|
Website Login
Search

Information And Data Privacy


InfoData

3. Information & Data Privacy

Adopt and maintain a written information security plan (“WISP”) to protect NPI as required by local, state and federal law.

Purpose: Federal and state laws (including the Gramm-Leach-Bliley Act) require title companies to develop a written information security program (“WISP”) that describes the procedures they employ to protect NPI. The program must be appropriate to the Company’s size and complexity, the nature and scope of the Company’s activities, and the sensitivity of the Consumer information the Company handles. A Company evaluates and adjusts its program considering relevant circumstances, including changes in the Company’s business or operations, or the results of security testing and monitoring.

What This Means From a Customer's Viewpoint

"My non-public personal information is being protected."


Our Resources For Compliance

Click a logo for more information.





Infrascale

Our mission is to eradicate downtime and data loss with our cloud-based disaster recovery as a service (DRaaS) solution. Protect your data and systems from ransomware attacks, natural disasters and routine server crashes. Our solutions include:

  • 15-minute SLA for system failover (average recovery time is 70 seconds).
  • Unlimited DR tests and event days.
  • All-inclusive subscription pricing.

Knight Systems

Relieving our Title Industry customers of the stressful burden of maintaining their own technology infrastructure and security needs for over 20 years. We offer Managed Services Plans that include:

  • IT Network and Security Assessment
  • Patch Management
  • Automated Monitoring and Maintenance
  • Backup & Data Recovery plans
  • Antivirus/Malware support
  • Firewall and Intrusion Prevention
  • Email Management Services
  • Cyber Risk Insurance
  • Cybersecurity Awareness Training

Shred-it

A Stericycle solution, Shred-it is the most recognized secure information destruction provider globally. In 14 countries and in 170 markets, it has become the world-standard for information security and workplace privacy.

Since 1988, Shred-it has developed proprietary technologies, exclusive protocols and practices, and innovative products and services designed exclusively to protect businesses of any size from the ongoing threats and risks of privacy breaches.

YourDox

Document and file security for your entire business

Pioneer Technology Group, specializes in secure technology for title agencies, registers of deeds, county recorders, and courthouses across the U.S. Our team consists of title industry veterans, and we have over 150 years of combined experience providing independent agents with title technology.

With our YourDox system, your agency files will be protected by industry leading data security. Plus, you'll get automatic document delivery and state of the art technology that gives you the best marketing advantage in the title business.

With YourDox, you'll have the file security you need:

  • All files, documents and data secured at a SAS 70 Certified Data Center
  • User name and password authorization required for all file access
  • 256 bit encryption standard for all file activity and document delivery
  • Facility access monitored by video, keycard, and biometric scanning
  • Audited data center with redundant systems for Power and HVAC

You'll also have our Lifetime Marketing Advantage:

  • Paperless document delivery to your buyers and sellers
  • Custom websites branded to your agency, and your realtors and lenders
  • Consumers can add documents to their branded websites at no cost

ZIX

Zix protects email in transit, helping title companies meet their regulatory obligations.

Zix is the leader in easy-to-use email encryption, with nearly 15,000 business customers.

ZixGateway offers seamless email encryption by automatically scanning and encrypting emails and attachments that include NPI.

ZixMail provides end-to-end encryption to protect emails and attachments with a single click..

 

Want to create your own policies and procedures?

Please login, if you are an FNF Agent for the Tools and Resources to complete this pillar on your own.

 

Want to explore our underwriting services?
Facebook Instagram LinkedIn Twitter YouTube