If you are an agent you agree that you are accessing this site with the permission of your insured and have the authority to pass your insured’s insurance information to us as well as have your insured’s permission to use certain identifying information such as but not limited to borrower name, loan number and insurance verification reference number.This Institution, its affiliates, and our Licensors are the sole and exclusive owners of these computer systems, associated networks, and data. Those who unlawfully use or gain access to all or portions of the same without authority will be prosecuted.
System Access Policy
Internet Service Provider Connectivity and Reliability
Computer Viruses and Malicious Software
Intrusion Detection Capabilities and Firewalls
Our policies require that all production data be backed up on a regularly scheduled basis. The backups are done centrally. The data backup process is automated and monitored for any error situations. Our procedures call for each backup to be copied and stored off-site in a protected, climate controlled environment. Independent Security Assessments Our site employs the services of various external consulting and auditing firms to test our defenses and report on any vulnerability detected. In addition, our online data security procedures have been certified by the Cybertrust - an internationally recognized security consulting organization. This certification means that Cybertrust has tested us for vulnerabilities, and has determined that meets Cybertrust's standards for protection of systems and customer data. Cybertrust’s certification requires a series of evaluations and recommendations on overall network architecture, connectivity, physical security, redundancy and disaster recovery capabilities, environmental controls, system configurations, and operational policy compliance. Once the site is officially certified, Cybertrust security analysts work with us to regularly monitor adherence to their practices and standards. We are proud of our Cybertrust certification, and certification is not a function of simply letting Cybertrust technicians attempt to break into our systems. A team from ’s Information Security, Technical Services, and Electronic Commerce areas worked with the Cybertrust consultants, and regularly works with them, to identify potential data security threats, and to take what we believe to be appropriate actions to minimize or eliminate these threats. We take these measures to attempt to assure that the sensitive financial data we receive from our credit union customers and others is handled according to appropriate data security practices.Additional Information
From time to time our customers, business partners, and other interested parties ask for more detailed information about our information security infrastructure, including specific questions about the types of firewalls we use, how they are configured, operating systems on our servers, and details on our Intrusion Detection and Response procedures. However, we do not believe that it is in the best interest of our customers and others with whom we do business to divulge this type of detail about our computer systems and defenses, nor the details of our audits or security reviews. If this type of information were to get into the wrong hands, it could potentially be used against us. The first step in any hacker attack is to determine what types of defenses are in place at the targeted site. Armed with this knowledge, the potential hacker has one less step to go through in order to breach any defenses in place.