Join  |  Login  |   Cart    

Notary Rotary
What are your Anti-Identity Theft procedures?
Notary Discussion History
 
What are your Anti-Identity Theft procedures?
Go Back to February, 2013 Index
 
 

Posted by Bear900/CA on 2/9/13 3:04am
Msg #454944

What are your Anti-Identity Theft procedures?

http://business.ftc.gov/documents/bus54-financial-institutions-and-customer-information-complying-safeguards-rule

http://www.federalreserve.gov/bankinforeg/interagencyguidelines.htm

http://www.ftc.gov/bcp/edu/microsites/redflagsrule/index.shtml

Think about this:

• Loan officers who transfer loan data to loan processors and banks use (or should) password protected or encrypted email or they upload to secure websites.

• Loan websites that gather 1003 information must be secure.

• Anyone who pulls a credit report is usually required to have a Red Flags Policy (SAFE Act) in place.

• Brokers and banks who have the same information that we do are required to follow the FTC, GLB and FACT Act (Identity theft) rules which require an Anti-Identity Theft Policy, training of personnel and someone in place to manage the process.

• They are also required to ‘verify’ that all third party vendors have their own policies and procedures in place. Theoretically brokers need to verify title company’s policies and procedures.

• If a loan officer or broker wants to use a home office they must have a locked office door, locked cabinets, shredder, and password protected computer and pay $200 for a home office inspection, complete with pictures, annually if they pull credit reports.

• Notaries get to buy ‘privacy guards’ for notary journals and keep them locked up.

• Some disparity here?

After all this expensive and time consuming security to meet rules and regulations, the end notary receives unsecure PDFs with the Full Monty of customer information.

I have seen bits of discussion on GLB here in the past but no real comparison or awareness of what the rest of the chain must do to keep customer information secure.

What steps do you take to keep customer informtion secure? In what ways do you share it and how? How liable should a notary be, considering we probably have more information sent to us then most people in the loan process?

Think about it.

Reply by Beverly Kinlaw on 2/9/13 6:23am
Msg #454947

Good question! So if everyone in the process except the NSA has identity theft procedures in place and bo info got stoken ---seems like the NSA could be held liable--lawsuit etc etc
Suggestions for a good economic anti-identify theft procedure for the NSA??

Reply by Bear900/CA on 2/9/13 11:42am
Msg #454977

Suggestions for a good economic anti-identify theft procedur

I was hoping to hear from more experienced notaries and some techies who could help out here.

I wish NR had separate forum for both Compliance and Anti-Identity Theft procedures. I don’t feel the search button information is sufficient (or accurate) and posts like these disappear quickly.

Compliance to new current laws is difficult to stay on top of. Deterring fraud is an expected duty of notaries.

I will make a LinkedIn forum to discuss both of these for permanent reference and post the name here for any who wish to participate and learn.

Another thread was discussing emailing docs so cybersecuity comes to mind as an issue. Knowledge and a continuously updated plan are essential. Here is a good starting point to devise a cybersecurity plan:

http://csrc.nist.gov/nice/


Reply by 101livescan on 2/9/13 8:10am
Msg #454952

Exactly on the money here Ben. That is why notaries in CA are background checked every two years and every four years live scanned for SOS by DOJ and FBI criminal records. In order to work for the best companies, we must carry $100,000 E&O insurance.

Privacy and document security are highly guarded by settlement agencies, title and escrow, but what about the nickle and dime signing services out there who go in and out of business at the drop of a hat.

You've opened a can of worms my friend. So all these newbie notaries who are being churned out by taking these quick and dirty online NSA courses are clueless about document security, haven't the first idea about ID fraud and consumer protection laws. Receive their documents in a PDF at the HOA business center. Pretty scary stuff. And these are the notaries working for $50 to $90. I think SS's have a lot to be worried about as the monkey in the middle. I don't think they can possibly carry enough E&O to protect themselves in the event of ID fraud if documents fall into the wrong hands.

Reply by Bear900/CA on 2/9/13 11:54am
Msg #454979

Re: Costs assciated with document security

Thanks Cheryl.

There has been much discussion on profits and expenses.

That raises the question, do we budget sufficiently to put in place and maintain identity theft practices and procedures?

There is no doubt you will incur some expense for that. Do you charge enough to cover that additional necessary expense?


Reply by BrendaTx on 2/9/13 8:10pm
Msg #455018

**Receive their documents in a PDF at the HOA business center.**

LMAO.

Reply by Virginia/PA on 2/9/13 8:51am
Msg #454956

One company comes to my mind is Nations Direct who take the time to send docs password protected and call the notary with the password so it is not part of any email that could get hacked, but then asks the notary to "faxback" half the package and the "faxes" are sent to an email address (which I prefer since I need to pay 10 cents per page for faxes) but they don't instruct you to password protect the faxback which contains not only the documents but signed borrower documents. I always password protect all "faxback" when it goes to an email address. I avoid using my faxback service since the file resides on a 3rd party company's server and faxes of that kind cannot be password protected.

Reply by Bear900/CA on 2/9/13 11:46am
Msg #454978

Protecting faxbacks

Thanks for your response Virginia.

Please tell the audience here how you password protect faxbacks.

Thanks!

