Best Practices Portfolio Builder

advertisement
BEST PRACTICES PORTFOLIO BUILDER
For Implementing the Industry Best Practices
The Fidelity National Title Group has developed this Best Practices
Portfolio Builder for our agents. This tool, which is designed to be
used in concert with ALTA’s Best Practices – Version 2.0 (released
07/19/2013), is a comprehensive plan to assist in developing your
unique Best Practices Policies & Procedures.
Lenders will be expected to do ongoing due diligence of their thirdparty providers under the requirements of Consumer Financial
Protection Bureau (CFPB), relative to concerns for the protection of
consumers.
Each of ALTA’s 7-Pillars of Best Practices are addressed in this
Portfolio Builder with considerations that need your thought, by
providing detailed explanations, suggested solutions, providing
samples of written policies, procedures, checklists, links and
resources.
NOTE: This information is for your reference only and is not intended to represent the only approach to any particular
issue. These guidelines should not be construed as legal, financial or business advice. We recommend you consult
your legal counsel and subject-matter experts to determine appropriate policies, procedures and strategies applicable
to your office or organization. For more information about the ALTA Best Practices, please visit www.alta.org.
Putting ALTA Best Practices in Motion
Summary of the 7-Pillars of ALTA’s Best Practices
Start Here
Best Practice 1 - Licensing:
Click here to go to page 3
Establish and maintain current license(s) as required to conduct the business of title insurance and settlement
services. Purpose: Maintaining state mandated insurance licenses and corporate registrations (as applicable)
helps ensure the Company remains in good standing with the state.
Best Practice 2 - Escrow Account Controls:
Click here to go to page 9
Adopt and maintain appropriate written procedures and controls for Escrow Trust Accounts allowing for
electronic verification of reconciliation. Purpose: Appropriate and effective escrow controls and staff training
help title and settlement companies meet client and legal requirements for the safeguarding of client funds.
These procedures help ensure accuracy and minimize the exposure to loss of client funds. Settlement
companies may engage outside contractors to conduct segregation of trust accounting duties.
Best Practice 3 - Information and Data Privacy:
Click here to go to page 25
Adopt and maintain a written privacy and information security program to protect Non-public Personal
Information as required by local, state and federal law. Purpose: Federal and state laws (including the GrammLeach-Bliley Act) require title companies to develop a written information security program that describes the
procedures they employ to protect Non-public Personal Information. The program must be appropriate to the
Company’s size and complexity, the nature and scope of the Company’s activities, and the sensitivity of the
customer information the Company handles. A Company evaluates and adjusts its program in light of relevant
circumstances, including changes in the Company’s business or operations, or the results of security testing and
monitoring.
Best Practice 4 – Settlement Policies and Procedures:
Click here to go to page 60
Adopt standard real estate settlement procedures and policies that help ensure compliance with Federal and
State Consumer Financial Laws as applicable to the Settlement process. Purpose: Adopting appropriate policies
and conducting ongoing employee training helps ensure the Company can meet state, federal, and contractual
obligations governing the Settlement.
Best Practice 5 - Title Production:
Click here to go to page 70
Adopt and maintain written procedures related to title policy production, delivery, reporting and premium
remittance. Purpose: Adopting appropriate procedures for the production, delivery, and remittance of title
insurance policies helps ensure title companies can meet their legal and contractual obligations.
Best Practice 6 - Errors & Omissions and Fidelity Coverage:
Click here to go to page 83
Maintain appropriate professional liability insurance and fidelity coverage. Purpose: Appropriate levels of
professional liability insurance or errors and omissions insurance help ensure title agencies and settlement
companies maintain the financial capacity to stand behind their professional services. In addition, state law and
title insurance underwriting agreements may require a company to maintain professional liability insurance or
errors and omissions insurance, fidelity coverage or surety bonds.
Best Practice 7 - Consumer Complaints:
Click here to go to page 88
Adopt and maintain written procedures for resolving consumer complaints. Purpose: A process for receiving
and addressing consumer complaints helps to ensure reported instances of poor service or non-compliance do
not go undiscovered.
Please refer to the full version of ALTA Best Practices Framework to correlate when using this
Portfolio Builder to be sure that all items referenced in the ALTA Best Practices (Version 2.0
Published July 19, 2013) are incorporated in your Portfolio.
Industry
Best Practice

Pillar 1
Licensing
Establish and maintain
current license(s) as
required to conduct the
business of title insurance
and settlement services.
Purpose:
Maintaining state mandated insurance licenses and corporate registrations (as applicable) helps ensure the
Company remains in good standing with the state.
Considerations:
1.
2.
3.
4.
5.
6.
7.
What job functions need to be licensed?
Who is performing those functions?
Are individual licensees affiliated with your agency according to state and underwriter records?
How are individual and agency licenses tracked?
Who is responsible for tracking?
How is tracking documented?
Do you have an adequate number of licensees to cover vacations, medical leave, etc.?
Solutions/Suggestions:
1. Research your state insurance laws to ensure that licensing practices are in compliance.
2. Appoint person responsible for updating licensing appointments/terminations. Duties should include
notifying both the applicable state agency and underwriters to all personnel changes affecting
appointments.
Tools & Resources:
SAMPLE: Licensing Basic Checklist
Links to Midwestern State Information:
o State Statute Requirements
o Licensing Status
o License Renewal Procedures
SAMPLE: Licensing Basic Checklist
Date
Completed
Function
Completed By
Notes
Establish list of functions that
need to be licensed
Create file/notebook of license
copies
Contact underwriter to appoint
each licensee (if applicable)
Verify appointment status using
Department of Insurance
website (if applicable)
Regularly review applicable
state website for expirations
and accuracy of licensee
information.
Notify Underwriters when a
licensee is no longer with your
agency
ALTA Forms Licensing Fee Paid?
Example:
List of agency employees
(that need to be licensed)
License
Number
License expires:
Jane Doe
N43442
3/13/2014
1. Assign the duty of confirming annually that all employees required to be licensed under your state laws
are licensed, properly appointed by your underwriters, and license information is accurate, (ie; name
changes and current addresses). Document annual confirmation.
2. Establish and maintain appropriate compliance with ALTA’s Policy Forms Licensing. Any issuing agent
of title insurance is required to hold a license for the continued use of ALTA’s commitment, policy and
endorsement forms. The annual cost of a Policy Forms license is $195. Membership with ALTA includes
a Policy Forms license at no additional cost. http://alta.org/forms.
3. Create a licensing log with at least the following:
Employee Name
License Number
License Expiration Date
State Statute Requirements
Illinois:
http://www.idfpr.com/DFI/TitleInsur/titleinsur_main.asp
http://www.idfpr.com/DFI/TitleInsur/titleinsur_acts_rules.asp
Indiana:
http://www.in.gov/idoi/files/Bulletin135.pdf
Kansas:
http://kansasstatutes.lesterama.org/Chapter_40/Article_49/ (statutes)
https://www.ksinsurance.org/legal/regs_list.htm (regulations)
Michigan:
http://legislature.mi.gov/doc.aspx?mcl-500-1201a
http://legislature.mi.gov/doc.aspx?mcl-500-1202
http://legislature.mi.gov/doc.aspx?mcl-500-1208a
http://legislature.mi.gov/doc.aspx?mcl-500-1451
http://legislature.mi.gov/doc.aspx?mcl-500-7301
Minnesota:
https://www.revisor.mn.gov/statutes/?id=60K.32
https://www.revisor.mn.gov/statutes/?id=60K.31
https://www.revisor.mn.gov/statutes/?id=60K.34
Missouri:
http://insurance.mo.gov/laws/381title.php (statutes)
http://sos.mo.gov/adrules/csr/current/20csr/20csr.asp (regulations)
Nebraska:
http://nebraskalegislature.gov/laws/browse-chapters.php?chapter=44 (View 44-4047 through 44-4066)
North Dakota:
http://www.legis.nd.gov/cencode/t26-1c26.pdf?20130308084138
Ohio:
http://codes.ohio.gov/orc/3953
http://codes.ohio.gov/oac/3901
South Dakota:
http://legis.state.sd.us (Chapter 58)
Wisconsin:
http://www.sircon.com/resource/layout.jsp?page=wisconsinLps&type=wisconsin
Licensing Status
Illinois:
Business Entity must be registered to do business in IL though the IL Secretary of State Office
http://www.cyberdriveillinois.com/departments/business_services/corp.html
Title Entity must have a certificate to do business in Illinois – application must be submitted through an
underwriter
http://www.idfpr.com/DFI/TitleInsur/titleinsur_main.asp
http://www.idfpr.com/dfi/TitleInsur/TISearch.asp
Indiana:
http://www.sircon.com/resource/layout.jsp?page=indianaLps&type=indiana
Kansas:
https://towerii.ksinsurance.org/kid/psignon.do http://www.ksinsurance.org/industry/agent/conted.htm
Michigan:
http://www.dleg.state.mi.us/fis/ind_srch/ins_agcy/insurance_agency_criteria.asp (Title Agency)
http://www.dleg.state.mi.us/fis/ind_srch/ins_agnt/insurance_agent_criteria.asp (For Individual Title
Licensees)
Minnesota:
http://www.sircon.com/resource/layout.jsp?page=minnesotaLps&type=minnesota
Missouri:
http://insurance.mo.gov/agents/
https://sbs-mo.naic.org/Lion-Web/jsp/login/login_lsx.jsp (For continuing education status)
Nebraska:
http://www.statebasedsystems.com/
North Dakota:
http://www.nd.gov/ndins/producers/
Ohio:
https://gateway.insurance.ohio.gov/UI/ODI.Agent.Public.UI/AgentLocator.mvc/DisplaySearch
South Dakota: No licensing required
Wisconsin: http://www.sircon.com/resource/layout.jsp?page=wisconsinLps&type=wisconsin
License Renewal Procedures
Illinois: http://insurance.illinois.gov/producer/
Indiana: http://www.in.gov/idoi/2473.htm
Kansas: http://www.ksinsurance.org/industry/agent/conted.htm
Michigan: http://www.michigan.gov/difs/0,5269,7-303-22535_23031---,00.html
Minnesota: http://mn.gov/commerce/insurance/producers-adjusters/agencies.jsp Agencies
http://mn.gov/commerce/insurance/producers-adjusters/producers-nonresident.jsp Non-Resident Agents
http://mn.gov/commerce/insurance/producers-adjusters/producers-resident.jsp Resident Agents
Missouri: http://insurance.mo.gov/agents/
http://insurance.mo.gov/industry/faq/license.php (facts & questions)
Nebraska: http://www.doi.nebraska.gov/license/
North Dakota: http://www.nd.gov/ndins/producers/resident/renew/
Ohio: http://www.insurance.ohio.gov/Agent/Pages/HouseBill300-ChangestoOhioRevisedCode3905.aspx
South Dakota: No licensing required
Wisconsin: http://www.sircon.com/resource/layout.jsp?page=wisconsinLps&type=wisconsin
Back to Top
Industry
Best Practice

