Ensuring the absolute highest levels of security.
Information security is an industry imperative - there is no room for error. We take it very seriously and do everything possible to protect your data.
Liberty systems are a virtual fortress.
We have passed the stringent Statement on Standards for Attestation Engagements (SSAE) No. 16 SOC 2 audit. This is an internationally recognized third party assurance audit that gives us a benchmark to compare our internal controls and processes against industry best practices, and gives our customers complete confidence that our systems are secure.
The purpose of the audit is to evaluate information systems relevant to security, availability, processing integrity, confidentiality, and privacy. Completing the SSAE 16 SOC 2 report means Liberty Title has a defined business process and IT controls in place which have been audited and tested.
Liberty Title has long adhered to all the standards in the SSAE 16 SOC 1, an enhancement to the standard for Reporting on Controls at a Service Organization known as SAS70. The biggest difference between these reports is that the SAS 70 confirmed the existence of the controls, where the SSAE 16 puts them to the test.
Plus we’ve passed stringent information security audits by the nation’s top banks. They’ve assessed our security policies and procedures – including corporate physical security, information security within our systems, system protections such as firewalls and password protection, business continuity and business interruption plans – and we’ve passed with flying colors. In fact, our first-in-class protocols are more extensive than most.
Security doesn’t stop when data leaves our hands.
In the real estate industry, we must constantly share sensitive information, such as loan packages. Anytime we do so, it’s encrypted and password protected using leading digital rights management technology and copy protection software. We can control document use and see when and how often documents are viewed. Plus, we can:
- Instantly revoke access to information
- Expire access & control usage
- Stop copying & unauthorized distribution
- Prevent document sharing & piracy
- Stop printing, or control the number of prints
- Stop screen grabbing
- Apply dynamic watermarks with individual user identification
- Audit document use & identify leaks
If our security measures remind you of a Mission Impossible assignment message, you’re not far off!