, you’ll be able to safely and cost-effectively destroy unnecessary paper-based documents while overcoming your information privacy challenges:

Maintain a consistent, auditable chain of custody from pickup to destruction Stay current and compliant in an ever-changing regulatory climate. Retain complete visibility via reporting and online monitoring tools that help you keep control over your program, services, and costs.

  • Criminal Record Searches
  • Global Sanctions
  • Credit Checks
  • Education, Employment and Professional License Vefifications

REDS - Real Estate Data Shield

REDS can provide an entire office with the knowledge on how to handle non-public information or NPI.

REDS provides Compliance Solutions preparing you for Regulatory Scrutiny in an E-Learning Environment.

Prepare for lender and regulator compliance scrutiny. REDS Compliance Management Platform provides settlement service providers with mandated security compliance solutions: Information policy templates, online training, certification, and company security self-assessment tools

Position your company for lender compliance audits and contractual scrutiny. Access our compliance and data security training online from everywhere at home or work, day or night. You will be able to apply your learning experience instantly without interrupting your daily


Train your staff in privacy requirements and in safeguarding of personal information. Our Data Security Compliance Manual provides guidelines, procedures and policy templates. These help you to demonstrate compliance while minimizing risk and exposure to data breaches.

SCA - Security Compliance Associates

Information Security Policy & Maintenance

SCA can provide your office expert assessment services for Information Security, and certification for ALTA Pillar #3.

Regulatory and Lender requirements are no longer a thing of the past. Increased pressure from both the lenders and regulatory bodies are emerging at a head-spinning rate. Let SCA with their non-disruptive, comprehensive and partner oriented approach provide you a cost effective way to relieve this burden.

As an industry leading provider with clients all over the country, SCA brings a strong team of information security experts to your organization. With over 14 years of experience providing thousands of information security assessments to Financial Institution clients (lenders) as well as other industries, SCA has developed specific Title and Settlement security assessment services. The staff is equipped with the strongest and broadest information security certifications available in the industry.

Focused on Pillar # 3, let SCA solve the problem, get you compliant and certified for the only best practice required by law.


ShortTrack’s Easy Orders enable real estate agents to place orders directly from their software (dotloop, zipLogix and DocuSign TR) into your title software.

Store data and documents encrypted on ShortTrack's portal for secure delivery of wire instructions and NPI.

Create customized web-forms for sellers, buyers and real estate agents.

Clients can e-sign documents using our DocuSign integration.


Document and file security for your entire business

Pioneer Technology Group, specializes in secure technology for title agencies, registers of deeds, county recorders, and courthouses across the U.S. Our team consists of title industry veterans, and we have over 150 years of combined experience providing independent agents with title technology.

With our YourDox system, your agency files will be protected by industry leading data security. Plus, you'll get automatic document delivery and state of the art technology that gives you the best marketing advantage in the title business.

With YourDox, you'll have the file security you need:

  • All files, documents and data secured at a SAS 70 Certified Data Center
  • User name and password authorization required for all file access
  • 256 bit encryption standard for all file activity and document delivery
  • Facility access monitored by video, keycard, and biometric scanning
  • Audited data center with redundant systems for Power, and HVAC

You'll also have our Lifetime Marketing Advantage:

  • Paperless document delivery to your buyers and sellers
  • Custom websites branded to your agency, and your realtors and lenders
  • Consumers can add documents to their branded websites at no cost


Zix protects email in transit, helping title companies meet their regulatory obligations.

Zix is the leader in easy-to-use email encryption, with nearly 15,000 business customers.

ZixGateway offers seamless email encryption by automatically scanning and encrypting emails and attachments that include NPI.

ZixMail provides end-to-end encryption to protect emails and attachments with a single click..


Want to create your own policies and procedures?

Please login, if you are an FNF Agent for the Tools and Resources to complete this pillar on your own.