Pillar 2
Escrow Account
Controls
Adopt and maintain appropriate
written procedures and controls for
escrow trust accounts allowing for
electronic verification of
reconciliation.
Purpose:
Appropriate and effective escrow controls and staff training help title and settlement companies meet client and
legal requirements for the safeguarding of client funds. These procedures help ensure accuracy and minimize
the exposure to loss of client funds. Settlement companies may engage outside contractors to conduct
segregation of trust accounting duties.
Considerations:
1. Reconciliation frequency? Discussion of monthly, weekly, daily (recommended), and hourly.
2. Who prepares your escrow account reconciliations? Consider the value of staff time/experience to prepare
reconciliations?
3. Is now the time to consider using an outside reconciliation service? What software is available? What 3 rd
Party services are available?
4. How many escrow accounts do you have?
5. How many escrow accounts do you need?
 One for each office location or one for the agency
 One for recording and premium accounts
6. For multiple branch locations, are disbursements centralized?
7. What procedures are in place to ensure timely and appropriate handling of deposits?
8. Do you have the proper segregation of duties in place?
9. Are reconciliations reviewed by management, (initialed/dated) and are problems/shortages resolved in a
timely manner?
10. Who has access to your escrow account? How many check signers do you need?
11. Do you have proper safety measures for wiring funds out of escrow?
12. Are there procedures in place to immediately remove an escrow signatory upon employee termination or
resignation?
Solutions / Suggestions:
You probably already have many of these best practices in place, but not necessarily documented well (meaning
there is no written procedure or written collection of materials stating that you have the processes in place).
Below are the categories where written procedures are needed.
1. Escrow funds and operating funds are separately maintained.
 Escrow funds or other funds the Company maintains under a fiduciary duty to another are not
commingled with the Company’s operating funds or an employee/manager’s personal account
2. Escrow trust accounts are prepared with trial balances.
 On at least a monthly basis, and within 10 business days of the closing date of the bank statement,
escrow trust accounts are prepared with trial balances (“three-way reconciliation”), listing all open
escrow balances
 Consider outside 3rd party reconciliation services
3. Segregation of duties is in place to help ensure the reliability of the reconciliation and reconciliations are
conducted by someone other than those with signing authority
 Results of the reconciliation are reviewed by management and are accessible electronically by the
Company’s contracted underwriter(s)
 Immediate action is taken to fund shortages. If you utilize a third party reconciliation service, reports are
reviewed in a timely manner and all reconciling items are resolved
4. Escrow trust accounts are properly identified as “escrow” or “trust” accounts and this identification appears
on all account-related documentation including bank statements, bank agreements, disbursement checks
and deposit tickets.
5. Create a written policy for any interest bearing account for which the title company retains the interest.
Obtain written instruction, documentation and proper IRS forms to open a special interest bearing account
for a specific customer directing that the interest be paid to the customer and not the company.
6. All disbursements must be accurately documented and that documentation retained in the escrow file for
audit purposes.
7. Transactions are conducted by authorized employees only.
 Only those employees whose authority has been defined to authorize bank transactions may do so.
Appropriate authorization levels are set by the Company and reviewed for updates at least annually.
Former employees are immediately removed as authorized signatories on all bank accounts.
8. Unless directed by the beneficial owner, escrow trust accounts are maintained in federally insured financial
institutions.
 Background checks are completed in the hiring process. At least every three years thereafter, obtain
background checks going back five years for all employees, including managers and owners who have
access to customer funds.
 The ALTA Best Practices makes it clear that each agency should be monitoring their own
employees.
9. Utilize Positive Pay or Reverse Positive Pay, automated clearing house blocks and international wire blocks,
if available. Document utilization and maintain with all banking agreements.
10. Ongoing internal file and account audits are performed.
11. Training is conducted for employees in the management of escrow funds and escrow accounting.
12. Maintain a log of all training performed and attendance.
Tools & Resources:
MANUAL - Escrow Accounting Standards for Agents – available on the National Agency Website, under Training
SAMPLE 1: Simplified Escrow Account Checklist
SAMPLE 2: Guidelines for Disbursement of Proceeds
SAMPLE 3: Escrow File Audit Checklist for Closers
SAMPLE 4: (Internal Use) Escrow File Audit Procedures for Managers - Safeguarding Clients Funds
SAMPLE 5: Template for Escrow Accounting Procedure
Reconciling Your Escrow Account – Video Courseware – Located on the FNTG National Agency Website
www.nationalagency.fntg.com - Log in, click “Want to Learn” under the Training Tab drop down menu.
FNF Fraud Insights - Newsletters - This links to the National Agency Website - Log in, click Fraud Insights
under the Resources drop down menu.
Solution Providers:
 www.Rynoh.com
 www.SoftproCorp.com
 www.ADP.com
The costs are reasonable (for example, background checks are in the $30-$40 range and credit reports
are in the $8-$10 range).
 www.nationalagency.fntg.com
Our Agency Website has several direct resources, solution provider information and several educational
and training options for both internal and client use.
Sample 1: Simplified Escrow Account Controls Checklist
Function
When
Who
Notes
Last Completed
Date
Create List of Accounts, including contact person at bank
(Note if any Accounts are Interest Bearing and who the interest
is paid to)
Is each account titled as an ‘escrow account’ or ‘trust
account’?
Are Positive Pay, Automated Clearing House blocks and
international wire blocks in place for each account?
List of Authorized Signatories, including designations of who is
the account owner
List of personnel for whom credit report and background
checks were performed, as well as last date each report was
completed
Current month reconciliations completed?
Owner/Manager Review completed and documented?
Attach summary report of open issues (i.e., files that need
correction) for each month. (This will help tracking of specific
items and trends)
Closers Initials __________
Sample 2: Guidelines – Disbursement of Proceeds
Buyer/Borrower Proceeds:
Any amount shown on line 303 of the HUD-1 Settlement Statement (funds due from Buyer/Borrower) must come into our
escrow/trust account from the borrower or be disbursed to our borrower. Any funds received by any other party must reflect
on a separate line in the 200 series designating the source of funds.
In regions in the Western US where the buyer/borrower funds are credited prior to the printing of the final HUD-1 statement,
those funds should be reflected in the 200 series of the HUD-1 statement showing the source of funds and line 303 should
reflect zero proceeds or a refund, if any due to the buyer/borrower.
Seller Proceeds:
Most lenders closing instructions contain provisions which prohibit the assignment of proceeds due the borrower or seller
without the written consent of the lender prior to closing. Here are two examples:
"ANY disbursement on the seller side of the HUD-1 (excluding lien-related items specified in the title commitment and
standard closing costs) must be approved in writing by the Lender prior to disbursing the loan proceeds."
"Closing agent must not make disbursements from the loan proceeds unless they are specifically authorized by these or the
Supplemental Closing Instructions."
Each lender’s requirement could be different. Written requests to pay proceeds to anyone other than the seller(s) named on
the settlement statement must be shown in the miscellaneous section of the settlement statement and approved by the
funding lender as specified in their instructions.
In a refinance transaction, the loan proceeds may only be paid in strict compliance with the written closing instructions
provided by the funding lender. Any request to pay additional parties must be listed in the 1300 section of the HUD-1 and
approved in accordance with the lender’s instructions. In most cases, the funder’s approval of the HUD-1 or closing statement
is not sufficient.
If a principal requests these types of disbursements, it is best to say it is against our Company policy. It is the settlement
agent’s fiduciary duty to remain neutral and safeguard the funds on deposit. Lenders expect full disclosure of all receipts and
disbursements in accordance with written mutual instructions. If a lender disapproves of any requested disbursement be sure
to notify the party in writing. As the settlement agent it is our duty to ensure all of the conditions are met.
Settlement agents may accept written instructions to deposit proceeds directly into a bank account on behalf of the principals.
Settlement agents may also cut separate checks or send a wire in the name of each individual seller or borrower. Multiple
disbursements to the same payee are not acceptable especially when asked to disburse in increments of $10,000 or less as
this may be perceived as participation in a money laundering scheme.
Escrowed Funds Disbursement:
All escrow disbursements (check and/or wire) require two approvers. Evidence of the two approvals is required on the
check/wire request and the check disbursement register for every escrow.
a. Approvers’ and/or check signers’ responsibilities on external disbursements are to ensure the payment amounts are
supported, proper vendors are paid, and disbursements have been properly authorized by the escrow officer.
b. Approvers’ and/or check signers’ responsibilities over our fee income are to ensure that check/journals to recognize our
Title/Settlement fees are only processed after the order has closed.
Most lenders closing instructions contain provisions which prohibit the assignment of proceeds due the borrower or seller
without the written consent of the lender prior to closing. Here are two examples:
“ANY disbursement on the seller side of the HUD-1 (excluding lien-related items specified in the title commitment
and standard closing costs) must be approved in writing by the Lender prior to disbursing the loan proceeds.”
“Closing agent must not make disbursements from the loan proceeds unless they are specifically authorized by
these or the Supplemental Closing Instructions.”
Each lender’s requirement could be different. Written requests to pay proceeds to anyone other than the seller(s) named on
the settlement statement must be shown in the miscellaneous section of the settlement statement and approved by the
funding lender as specified in their instructions.
In a refinance transaction, the loan proceeds may only be paid in strict compliance with the written closing instructions
provided by the funding lender. Any request to pay additional parties must be listed in the 1300 section of the HUD-1 and
approved in accordance with the lender’s instructions. In most cases, the funder’s approval of the HUD-1 or closing statement
is not sufficient.
If a principal requests these types of disbursements, it is best to say it is against our Company policy. It is the settlement
agent’s fiduciary duty to remain neutral and safeguard the funds on deposit. Lenders expect full disclosure of all receipts and
disbursements in accordance with written mutual instructions. If a lender disapproves of any requested disbursement be sure
to notify the party in writing. As the settlement agent it is our duty to ensure all of the conditions are met.
Settlement agents may accept written instructions to deposit proceeds directly into a bank account on behalf of the principals.
Settlement agents may also cut separate checks or send a wire in the name of each individual seller or borrower. Multiple
disbursements to the same payee are not acceptable especially when asked to disburse in increments of $10,000 or less as
this may be perceived as participation in a money laundering scheme.
Cancelled Checks and Stop Payments:
Cashier's or Teller Checks
Payment on a Cashier’s or Teller check issued by the Company may not be stopped without observing special procedures. A
Cashier or Teller check in the hands of holder without knowledge of a defense must be honored by the financial institution on
which it is drawn because it is the obligation of the financial institution not “ABC Title”. For this reason to avoid duplicate
payment, issuing a new Cashier’s or Teller check can only be done after the person whose obligation is paid by the Cashier’s
or Teller check has completed an affidavit concerning the lost, stolen or destroyed item. Generally, the issuing bank will
require a bond or other form of security for the amount of the check if it is going to reissue the check before a 90 day period
has elapsed.
