TITLE

DSI AND SAFEDOCS OFFER ID THEFT PROTECTION

PUB. DATE
January 2005
SOURCE
Mortgage Banking;Jan2005, Vol. 65 Issue 4, p135
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Document System Inc. have incorporated an identity- theft protection function to a custom interface between the Safedocs System and DSI's DocMagic. The enhanced interface provides borrower identity-theft protection and a protection feature during the loan closing process. By combining efforts with the National Notary Association and federal and state agencies, Safedocs and DocMagic users can use a digitized loan closing process while providing their borrowers with advanced features.
ACCESSION #
15783675

 

Related Articles

  • Don't Click That Link! Healthcare Providers Vulnerable To Online Security Threats.  // Eli's Home Care Week;4/23/2012, Vol. 21 Issue 15, p115 

    The article offers steps on how to safeguard against medical identity theft in the U.S. Attorney Kenneth Rashbaum of Rashbaum Associates points out that phishing attacks is a common method of identifying theft. It suggests applying a technical securities that will help prevent a threat to the...

  • ITRC Reports 2009 Data Breaches.  // Information Management Journal;Mar/Apr2010, Vol. 44 Issue 2, p19 

    The article presents results of the Identity Theft Resource Center (ITRC) Breach Report in the U.S. in 2009. The report shows that nearly 26% of the notable breaches is related to paper. It finds out that six of the 498 breaches had encryption or other strong security highlights. It notes that...

  • EFFICIENT METHOD FOR SECURELY MANAGING PASSWORDS. TANVEER, ASMA; KHAN, AIHAB; KHIYAL, MALIK SIKANDER HAYAT; HUSSAIN, SYED AFAQ // Journal of Theoretical & Applied Information Technology;4/30/2011, Vol. 26 Issue 2, p69 

    A password is a secret string that is used for security and authentication purposes and to provide access to a resource. Therefore it is more vulnerable to attacks such as hacking, phishing, identity theft, Cyber stalking and website cloning. But it is difficult for humans to remember large no...

  • The Rise of Black Market Data. Sutherland, Benjamin // Newsweek (Atlantic Edition);12/15/2008 (Atlantic Edition), Vol. 152 Issue 24, p10 

    The article discusses information theft and how information thieves attempt to sell the information online. The author describes how thieves use online black markets, forums and chat rooms to sell information, attempting to drive their prices up by offering bank account numbers that include...

  • The Rise of Black Market Data. Sutherland, Benjamin // Newsweek (Pacific Edition);12/15/2008 (Pacific Edition), Vol. 152 Issue 24, p10 

    The article discusses information theft and how information thieves attempt to sell the information online. The author describes how thieves use online black markets, forums and chat rooms to sell information, attempting to drive their prices up by offering bank account numbers that include...

  • SECURING MULTIPLE DIGITAL IDENTITIES. Kutar, Maria; Griffiths, Marie; Fletcher, Gordon // ITNOW;Autumn2015, Vol. 57 Issue 3, p28 

    The article discusses the need of securing increased problem of multiple digital identities. Topics discussed include protection of personal data information and online identity, development of wearables and health-related application, and development of personal information management services....

  • Keeping Track of Bits and Bytes. Chatfield-Taylor, Cathy // Association Meetings;Aug2006, Vol. 18 Issue 4, p24 

    The article discusses the importance of protecting the personal information of association meeting attendees by developing strong data-handling policies with hotels and other third parties. Failure of develop data protection strategies might result in identity theft. Those who are in charge of...

  • Data Bills Pile Up in Congress. Levey, Richard H. // Direct;10/15/2005, Vol. 17 Issue 14, p12 

    Reports on several new legislative bills related to personal data in the U.S. in 2005. Notification of Risk to Personal Data Act; Comprehensive Identity Theft Prevention Act; Federal Agency Data-Mining Reporting Act of 2005; Safe-ID Act.

  • Ontology Of Trusted Identity In Cyberspace. Katzan Jr., Harry // Journal of Service Science (19414722);2011, Vol. 4 Issue 1, p1 

    The nation's digital infrastructure is in jeopardy because of inadequate provisions for privacy, identity, and security. Recent Internet activity has resulted in an onslaught of identity theft, fraud, digital crime, and an increasing burden to responsible citizens. The computer security and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics