Updated March 9, 2022
This Security Statement applies to the products, services, websites and apps offered by 窪蹋勛圖厙., www.TrustScience.com USA Inc. and their affiliates (collectively 窪蹋勛圖厙), which are branded as 窪蹋勛圖厙, except where otherwise noted. We refer to those products, services, websites and apps collectively as the Services in this Statement.
窪蹋勛圖厙 values the trust that our customers place in us by letting us act as custodians of their data. We take our responsibility to protect and secure your information seriously and strive for complete transparency around our security practices detailed below. Ouralso provides further details around the ways we handle your data.
窪蹋勛圖厙s information systems and technical infrastructure are hosted with world-class, SOC 2 compliant cloud providers. Physical security controls at the data centers include 24×7 monitoring, cameras, visitor logs, and entry requirements.
窪蹋勛圖厙 is compliant with legislation that covers Credit Reporting Agencies in both Canada and the US and has received an annual Compliance Certificate to that effect from an independent analytics firm. 窪蹋勛圖厙 is SOC 2 Type II certified, customers under NDA may request a copy of the report by contacting us.
Access to 窪蹋勛圖厙s technology resources are only permitted through secure connectivity (e.g., VPN, SSH) and requires multi-factor authentication. Our production password policy requires complexity, expiration, and lockout and disallows reuse. 窪蹋勛圖厙 grants access on a need to know basis of least privilege rules, reviews permissions quarterly, and revokes access immediately after employee termination.
窪蹋勛圖厙 maintains and regularly reviews and updates its information security policies, at least on an annual basis. Employees must acknowledge policies on an annual basis and undergo additional security awareness training and skills development and/or privacy law training for key job functions.
窪蹋勛圖厙 conducts background screening at the time of hire. In addition, 窪蹋勛圖厙 communicates its information security policies to all personnel (who must acknowledge this) and requires new employees to sign non-disclosure agreements, and provides ongoing privacy and security training.
窪蹋勛圖厙 also has a Cyber Security team which focuses on application, network, and system security. This team is also responsible for security compliance, education, and incident response.
窪蹋勛圖厙 maintains a documented vulnerability management program which includes periodic scans, identification, and remediation of security vulnerabilities on application and infrastructure. All networks, including test and production environments, are regularly scanned using trusted third party vendors. By leveraging world-class cloud service providers, critical patches are always applied to the 窪蹋勛圖厙 production and test environments.
We encrypt your data in transit using secure TLS cryptographic protocols. All client data is also encrypted at rest in all environments.
Our development team employs secure coding techniques and best practices. As part of ongoing security awareness training, developers are made aware of secure coding practices that must be followed in the development of 窪蹋勛圖厙 products.
Development, testing, and production environments are separated. All changes are peer reviewed and logged for performance, audit, and forensic purposes prior to deployment into the production environment.
窪蹋勛圖厙 maintains an asset management policy which includes identification, classification, retention, and disposal of information and assets. Company-issued devices are equipped with full hard disk encryption and up-to-date antivirus software.
窪蹋勛圖厙 maintains security incident response policies and procedures covering the initial response, investigation, customer notification (no less than as required by applicable law), public communication, and remediation. These policies are reviewed regularly and tested bi-annually
Despite best efforts, no method of transmission over the Internet and no method of electronic storage is perfectly secure. We cannot guarantee absolute security. However, if 窪蹋勛圖厙 learns of a security breach, we will notify affected users so that they can take appropriate protective steps. We are committed to keeping our customers fully informed of any matters relevant to the security of their account and to providing customers all information necessary for them to meet their own regulatory reporting obligations.
To maximize availability, the 窪蹋勛圖厙 Services are hosted from enterprise-class data centers managed by public cloud providers. This infrastructure is divided into Availability Zones or AZ. Availability Zones are connected to automatically fail-over between Availability Zones without interruption. Highly resilient systems, and therefore service availability, is a function of the system design. Through the use of Availability Zones and data replication, 窪蹋勛圖厙 can achieve extremely short recovery time and recovery point objectives, as well as the highest levels of service availability.
Application and infrastructure systems log information to managed log repositories for troubleshooting, security reviews, and analysis by authorized 窪蹋勛圖厙 personnel.
Keeping your data secure also requires that you maintain the security of your account and API keys by using sufficiently complicated passwords and storing them safely. You should also ensure that you have sufficient security on your own systems. We also offer TLS and SFTP to secure the transmission of data.
To reach 窪蹋勛圖厙s Security and Privacy Officer:
Email: [email protected]
Toll-free: + 1 (866) 687-8789
窪蹋勛圖厙簧 is a member of the American Financial Services Association (AFSA), the Canadian Lenders Association (CLA), the National Automotive Finance Association (NAF), The Online Lenders Alliance (OLA) and the Texas Consumer Finance Association (TCFA).
窪蹋勛圖厙簧 is committed to Fair Credit Reporting Act (FCRA) compliance and helping you protect and understand your consumer profile. For more information, please see our Consumer Disclosure Page.
窪蹋勛圖厙簧, Credit Bureau 2.0簧 and Troo簧 are trademarks that are legally registered to www.TrustScience.com Inc. by the U.S. Patent & Trademark Office.
Credit Bureau+, 釦勳單簞釦釵棗娶梗, Smart Consent, Hidden Prime, Invisible Prime, Credit Bureau 3.0, Credit Bureau 4.0, Personal Credit Bureau, Personal Data Vault, Auto 釦勳單簞釦釵棗娶梗, Auto Bureau, Auto Credit Bureau, Rating Agency 2.0, Cashflow Bureau, One Touch Lending, Lead to Loan, Lender in the Cloud, Fl簞wbuilder, Fl簞wbuilder, FCRA-Compliant Insights From Lead to Loan, Go Beyond the Bureau, Fixing the Credit Catch-22, Find Invisible Primes, and Helping Lenders Find Great Borrowers are trademarks of www.TrustScience.com Inc.