When a Cashier’s or Teller check has been issued to pay off an obligation that is part of closing and the check is lost, stolen
or destroyed, the Settlement Agent must obtain approval from the appropriate supervisor before directing that a replacement
item is issued. Under Company policy failure to observe this requirement may result in the Settlement Agent being personally
liable if the Company suffers a loss on the transaction when the lost, stolen or destroyed item is subsequently presented and
paid.
Trust Account Checks
A check that has been issued, processed in the accounting records, but subsequently lost, stolen or returned to the Company
must be canceled. If the original check has been returned, mark it “Canceled”, remove the signature portion of the check and
forward it to accounting for adjustment to the appropriate records. Canceled checks, if found, must be retained.
Unless a check has been lost or stolen, do not stop payment without consulting your supervisor. If the check has been lost or
stolen, first determine if the check has cleared the bank. The accounting department should contact the bank to verify that the
check has not cleared the bank. If it has not cleared, the bank should be advised both orally and in writing to place a stop
payment on the check. No check may be reissued until it has been determined that it has not cleared the bank and you have
received authorization from the accounting department. If the original check is subsequently found, it should be forwarded to
the accounting department with a note across the face of the original check stating that a stop payment was issued on this
check and indicating the date of the stop payment.
Disbursement or Receipt of Funds By Wire:
Wire transfer transactions usually involve large dollar amounts that must be processed quickly. There is also finality to a wire
transfer transaction at the time of execution. Generally (but not always), wire transfers are not subject to a stop payment,
recall, cancellation or adjustment; once a wire request has been executed the funds immediately become the property of the
transfer recipient. Because of these concerns and to minimize the risk of loss from errors or fraud, wire transfer authority is to
be centralized within a limited number of management, accounting or administration employees. No escrow department
employee shall be unilaterally authorized to issue or accept a wire transfer. Customers are to communicate all wire transfer
requests in writing and each escrow officer is then to communicate the wire transfer information to one of the authorized
employees in writing or by fax and confirmed in writing. In all cases of initiation of a wire transfer by a Settlement Agent,
escrow officer or other authorized party, a reasonable security procedure must be used to validate the transfer.
Closers Initials __________
Sample 3: Escrow File Audit Checklist for Closers
Issue/Topic
The print date noted by the system on the HUD-1 (where applicable)
is the same or prior to the signature date of the buyer/seller.
The HUD-1 was signed by all parties to the transaction.
An amended HUD-1 was prepared for any updates subsequent to the
closing.
Evidence that an amended HUD-1 (if applicable) was sent to the
affected parties (borrower/seller/lender) is in the file.
Supporting documentation exists for all disbursements including
payoffs (invoice, demand, etc.).
Supporting documentation agrees to the amount and payee shown on
the HUD-1.
Transactions on the HUD-1 are accurately stated and in agreement
with the check register (the HUD-1 and check register are consistent
and in agreement) and purchase contract.
Requirements specified in the lender's instructions pertaining to the
preparation of the HUD-1 were met.
The HUD-1 loan terms agree to the lender’s closing instructions.
The GFE comparison box does not obscure a tolerance violation.
For short sales, the transaction complies with all requirements outlined
in the Short Sale Final Approval Letter from the lender.
If the Short Sale Final Approval Letter is not received directly from the
short sale lender (i.e., it is addressed to the seller/borrower), the
contents, include- ing the amount,expiration date and terms and
conditions are verified with the lender, and the date, time and name of
person with whom you spoke documented on the letter.
For short sales, the transaction includes the required Short Sale
language in an amendment.
For short sales, the short sale approval letter was signed by the
buyer(s) and the seller(s) on a short pay sale and the borrower(s) on
a short pay refinance.
Third party deposits are disclosed on the HUD-1.
Third party deposits are processed via third party deposit instructions.
Third party deposits are noted in the lender’s instructions or approved
by the lender (in writing).
For transfers between escrow accounts, proper authorization from the
affect-ed principals is noted in both escrow files.
For transfers between escrow accounts, proper authorization from the
operation’s manager (or designee) is noted in both escrow files.
Disbursements are made when funds are available and in accordance
with state and local regulations as applicable-(Good Funds Law
applies in certain states).
Seller, lender and/or mortgage broker credits are fully described and
supported.
Title fees do not vary from filed or promulgated rates (where
applicable).
Note:If the Title unit is solely responsible for calculating rates and is
separate from the County Office (such as a CPF), exceptions will be
classified as “Other.”)
Escrow fees (including ancillary fees) do not vary from filed or
promulgated rates (where applicable).
Payoff demands are not accepted from mortgage brokers, realtors or
borrowers and all precautions taken to prevent fraud
Other fees properly disclosed and payee’s disclosed
Other charges properly disclosed and payee’s indicated
Yes/No
Comments
Issue/Topic
Seller proceeds are only disbursed to owners of record.
Disbursements to any other parties are approved in writing by the
lender.
Borrower proceeds (if applicable) are disbursed per funding lender’s
instructions. Disbursements to any other parties are approved in
writing by the lender.
For all Home Equity Lines of Credit (HELOCs) noted on schedule C of
the prelim/commitment, the Credit Line Authorization form is sent
with the payoff demand request or the payoff to the lender.
For all HELOCs, the written payoff request sent to the lender includes
specific “freeze language”.
Review Document Execution Guidelines (Approved Notaries in most
cases).
Underwriting requirements: There is a current title report/date down.
Underwriting requirements: Recorded liens on the prelim/commitment
are satisfied/cleared.
Underwriting requirements: Party names and legal descriptions are
correct on the insured documents.
Underwriting requirements: Documents are recorded within two
business days of settlement.
Seller, lender and/or mortgage broker credits are properly disclosed on
the HUD-1.
For all HELOCs, updated payoff figures were obtained no more than
two days prior to full payment of the loan.
Checks payable to credit card companies at the lender’s instruction,
are mailed directly to the credit card companies (not given back to
the borrower). The file copy of the check includes complete payee
name, address, and account number. These are disclosed in the
1300 series, unless the file contains specific instructions to the
contrary receivedfrom the funding lender. Approval is obtained from
the lender for payments made to credit card companies based
oncredit card statements retained in the file that differ from amounts
listed in the lender’s instructions.
The correct lines/series per RESPA guidelines and/or company policy
are used for entries on the HUD-1. In addition,a supplemental page
is attached when there is not enough space on the designated line
item. Earnest money deposits are properly disclosed on the HUD-1 in
accordance with RESPA guidelines.
State Withholding (CA, CO, GA, HI, ME, MD, MS, NJ, NY, OR, RI, SC,
VT, VA, WV) is appropriately documented and processed.
For FIRPTA (Foreign Investment in Real Property Tax), the Waiver of
Settlement Agent Responsibility form is completedfor all purchase
transactions or the waiver language is incorporated into the escrow
instructions, where applicable unless the principals determined
withholding applied and signed the FIRPTA Escrow Instructions.
Copies of the applicable IRS forms are in the file.
IRS reporting requirements are met including completion of a 1099-S
or 1099-S solicitations form.
Photocopy of deposit check, incoming wire and/or funding number (as
applicable) is located in the escrow file or is readily accessible.
A payoff demand is addressed to the respective title company, or the
payoff information is verified via phone, and the result is documented.
The payoff demand is not expired.
Sections A through I of the HUD-1 are complete and accurate.
Yes/No
Comments
Closers Initials __________
Sample 4 Internal use only: Escrow File Audit - Procedures for Managers
checklist for safeguarding of clients funds
Date:
__________________
Company/Branch:
Address:
City, State & Zip:
__________________
__________________
__________________
Escrow Officer:
__________________
Escrow File No.
Title Order No.
__________________
__________________
Auditor/Escrow Manager:
__________________
This audit checklist for fraud is provided as a general guidelinefor FNTG agents to assist with ALTA Best
Practice implementation.
I. View and print system generated statements:
______
______
Final HUD Settlement Statement; or
Master Closing Statement (buyer and seller)
Note: Escrow officers are trained to use a HUD-1 Settlement Statement only when required
under RESPA to do so. RESPA governs all federally regulated mortgage loans that are secured
by residential real property (including condos and co-ops) designed principally for the
occupancy of 1-4 families. In all cash or commercial transactions, you should only find a
Closing Statement, not a HUD form Settlement Statement.
II. Compare the system generated statements to the statements in the
escrow file. Look for the following issues:
______
Does the system generated statement match the statement shown in
the escrow file?
______
Were final settlement statements delivered to the parties (evidenced
by fax transmittal, cover letter(s), email or notes in settlement system)?
______
Does the total consideration (purchase price) reflected on the
settlement statements match when compared to the purchase and sale
agreement and/or escrow instructions?
______
Does the total consideration (purchase price) reflected on the
settlement statements match when compared to the lender’s
instructions (if any)?
Note: Any differences between the total consideration reflected on the settlement statement
and the total consideration reflected on the purchase and sale agreement and/or escrow
instructions and/or lender’s instructions must be documented by a subsequent amendment
agreed to by all parties to the transaction.
______
Are all debits and credits between parties to the transaction reflected
on the settlement statement properly documented in the purchase and
sale agreement and/or escrow instructions and/or lender’s instructions
and/or commission or payoff demand?
Note: If a HUD form of settlement statement is used look for credits to the buyer/borrower in
the 200 section. All credits should be fully described. The words “deposit” or “credit” is not
sufficient. Credits should be reflected as a credit from “whomever” and normally there will be
an offsetting debit from the seller’s column. Look in the 500 series of the HUD for offsetting
debits from the seller, the 700 series for offsetting debits from the real estate agents and the
800 series for offsetting debits from the mortgage broker or lender.
______
Are all items reflected on the settlement statement as “P.O.C.” (paid
outside closing) properly documented and agreed to on the purchase
and sale agreement and/or escrow instructions and/or lender’s
instructions?
III. Receipts: Compare the statement to the final check register.
______
From the register, are the amount of funds receipted into the file in
favor of the Buyer the same amount as shown on the statement?
Note: Funds received from the buyer should show on line 201 if the statement is a HUD form.
______
From the register, are the amount of funds receipted into the file from
third parties the same amount as shown on the statement?
Note: Funds received from third parties in favor of the buyer should be reflected on line 204,
if the statement is a HUD form.
______
Are the third party remitters disclosed on the receipts correctly?
Note: The system generated receipts should reflect the name of the remitting party, not the
buyer or seller who received benefit of the funds at closing.
______
Does the escrow file contain Third Party Deposit Instructions for
deposits received from parties outside of the escrow transaction?
______
Were the good funds laws followed for each receipt and subsequent
disbursement? In other words, did the escrow operation wait for the
funds to clear the bank prior to making disbursements?
______
Were funds transferred between files? Any incoming transfer of funds
between files should have a signed transfer instruction from the
transferring file.
IV. Disbursements: Compare the statement to the final check register.
______
From the register, do all disbursements match the amounts and
payees shown on statement?
Note: Outgoing wire transfers may reflect the receiving bank as the payee on the register.
Verify that the payee’s account name on the outgoing wire authorization form in the file
matches to the payee shown on the closing statement.
______
If Seller proceeds are wired and the account name or beneficiary name
for the payee of the outgoing is different than the Seller/Title holder
name, then review the file for an irrevocable assignment of proceeds.
______
Lender's instructions typically prohibit the payment of seller proceeds
to parties other than the record title holder. Verify that estimated and
final settlement statements to the lender reflect the payments to any
third parties on the 1300 section of the HUD.
______
Verify that there are not multiple disbursements of seller's proceeds
due to money laundering risks/
______
From the statement, add all receipts and all disbursements to verify
that the totals match the receipt and disbursement totals from the
register.
______
Were funds transferred between files? Any outgoing transfer of funds
between files should have a signed transfer instruction authorized by
the parties to the transaction.
______
Match the check copies or cancelled checks (if available) to the payees
and amounts shown on the check register and closing statements.
Please note any exceptions to the matching process.
______
All check registers or disbursement logs should reflect the initials of
the original check signers for all disbursements.
______
Were funds held and then disbursed after close of escrow? There
should be a new check register or disbursement log each time an
additional check is disbursed.
______
If there are still funds held in the file verify that there are proper
instructions as to the future disbursement of the funds.
______
Review the payoff of existing encumbrances:
______
Is there a current payoff statement in the file?
______
Is the statement issued in the name of the Company?
Note: There are exceptions to this rule. For instance, when escrow is ordering the payoff
statement over the payoff lender’s automated voice response system or from the lender’s
website, the statement will not be addressed to anyone. Escrow officers have been advised to
either stamp or write the Company name, date and sign their signature attesting to the receipt
of the statement from the payoff lender.
______
______
______
______
Does the amount paid match the amounts on the payoff
statement?
Did the owner/borrower sign the payoff statement,
approving the amounts to be paid?
Were the funds paid and delivered to the correct payee?
Was the correct loan paid off?
Note: Sometimes borrowers can have multiple loans on different properties with the same
lender. From time to time escrow will order a payoff statement and the lender will issue the
statement on the incorrect loan. Escrow then unknowingly pays off the wrong loan. It is
important to compare the payoff statement with the title report to validate that the principal
balance could have been paid down to the amount shown on the payoff statement within the
time allowed from date of origination.
______
Was payoff made to a private party beneficiary?
Note: If a private party beneficiary was paid through the escrow, verify that an original
release of the borrower’s obligation (satisfaction of mortgage or request for reconveyance or
consummation deed) was given exchange for the payoff check.
______
Was the payoff statement a result of a short sale?
Definition of Short Sale: A sale in which the outstanding obligations (loans) against the real
estate are greater than the amount for which the property can be sold. The seller must
provide an appraisal (typically outside of escrow) to the payoff lender validating the decreased
market value of the property. For example: If the property value has decreased to $300,000
and the owner owes $330,000. The owner may negotiate with the payoff lender to accept a
$300,000 payoff and forgive the $30,000 balance. The lender will sometimes accept the
shortage in lieu of having to foreclose on the property and sell it to regain some of their costs.
______
______
If the payoff was a short sale, read the payoff statement
and verify that the terms and conditions of the short
sale statement were strictly followed. The statement
will usually indicate that there can not be a subsequent
or concurrent transaction and will provide any amounts
that may be paid to the seller or any other party in
connection with the transaction.
______
If the statement represents the payoff of an existing
Home Equity Line of Credit, then look for a “freeze
letter” signed by the borrower instructing the payoff
lender to “freeze” the account so that the borrower can
no longer draw against it.
Review the payment of invoices to verify that the checks are made
payable to the invoicing parties.
______
Watch for bogus invoices which bear no invoice number
or property address and may appear to have been cut
and pasted or are otherwise incomplete.
V. Premium to the Underwriter
______
Review the posted premium in the file (fee ticket) to the settlement
statement to verify that fees collected were accurately paid to the
Underwriter from the trust account. Look for a reduction in any premium
fees to cover a shortage of funds in the file.
______
Verify that fees were accurately charged in accordance with the Company’s
published rates and is in compliance with the state’s filed rates (if applicable).
Note: Title rates are based on the property location. If the property is not located in the same
County as the office, different title rates apply (look for title invoice in the file). Escrow rates
are charged based on closing location, regardless of property location, so they should always
be consistent with the escrow office’s filed schedule of fees.
______
If notary fees are collected through the escrow file for a notary who is
also an employee of the Company, verify that the notary fees were
paid to the Company and not the employee. Note: Make sure you use approved and
insured Notaries for any transaction.
Note: It is our Company’s policy to pay notary fees to the Company and not the employee.
We accumulate the notary fees collected on behalf of the employee on a monthly basis and
pay the total through the Company’s payroll system, deducting the proper state and federal
withholdings.
VI. Forgery/Notary fraud: Compare copies of the notarized documents in
the file.
______
Are the buyer’s documents and seller’s documents acknowledged by
the same notary?
______
Are the grantors (sellers) named on the conveyance deed the same as
listed on the preliminary report or commitment?
VII. Check for inflated purchase price:
______
If possible, review the conveyance deed that was recorded just prior to
this transaction. Look for documentary transfer tax, if any, and
multiply the applicable rate times $1,000 to determine the prior sale
price on the property.
______
Is the price extremely inflated since the last purchase? If the
documentary transfer tax is not available, request the Affidavit of
Property Value or Preliminary Change of Ownership or similar form
that would have accompanied the prior transfer to determine the prior
sales price.
VIII. Verify that governmental reporting requirements were followed:
______
Is there a 1099-S Certification for No Reporting in the file? Federal
law requires that, unless the specific real estate transaction is exempt,
the transferor’s name, address, tax identification number, and the
amount of the proceeds must be reported to the Internal Revenue
Service.
______
Is the seller a foreigner? If so, did escrow withhold and report?
Note: FIRPTA - the Foreign Investment in Real Property Tax Act of 1980 - is a
Federal statute that authorizes the United States to tax foreign persons when they
transfer real estate located in the United States.
In order to help ensure that the federal government receives the taxes that are due
from foreign transferors, the statute requires the transferee to find out if the real
estate transferor is a foreign person.
If a real estate transferor is a foreign person and an exception as specified in the Act
does not apply, the transferee - or, in our case, the Settlement Agent - must
withhold 10 percent of the gross purchase price and report the transaction to the IRS
within 20 days after the closing.
If the transferor is a foreign person and we fail to submit the required tax, we may
be held liable for the tax that should have been withheld - as well as for penalties for
noncompliance.
______
Is the property located in California? Look for California withholding or
exemption from withholding forms.
Note: The California Revenue and Taxation Code requires that the buyer or other
transferee of California real estate withhold 3-1/3 percent of the total sales price.
This withholding is, in effect, a prepayment of the seller’s estimated state income tax
due from the gain on the sale of the real estate. Exemptions or waivers need to be
noted in the escrow file.
Sample 5: Template for Escrow Accounting Procedure
As you use this template, please keep in mind the following: This is a template. You must modify it to
reflect how you do things in your office. When your office is audited for compliance with Best
Practices, the auditor will compare your procedure manual to your actual practices.
Types of accounts
Our office has the following accounts:
Type of Account
Escrow/Trust Account
Incoming Wire Account
Account Number
Name of Bank
Notes
Provides a firewall between
the escrow account and
fraudsters.
Long-term Escrow
Accounts
Premium Trust Account
Recording Trust Account
Escrow trust account
The escrow trust account is required for closings and settlements. Incoming funds are
directed to the Incoming Wire Account and are transferred manually to the escrow trust
account when:_________________
Two signatures are required on all checks.
Long term escrow account.
This account is for construction holds, water holds, and other transactions where funds are being
held pending the resolution of a task or tasks, such as the issuance of a final water bill or the
completion of repairs or improvements.
Two signatures are required on all checks.
Premium trust account
This account holds the underwriter’s portion of the premium.
Two signatures are required on all checks.
Recording trust account
This account holds the funds being used for recordings.
Two signatures are required on all checks.
Deposits. Physical escrow account deposits are made daily and all deposits in transit over three days
old (i.e., weekends) are investigated. Separate deposit slips are prepared for each file indicating the file
number on each deposit slip. Copies of all deposited information (i.e. checks received as well as
validated deposit tickets) are kept in the closing files to prove funds were received in accordance with
the settlement statement or closing disclosure.
Wire Transfers. Wire transfer logs are maintained to by: ______________ in a ___________ (or
within our escrow software system). These logs are a special log specifically used to track wires and
supplement the data electronically maintained for individual files.
Check controls.
All escrow account bank statements and checks state the words “escrow account” or “trust
account”
(For paper checks) We lock our unused when not in the printer. W e also use locking printer
stands. Log checks out. We keep a record of all blank checks ordered and received and log
them out as each user is given a new supply. Inventory checks are performed randomly by
________. Unused checks are compared against the log to ensure they are still unused.
(For laser checks) Our safeguards for our laser check programs/systems include, but are not limited
to: 1) Print & Review the check register DAILY; 2) Print & Review a daily Void Transaction Report; 3)
Designate one employee to assume ALL wire transfer responsibilities; 4) Designate one additional
employee in the accounting department to confirm and verify ALL outgoing wires.
Copies of all disbursed checks are maintained in each file to prove funds were disbursed through the
escrow account in accordance with the HUD-1 settlement statement.
Signature stamps are not used on escrow checks.
Positive Pay or Reverse Pay services are recommended for escrow accounts whenever possible to
provide additional protection against fraudulent disbursements.
Voided checks are defaced by physically removing the signature line. The originals are retained with
accounting records.
Outstanding checks that were issued for payoffs and other lienable events, and checks for recording
are investigated if they have not cleared within ___3____ days.
Outstanding checks for other matters are reviewed monthly.
Long Term (Dormant) Escrow Account Procedures:
Long Term (Dormant) accounts are reconciled monthly using the same procedures noted for the
primary escrow account.
Signed escrow agreements detailing terms of release of funds, for example, funds being held for
earnest money; water/utility escrows; unfinished construction/repair escrows, are maintained in all
files where escrow funds are being held. Contact information for all the involved parties is also
contained in the file. Current copies of the file ledger showing disbursements-to-date are also held
in the relevant file.
Closing transaction records
We utilize _________ brand of escrow closing and accounting software.
The software
maintains an electronic log many of the following things (see the software documentation for
exact specifications), in an electronic format that can be printed as needed:

Unique file number. All records relative to a transaction must bear the unique case
number.

Receipts log, which lists all incoming funds and can be used to help verify daily deposits.

Checkbook register for each escrow account in which a record is kept of all
incoming and outgoing funds identified with the unique case number.

Ledger card for each case file, which details in chronological order all receipts and
disbursements for the particular case.

Trial Balance listing of all cases by number showing open balances (whether positive
or negative, and showing the total. This total should equal the running balance in the
checkbook register.
Reconciliation Procedures
Our escrow account is reconciled _________ (daily, weekly, monthly). A three-way reconciliation
is performed and any file shortages are investigated and resolved immediately – usually by funding any
shortages from the operating account. To the extent that we recover shortages from other parties at a
later date, we reimburse our operating account.
The three-way reconciliation is done using the generally accepted title agency accounting procedures.
The checkbook balance, reconciled bank balance and the escrow trial balance/ledger balance report
balances are reviewed for agreement.
The owner/manager, _________, critically reviews and formally approves the bank reconciliation by
initialing and noting the date of review. This process serves to verify that file shortages are timely
funded.
Escrow Account Controls
Our agency has policy of strict segregation of duties. Here is a summary of our closing function
staffing and procedures
What
Receiving and logging funds
Recording transactions in the
Checkbook register (electronic)
Preparing checks
Signing checks
Reconciling
Review of reconciliation issues
Who
Notes
Our Closers Officers handle the following tasks:
•
Receive Closing/Escrow Instructions
•
Record the Receipt of Funds in the software
•
Verify Good Funds
•
Work Up the Planned Disbursements
•
Balance the File Before Closing
•
Match the Checks to the Ledger Card Before Disbursing
•
Sign the Checks, along with a Countersigner
•
Initiate Outgoing Wire Transfers
•
Conduct the Closing
•
Perform Post-Closing Activities
•
Match the File Balance to the Trial Balance Line Item After Closing
Receptionist handle the following tasks:
•
Receive the Funding Check or Bank W ire
(Often Closer receives and gives to Receptionist for next step)
•
Enter Funding Check data in the software
•
Restrictively Endorse the Funding Check
•
Follow Up on Mortgage Releases
Bookkeeper handles the following tasks:
•
Record the Receipt in the Checkbook Register
•
Prepare the Daily Deposit
•
Compare the Deposit Slip to the Checks Received Before the Deposit is Made
•
Generate Checks
•
Record the Disbursements on the Ledger Card
•
Record the Disbursements in the Checkbook Register
•
Verify Outgoing Wire Transfers
•
Generate the Daily Escrow Trial Balance of Open Escrows
•
Confirm/Balance the Trial Balance Total to the Checkbook Register Total 2-Way
Reconciliation
•
Perform a 3-Way Reconciliation of the Monthly Bank Statement to the Trial Balance and
Checkbook Register—Note that the Manager reviews this 3-Way Reconciliation
Add other personnel or management who handle any escrow funds or who can approve any
disbursement of funds within internal accounts or through external accounts or procedures.
Back to Top
Industry
Best Practice