Reply by FormerEO on 2/9/13 7:48pm
Msg #455013

What are you worried about?

If the title company sends out the docs without securing them (virtually 100% of the time), why are you worried? Just for argument sake, if a borrower's identity was compromised there is no way of anyone knowing at which point in the chain of handling the docs where the data was intercepted.

Reply by Bear900/CA on 2/10/13 7:33am
Msg #455030

I want to make sure I get you input right. Is this what you're saying?

1) The title company doesn’t practice security so I don’t need to worry.

2) Breach of security could happen anywhere in the chain of handling the docs so there is no way I can be held liable.



Reply by FormerEO on 2/10/13 11:26am
Msg #455044

What I am saying is that there are so many hands that the docs pass through it is impossible to discover at what point in the chain of possession did the data get compromised.

If you take prudent precautions and safe business practices you have nothing to worry about, so don't.

This past week the Federal Reserve Bank confirmed that one of their internal computers was hacked into and compromised. If the Federal Reserve, the Washington Post, the Wall Street Journal, the New York Times, the White House, the Pentagon and Congressional servers have been hacked into within the past 30 days, realistically you are not going to stop those intent on doing bad things no matter what steps you take or whatever feeble attempts at security you try. Whatever software you might have access to and can afford will not come close to the security algorithms used by government servers.

You can spend a million dollars on computer security and still get hacked if the hackers want to get you.

Reply by Bear900/CA on 2/10/13 2:09pm
Msg #455063

Best Practices are what I was searching for when I asked “What are YOUR Anti-Identity Theft Procedures?”

Many here would like to know what prudent precautions to take and how they can effectively set them in place.

Since we are hired by title companies who have self-imposed mandates that are driven by lenders who require this of them under the Red Flags Act (FACT ACT) GLBA and CFPB, we may want to develop our own to meet their expectations, or not.

See what you think of this that also happened in the last 30+ days:

http://www.alta.org/bestpractices/docs/13-01-02_Executive_Summary.pdf

"Title Insurance and Settlement Company Best Practices

Executive Summary

Wednesday, January 2, 2013

Best Practice: Adopt and maintain a written privacy and information security plan to
protect Non-public Personal Information as required by local, state and federal law."

Of the seven pillars of the plan, the heart of the plan is based on the following:

• Physical Security of Non-public Personal Information Policy (NPI)
• Network Security of Non-public Personal Information Policy
• Disposal of Non-public Personal Information Policy

Since some here are unfamiliar with what Best Practices may be for Anti-Identity Theft Policies this discussion may be a helpful starting point of whether they should adopt one or not.


Reply by Bear900/CA on 2/10/13 2:30pm
Msg #455065

http://www.alta.org/bestpractices/docs/ALTA_Title_and_Settlement_Company_Best_Practices.pdf

This is the enhanced version I meant to post, my apologies. The bullet points I posted are in item 3.


Reply by Tudi/CA on 2/10/13 11:21pm
Msg #455109

I live near the "Silicon Valley" and have many computer experts as neighbors. Two of them are in charge of the IT security for huge companies. Here's what they told me regarding security:

1. Have one computer that is dedicated strictly to your notary work (use a different computer for your personal use). For maximum security, it should be hardwired into the wall and printer. (Not wireless).
2. If you decide to use your notary computer on a wireless basis, make sure you have a new and good router/modem combination product. These newer products have security aids built into them (old ones do not).
3. Do not tell people a lot about what you do for a living, especially about handling sensitive documents. If a person really wants to hack into your system, they can do it. It would take an expert and a lot of effort, but if they know your email and have a strong desire to break into your system, they can do it. Don't give people the "incentive" to hack into your computer.
4. Make sure you have good and updated security software on your computer.
5. Use a different email address for your business than your personal email account.

Reply by Bear900/CA on 2/11/13 12:02am
Msg #455112

NOW we're getting somewhere - Thanks! :) n/m

Reply by Tudi/CA on 2/12/13 6:22pm
Msg #455553

Re: NOW we're getting somewhere - Thanks! :)

Also, only "surf the web" and only open "personal email" and "unknown email" on your personal use computer (not on the computer you use strictly for Notary Business). My computer expert friends say that most people's computers get corrupted through people being curious and clicking on unknown sites or by messages of unknown people. If you want to do this, do it on your personal computer...if it gets compromised, you can have it cleaned up and your sensitive information hasn't been exposed. Also, beware of clicking/opening up "chain e-mails" that have been forwarded around the internet to many people, because these chain emails often contain viruses/trojans/malware.

Reply by Tudi/CA on 2/12/13 11:08pm
Msg #455603

Re: NOW we're getting somewhere - Thanks! :)

Also, if you're using a modem/router for wireless, it's very important that you change the default password (from the factory) to your own individual password. If you don't, the hackers try the known default passwords and if you haven't changed yours, they can hack into your system.


 
Find a Notary  Notary Supplies  Terms  Privacy Statement  Help/FAQ  About  Contact Us  Archive  NRI Insurance Services
 
Notary Rotary® is a trademark of Notary Rotary, Inc. Copyright © 2002-2013, Notary Rotary, Inc.  All rights reserved.
500 New York Ave, Des Moines, IA 50313.