Security

Updated September 15, 2022

LoanOfficer.ai, LLC (“LoanOfficer.ai”) and our partners treat security with the utmost priority and have created a detailed list of applications, technologies and policies to make sure your data is safe. This document lists some of our providers systems and procedures we have executed to make certain that your data is completely secured. Our security procedures are founded on the type of service chosen by our customer and are organized in four different categories: Physical Security; Network Security; People Processes and Redundancy and Business Continuity.

Physical Security

Our providers’ data-bases are hosted in several of the most tightly secured facilities accessible.

  • 24/7 365 Days a Year Security – The databases that store your data are protected seven days a week and  24 hours of the day.
  • Video Monitoring – Each database is observed 7x24x365 with night vision CCTV.
  • Limited Entrance – Entrance to the databases is tightly limited to a selected few pre-authorized personnel.
  • Biometric System – Two ways of authentication which include a biometric one, will be utilized together at the exact time to gain entrance to a data center.
  • Hidden locations – Servers are based inside casual-looking, secret locations that make them less probable to be at the center of an attack.

Network Security

The security personnel and secure buildings helps keep your data safe against even the most detailed electronic attacks. The ensuing is a subgroup of our network security procedures

  • Secure Sockets Layer (SSL) Certification – The statement  between your computer device and providers servers is completely concealed(encrypted). Which means even if the data transmitting between your computer or electronic devices and our servers were to be intercepted, it would be almost impossible for anyone to comprehend it.
  • IPS/IDS – Provider network is protected and viewed by extremely powerful and certified Intrusion Detection / Intrusion Prevention Systems.
  • Audit and Control – Any entrances are controlled and  audited.
  • Virus Scanning – Servers are scanning for viruses constantly using state of the art virus scan protocols.

Staff Processes

Providers’ databases framework  is not just technology, but rather also a disciplined attitude to procedures. This comprises policies about escalation, management, information sharing, risk, as well as the everyday tasks.

  • Access to Employees – Exclusive personnel with the highest security clearance have access to the databases data. Personnel access is logged and passwords are meticulously reviewed. Providers restrict access to customer data to only a chosen few of these personnel who need access to give support.
  • Audits – Audits are daily carried out and enhancements are created upon those findings.
  • `When Needed Basis – Obtaining database intel as well as customer data is done on a when needed basis, and only when greenlighted by management.

Redundancy

The procedure is created to safeguard your data and be secure even in difficult circumstances

  • Power Redundancy – Providers arrange its servers specifically for power redundancy – from power supply to power delivery.
  • Internet Redundancy – Provider is joined to the world –and you- through multiple highgrade  ISPs. So if one acts up or experiences a malfunction you can still navigate  to your applications and data.
  • Network Devices – Provider is hosted on redundant network devices to prevent any malfunctions at any tier on the internal network.
  • Temperature – Computing resources create a lot of heat and as a result in needs to be cooled to guarantee easy operation. Provider servers are supported by temperature control systems.
  • Fire Precaution – The Providers databases are protected by top industry-standard fire prevention and control devices.
  • Data Protection & Back-up – User data is backed-up systematically across various servers, helping secure the data in case of a hardware malfunction or destruction.