Pillar 3
Information &
Data Privacy
Adopt and maintain a written
privacy and information security
program to protect Non-public
Personal Information as required
by local, state and federal law.
Purpose:
Federal and state laws (including the Gramm-Leach-Bliley Act) require title companies to develop a written
information security program that describes the procedures they employ to protect Non-public Personal
Information. The program must be appropriate to the Company’s size and complexity, the nature and
scope of the Company’s activities, and the sensitivity of the customer information the Company handles. A
Company evaluates and adjusts its program in light of relevant circumstances, including changes in the
Company’s business or operations, or the results of security testing and monitoring.
Considerations:
1. Assess the physical security of Non-public Personal Information (NPI) – both hard copy and
digitally stored information.
 Only employees that have undergone a background check should be able to access NPI.
 For NPI - know “what you have” and “where you have it” and “what format it is in” to be
able to protect it.
 Physically separate any area where NPI may be accessed by a door, receptionist or other
controllable portal from your closing/conference rooms, public areas.
 Lock file rooms, file cabinets when not in use or when no one is present.
 Implement a Clean Desk Policy for your office.
 Consider how to eliminate access to areas containing NPI for external cleaning services,
repair technicians, vendors that deliver supplies, services that provide file storage or
shredding services, Realtors® and other third parties.
2. Make sure you have secure delivery methods in place.
 “Hard Copy”/Paper delivery and electronic delivery of information containing NPI.
 Implement required use of encrypted email for electronic transmissions when sending NPI.
3. Establish Information Technology Policy, Record Retention & Record Disposal Policy, Privacy &
Information Security Plan, Clean Desk Policy & Physical Security Compliance Notice for your
operation.
 Appropriate ongoing review of your implemented policies, management and training of
employees on your adopted policies to help ensure compliance with the company’s
Information Security Plan and any other written policies/procedures.
 Company policies communicated and training provided to new hires.
 Employees must acknowledge by signature that they have reviewed and will abide by your
established policies.
 Company policy in place to “vet” your 3rd Party Vendors and a requirement of those
Vendors to acknowledge by signature the company Information Security Plan using a
Compliance Notice required by your company.
4. Establish an internal audit process to ensure ongoing compliance and employee training with
the company’s Information Security Policy and other Data Security Policies.
5. Establish that your computer system server is securely isolated in a locked closet, room, or other
area with limited access or securely located offsite.
6. Consider disabling portals on all company computers where the employees job function does not
require access, so that an employee or someone else would not be able to upload or download
data using a portable memory device (USB, jump/thumb drive, external hard drive, phones, etc.).
 Establish employee training not to insert any unknown device into company systems (i.e.
found a thumb drive in the parking lot).
 Establish ongoing employee training or notifications to employees on current types of
cyber threats (i.e. phishing, etc.)
7. Establish company protocols to properly dispose of paper records and electronic records, including
those contained on hard drives of smart copiers/printers, as established under the Federal Trade
Commission (FTC) Disposal Rule.
 Complete your due diligence on a 3rd party provider that you give paper records to for
destruction and maintain your receipts from the disposal company for audit purposes.
8. Complete and establish your Business Continuity Plan (a/k/a Disaster Plan) in the event of a
natural disaster (flood, tornado) or accidental disaster (power outage, fire, sinkhole, vehicle impact
to building), etc. (See FNTG Tools/Resources)
 Review your current insurance coverage in the event of disasters.
 Research various insurance coverage’s available.
 Adjust your coverage as necessary.
9. Establish a plan/procedure for your company to follow to notify customers and/or law enforcement
of a data security breach as required by law.
10. Develop a Privacy Statement and provide to customers/consumers as required by law.
 Post your company Privacy Statement on your website.
 Separately post language that describes how you obtain NPI through the closing process
(see section in Sample Privacy Policy called “Personal Information Collected”).
Solutions/Suggestions:
1. Create and/or Adopt written policies/procedures:
 Information Security Plan (minimum requirement)
 Information Technology Policy
 Record Retention & Record Disposal Policy
 Privacy & Information Security Plan
 Clean Desk Policy
 Physical Security Compliance Notice
2. When you are creating your written policies/procedures that comply with Best Practice #3 – we
recommend you consult with 3rd party experts on computer security, data security and completing
annual system testing for external infiltration into your system (testing must be completed by
outside company vs. your internal I.T. employees) to see if your system can be “hacked”. Retain
documentation each time you have this testing done.
3. Audit and oversight procedures to ensure compliance with company’s information security
program.
4. Audit and oversight procedures to ensure ongoing training and compliance by both employees and
vendors, which includes signature acknowledgment of the company policies.
5. Audit and oversight procedures that provide for ongoing testing of your Information Security Plan.
Tools/Resources:
FTC Privacy Rule, 16 CFR Part 313: http://www.business.ftc.gov/documents/bus67-how-comply-privacyconsumer-financial-information-rule-gramm-leach-bliley-act
FTC Safeguards Rule, 16 CFR Part 314: http://www.business.ftc.gov/documents/bus67-how-complyprivacy-consumer-financial-information-rule-gramm-leach-bliley-act
FTC Disposal Rule, 16 CFR Part 682: http://cfr.regstoday.com/16cfr682.aspx
FORMS REFERENCE TOOL 1: Business Continuity Assessment Tool
REFERENCE TOOL 2: What you should know about NPI
SAMPLE 1: Data Security Policy Structure (has been replaced by ITP)
SAMPLE 2: Information Technology Policy
SAMPLE 3: Record Retention & Record Disposal Policy
SAMPLE 4: Privacy Statement
SAMPLE 5: Privacy & Information Security Plan
SAMPLE 6: Clean Desk Policy & Physical Compliance Notice
Training for employees  Real Estate Data Shield’s website: www.realestatedatashield.com
Allows agents to then demonstrate to lender clients or to regulators (CFPB, FTC, etc.), their
compliance with the staff training component of the applicable privacy laws, rules and regulations.
 NPI Training provided by FNTG’s Agency Staff (Based on Federal Trade Commission (FTC)
Materials)
Commercial National Companies –
 Iron Mountain: http://solutions.ironmountain.com/FNF
 Your Docs: www.ptghome.com/yourdox.html
Compliance Success Program (CPA)  HABIF, AROGETI & WYNNE, LLP (HA&W)
COMPLIANCESUCCESS PROGRAMsm: www.compliancesuccess.com/fidelity
Cyber-Security Insurance –
 ARTHUR J. GALLAGHER & CO.
FIDELITY-PAK AND SECURITY-PAK: fntgins@ajg.com
Email Encryption DATAMOTION: www.datamotion.com/fntg-info
Business Continuity / Business Disaster Planning –
3rd Party Company that will create a Business Continuity Plan for your operation(s):
 Continuity Secure: http://continuitysecure.com/fntg-info
FNTG Business Continuity Planning Introductory PowerPoint & Work Books to “Do It Yourself” –
 Sample BCP/BDP: Click this link to presentation – BCP - PowerPoint Presentation
 Sample BCP/BDP: Click this link to document – BCP - Full Management Plan
 Sample BCP/BDP: Click this link to document – BCP - Departmental Workbook
 Sample BCP/BDP: Click this link to document – BCP – Abbreviated 5 R’s Plan
Written Policy Templates – Data Security  LenderSecure: www.lendersecure.com
 Real Estate Data Shield: http://realestatedatashield.com/fidelity-agents
 Security Compliance Associates (SCA): www.scasecurity.com/fidelity
Reference Tool 1: Business Continuity Assessment Tool
Part I: Business Information
1
Locations/branches for each operation.
2
Departments in each of your operations.
Emergency Evacuation Plan that accounts for all personnel and clearly sets forth
procedures to protect life safety in the event of an evacuation, heart attack, Bomb
threat and other disasters.
Disaster Management Program in place, including a Crisis Management plan,
Department Recovery workbooks, Emergency Evacuation Plan.
3
4
5
6
7
8
Disaster Management Program in place that is documented and audited.
Disaster Management Program in place where documents and operations are
tested annually.
Program in place that allows company to track audit requirements for your
documentation annually so that you remain in a state of audit readiness.
Company is prepared for If a disaster happens today - company is aware and
prepared to the cost in lost opportunity, recovery expenses, penalties and fees.
Part II: Operational Information
10
Established a Local Crisis Management Team with predestinated and well defined
rolls and responsibilities and test them annually.
Documented prioritized recovery strategies for critical departmental processes in
the companies and branch operations.
11
Company is prepared, both financially and technologically, if the company were to
shut down due to an unplanned business outage. Company has the resources
and preparedness to recovery from any short or long term loss.
9
12
13
Company has a plan in place to alert or contact certain personnel in the event of a
disaster, and is that list is documented and updated quarterly.
Documented procedures for recovering lost or destroyed original documents and
forms are in place and are reviewed quarterly since technology is fluid.
Part III: Technology Information
Company is prepared for any loss of critical applications and data, and is
prepared to utilize outside documented resources that would compensate the cost
14 in lost opportunity, recovery expenses, penalties and fees.
15
16
17
Company has a system in place to recover lost data that is stored locally in their
office, and those procedures are clearly documented.
Applications are in place for the companies operation which relies on in order to
perform its business tasks. Those applications are hosted locally or by a third
party provider.
18
Company is prepared for any long recovery of lost data.
If Company experiences any lost access to all applications, priority has been
established in which those applications would be restored according to potential
revenue loss and Company has established a contingency plan and process.
19
Company has documented procedures to replicate your technology infrastructure
at an alternate work facility.
20
Company has documented procedures that outline what you would do with your
phone system in the event of the loss of your work facility.
21
Applications are accessible outside of the office and how is documented
Part IV: Vendor Information
23
Company is aware and prepared as to the impact of a disaster on any of their
critical vendors and has a plan in place to adjust their operational plan.
Company is aware of what the recovery time capabilities of your critical vendors
have in place.
24
Company has documented their critical vendors plans that are in place that
ensures the continuity of their service to you.
22
25
26
27
Company has a SLA (Service Level Agreement) with all critical vendors.
Company has standardized documentation for inquiring about critical vendor's
recovery capabilities and time frames. Company has established a
comprehensive list of questions and criteria for all service providers.
Company has established a contact list of vendors which are prioritized in order of
importance in the event of a disaster.
Processes and Procedures
Reference Tool 2: What You Should Know (NPI – Non-Public Information)
The Federal Trade Commission defines NPI as:

any information an individual gives you to get a financial product or service (for example, name,
address, income, Social Security number, or other information on an application);

any information you get about an individual from a transaction involving your financial product(s) or
service(s) (for example, the fact that an individual is your consumer or customer, account numbers,
payment history, loan or deposit balances, and credit or debit card purchases);

any information you get about an individual in connection with providing a financial product or
service (for example, information from court records or from a consumer report).
Examples of NPI include:

Bank loan payoff and credit card statements;

Insurance retirement and tax information;

Social Security numbers and dates of birth; and

Real estate/title related items, commission amounts and loan fees.
There are many sources within a company where NPI can be found, such as: physical locations such as
paper-based files, desktop or reception area, the closing table and warehouse. With the widespread use of
smart phones, be vigilant of the documents visible to anyone other than vetted employees, such as at the
closing table.
There are also many electronic locations where NPI is housed. These include:
Computers,
 Network servers
 Email servers
 Instant messaging servers
 Fax servers
 Copy machines with internal hard drives
 Smart printers with internal hard drives or network storage devices
 Web servers
 Cloud storage (e.g., Google, Dropbox)
 Backup tapes; online backup services
 User-provided devices/media (e.g.,
o Employee smart phones
o Tablets
o USB storage devices)
 And more as we speak …..
Additionally, NPI can be in the possession of vendors a company may utilize.
These include:
 Mobile notaries
 Mobile closers
 Couriers
 Online backup
 Services or off-site backup tape storage vendors
 Email service providers
 Server and website hosts
Take reasonable steps to select and retain service providers that are capable of appropriately safeguarding
NPI.
Sample 1: Data Security Policy Structure
NOTE: This document does not constitute a data security policy; however, if you, with your IT consultant, take
this form and expand on each of the concepts by listing the specific steps/procedures, software, systems, etc.
and timeframes that you are implementing, you can turn it into a Data Security Policy.
Security Statement
(Title Agency) has taken measures to guard against unauthorized or unlawful processing of personal data and against
accidental loss, destruction or damage.
This includes:

Adopting an information security policy (this document is our policy)

Taking steps to control physical security (projects and staff records are all kept in a locked filing cabinet)

Putting in place controls on access to information (password protection on files and server access)

Establishing a business continuity/disaster recovery plan (including, at a minimum taking regular backups of its computer data files and this is stored away from the office at a safe location)

Training all staff on security systems and procedures

Detecting and investigating breaches of security should they occur
Basic Principles
1. Personal data is to be collected only for the purpose specified.
2. Data collected is to be relevant but not excessive for the purposes required.

On an annual basis, title insurance application forms and any other forms that we use are
reviewed to confirm that we are not asking for irrelevant information
3. Data is not to be kept for longer than is necessary for the purposes collected, including complying with
applicable laws. Within 30 days of closing:

Files are scanned into our secure server and paper copies are shredded

Files are moved to locked files in a secure location in our office
4. We protect the data with appropriate technical and organizational measures to minimize the risk of
unauthorized or unlawful processing and against accidental loss or destruction or damage to personal data.

Servers are stored in locked facilities with access limited to:

Remote access to files (is)(is not) available.

The servers and computers are disconnected from the internet during non-business hours.

[other procedures]

Annual Testing for External Penetration to try to hack in – it is recommended to be done by
outside company or can be done by an independent staff member that does not control any data
technologies, not internal I.T. Department
5. Data is not removed from the office, except when contained on/within appropriately secured data transmission
methods.

Paper files are never removed from the office except as needed for a remote closing

Remote access (is) (is not) provided to our server for employees.

When access is provided, the following security measures are in place: It is a condition of
remote access to the office network by staff that their home computers also have anti-virus
software installed which is regularly updated with the latest virus definitions.

Company to have acceptable I.T. Computer Use Policy that each employee has read and
acknowledged by signature on an annual basis.
6. Access to data whether current or archived is provided to those individuals who, in the course of performing
their responsibilities and functions, must use the specified data.
Access is limited to the following job positions:_____________
7. All data on the network is protected by XXXXXXXXXX anti-virus software that runs on servers and
workstations, and is updated automatically with on-line downloads from the XXXXXXXXXX website / via
updates received on CD. (Use as applicable). This includes alerts whenever a virus is detected.
8. Any viral infection that is not immediately dealt with by XXXXXXXXXX is notified to the (Agency Owner).
9. All user data is backed up to tape automatically on a daily basis, using an appropriately secure system for fast
indexing and data restoration.
10. A full server backup to tape takes place weekly.
11. Daily and weekly backups are securely stored in a room remote from the server room and reused on a
fortnightly basis.
12. A half-termly archive tape is preserved, and for the next half-term is securely stored off site, in case of
catastrophic system loss such as office-wide fire.
13. A separate business continuity plan is established.
14. Company to implement a Clean Desk Policy.
15. Company to post their Privacy Statement on their website.
16. Use Encryption to transmit any NPI
The information provided in this SAMPLE Policy Document is for your reference only and is not
intended to represent the only approach to any particular issue. These guidelines should not be
construed as legal, financial or business advice, and you should consult legal counsel and subjectmatter experts to determine the appropriate policies, procedures and strategies applicable to your
office or organization.
Sample 2: Information Technology Policy
Purpose of Information Technology Company Policy
This policy covers the access to Information Technology (IT) assets, including but not limited to
network and applications, owned or operated by ABC Company (ABC).
Application of Policy
This policy applies to all ABC Company employees, affiliates, contractors, and vendors.
Information Technology Company Policy
The company shall establish processes to properly control access to the information
technology assets. Access to information assets is to be controlled through a managed
process that addresses authorizing, modifying, revoking, and periodic review of access
privileges to all of the company’s technology systems. This company policy provides the
minimum requirements for authorizing and authenticating users prior to granting them access
to information technology assets.
1) Roles and Responsibilities
a) Managers are responsible for reviewing and approving all requests for access to the
information assets for all users under their supervision, including modification of access
rights.
b) Managers are responsible for reporting changes in user duties or employment status
for all employees under their supervision to the IT department
c) The IT department is responsible for granting the level of access that has been
approved by the Business Manager.
d) The IT department is responsible for maintaining record of the access requests in
compliance with the Access Control Standard. This includes roles, and access
modification, and termination.
e) Only administrators explicitly authorized to create new accounts may create new users
and user groups.
f) Third parties given access must be bound under a non-disclosure or other binding
agreement of confidentiality that includes restrictions on the subsequent dissemination
and usage of the information and defines the terms and conditions of such access.
2) User Enrollment and Authorization
ABC's Enrollment Process establishes a user's identity and anticipated business needs to
information and related information technology assets prior to granting user access to
the Company network and systems. The user is granted access to various information
assets of the Company once the network user identification is assigned.
a) For all Company employees, contractors or service providers that require access to a
Company information asset, a New User request must be submitted by the appropriate
requestor (i.e. HR).
b) The New User request must indicate the IT assets to which the user would need
access and the level of access.
c) The New User request must be approved by the appropriate approver (i.e. new
employee supervisor) before being transmitted for execution to the IT department.
d) The IT department will grant access to the Company information assets as indicated on
the previously approved request.
3) User Rights Modification
a) A request shall be submitted by the appropriate requestor (i.e. the employee
requesting access) for each modification to a user's access rights.
b) The user rights modification request should indicate the IT assets to which the user will
need access.
c) The request must be approved by the appropriate approver (i.e. employee’s
supervisor) before being transmitted for execution to the IT department.
d) The IT department grants access to the Company information assets as indicated on the
approved request.
4) User Access termination
a)
Managers are responsible for communicating user access termination for all users
under their supervision to the IT department.
b) The access termination communication must indicate the IT assets to which the user
had access.
c) The Access termination communication must be submitted by the end of the last day
worked by the user to HR & IT.
d) User access privileges for terminated employees must be performed in compliance with
the Company’s Access Control Standard.
e) In case of a high-level employee termination, the employee’s supervisor must
immediately coordinate the disabling of all the accounts for that employee.
5 ) Review of User Access Rights
a)
Managers are responsible for reviewing the access rights for all users under their
supervision to determine if access rights are commensurate to the users’ job duties.
b) User Access Rights Review should be performed and documented at least as often
as defined in the Company’s Access Control Standard.
c) Evidence of account reviews shall be maintained in compliance with the Company’s
Access Control Standard.
6) Inactive Accounts
Review of accounts for general users shall occur in compliance with the Company’s
Access Control Standard to identify unused or inactive accounts.
b) Accounts that have not been used for a period of time (spell out 30-90 days), as defined in
the Company’s Access Control Standard, will be automatically disabled.
a)
7) Identification
a) User IDs must be associated with the individual user to whom they have been
assigned.
b) To minimize the risk that dormant access permissions accidentally being inherited by a
new user, there should be no re-use of any User IDs.
c) User IDs are not to be utilized by anyone except the individual to whom the IDs have
been issued. No shared IDs!
d) Users are responsible for all activity performed with their personal User IDs.
e) All users with access to the Company's information assets are to use a User ID
that has been specifically assigned to them. No shared IDs!
8) Password Requirements
a) Access to ABC’s computers, applications, and systems must be protected by
passwords to prevent unauthorized use, following the Access Control Standard.
b) There are change parameters in place.
9) Password Protection Requirements
These requirements apply to both user and service accounts.
a) The password for ABC’s accounts must not be for other non- ABC access (e.g.,
personal ISP account, option trading, benefits, etc.).
b) A B C passwords must not be shared with anyone, including administrative assistants
or secretaries. All passwords are to be treated as sensitive, confidential information.
c) If someone demands a password, refer them to this document or have them call
someone in the Information Security Office (IT).
d) The "Remember Password" feature of applications must not be used unless the
credentials are stored encrypted.
e) Passwords must not be stored in a file on ANY computer system without
encryption.
f) If the compromise of an account or password is suspected, the incident must be
reported to the Information Security Office and all passwords must be changed.
g) The ISO or its delegates may perform password cracking or guessing on a periodic or
random basis. If a password is guessed or cracked during one of these scans, the user
will be required to change it.
10) Authentication
a) Authentication methods should be consistent with the level of sensitivity of the
information that the system in question contains.
b) At a minimum, a username and password are required.
c) Appropriate authentication controls are required when accessing internal system
resources from outside the ABC network.
d) All passwords, pass codes, access control devices, keys, security passes/badges,
personal identification numbers and the like (collectively, “Keys”) issued for the purpose
of accessing A B C Company premises or Systems are the property of ABC Company.
e) The use any Key to access, store or retrieve any Company information is not permitted
unless (i) specifically authorized in a particular instance or (ii) authorized in advance as to
the type of Company information and Key to be used.
11) Privileged Account Access
a) Administrator accounts must only be used to perform administration duties.
b) All users that have access to privileged accounts must have their own personal
accounts for normal business use.
c) Users with access to super-user or privileged accounts must use their normal
account to log into information resources for day-to-day use.
d) Privileged Account passwords must be updated immediately after the dismissal of any
employee who had access to administrator-level or privileged accounts.
e) Any combination of special privileges which could grant inappropriate privileges when
combined (e.g., system administration and auditing) should be segregated among
different users to ensure proper segregation of duties.
f) Privileged accounts not associated with an individual must each be approved,
documented and strictly limited to those with a business justification for use.
g) Persons with administrative rights must lock or log out of any active session prior to
leaving the device unattended.
12) Service Account Password Requirements
a) Service Account passwords must comply with the ABC Company Access Control
Standard.
b) Changed on a regular basis
13) Internet-Facing Web Application Password Requirements
a) Passwords in this category must comply with the ABC Company Access Control
Standard.
b) Changed on a regular basis
14) Database Credential Requirements
a) Storage of Data Base Usernames and Passwords must comply with the ABC
Company Access Control Standard.
b) Retrieval of Database Usernames and Passwords must comply with the ABC
Company Access Control Standard.
c) Access to Database Usernames and Passwords must comply with the ABC
Company Access Control Standard.
15) Temporary Employees
a) Temporary employees will be issued individual accounts with passwords that
automatically expire after a predetermined date.
b) When setting up temporary employees, the length of their employment should be
identified, not to exceed the maximum temporary employee employment length defined
in the ABC Company Access Control Standard.
c) Access should be reviewed at the end of a temporary employee’s employment.
d) If the employee’s employment will not continue, the access to all systems must be
removed.
16) Enforcement
a) Any employee found to have violated this policy may be subject to disciplinary action,
up to and including termination of employment.
b) External service providers found to have violated this policy may be subject to
financial penalties, up to and including termination of contract.
Definitions
Term
Definition
Privileged Account
A privileged account is an account that provides the ability to
establish or change IDs and or access rules, or the ability to modify
production applications, operating systems or network parameters.
Service Account
An access account to a computer system or application that is controlled
and used by an application.
User Account
An access account to a computer system or application that is controlled
and used by a person.
Revision History
Rev #
Date
Description
1
Enter Date
Original Date Published (Add any revision dates/notes below)
The information provided in this SAMPLE Policy Document is for your reference only and is not intended to
represent the only approach to any particular issue. These guidelines should not be construed as legal,
financial or business advice, and you should consult legal counsel and subject-matter experts to determine the
appropriate policies, procedures and strategies applicable to your office or organization.
Sample 3: Record Retention & Record Disposal Policy
RECORD RETENTION POLICY
ABC Company (ABC) is establishing its Record Retention Policy (“RRP”).
This Policy is so important that every ABC Employee at every level must learn and observe its requirements.
Compliance with the RRP is an important part of every Employee’s daily responsibilities and is mandatory for
every Employee with respect to that Employee’s work as an employee of the ABC Company and its 3rd Party
Vendors.
This Policy has three broad goals:
1) To make sure that ABC maintains its Records in the ordinary course of business in compliance with
legal and business requirements.
a) This means that Records are protected against deliberate or accidental destruction for as long
as ABC needs to retain them by law and for business requirements; that the correct version of
each Official Record is retained and kept only in authorized locations; that Records are retained
only as long as ABC is required to keep them (in accordance with the appropriate Record
Retention Schedule or in compliance with a Legal Hold Order issued by Management); and that
Records are retired in a suitable way at the end of their retention period, unless such Records
are subject to a Legal Hold Order.
2) To ensure Legal Hold Orders are issued, when necessary, and enforced.
a) Legal Hold Orders are orders to ABC Employees and 3rd Party Vendors to preserve Records
that relate to current or reasonably anticipated litigations, government investigations, subpoenas
or claims. Compliance with a Legal Hold Order is critical. Every Employee must understand
how to respond to a Legal Hold Order if he or she receives one.
3) To be sure that Company Information is treated as confidential information and is always protected
against unauthorized disclosure.
a) Records may contain Company Information, which should be kept as confidential information.
Some of the Company Information may be non- public personal information that, if
disclosed, could enable identity theft.
b) Such non-public, personal information and ABC’s Trade Secrets must always remain
confidential. It is essential that confidentiality requirements are always observed, even after
an Employee leaves ABC.
c) Preserving the confidentiality of Company Information means protecting it from intrusion by
people outside the Company, as well as by people inside ABC who are not authorized to see that
Company Information. It also means making sure that when Records containing Company
Information are retired, the retirement is handled properly and securely: (i) Company Information
containing ABC’s Trade Secrets, non-public personal information of past, present or potential
customers or Employees (such as social security numbers, health information, credit card
information and the like) should be destroyed so that it cannot be read or reconstructed and (ii) all
other Company Information should be destroyed in accordance with the Company’s practices
applicable to such information.
d) This Policy tells you how to handle and maintain Records and how to determine how long
Records need to be kept. (In this Policy, “Records” means any information under ABC’s control
that relates to ABC’s business; finances; past, present or potential customers and Employees;
operations; research and development; and facilities). Records fall into one of two classes:
Official Records and Convenience Records defined as:
“Official Records” are Records that must be kept for specific periods of time to meet legal and
business requirements. Examples of Official Records include tax records or HR records. Official
Records are listed on the appropriate Record Retention Schedule, along with the period of time
they need to be kept. After that time, they are routinely retired (unless subject to a Legal Hold
Order).
“Convenience Records” are Records that have no retention requirement unless they are
subject to a Legal Hold Order. Convenience Records include working copies, drafts of Official
Records, notes, telephone messages and similar items. Convenience Records may also
include information that you generate or receive and does not pertain to ABC business (such as
personal e-mails, calendars or notes), but that is stored on ABC technological property.
Convenience Records can be discarded when you no longer need them (unless they are
subject to a Legal Hold Order).
As between ABC Employees or 3rd Party Vendors and ABC, Records are the property of ABC and subject to its
control. Such control shall be exercised over the creation, distribution, utilization, retention, storage, retrieval,
protection, preservation and final disposition of these Records.
NOTE: This Policy provides basic information about your responsibilities and the structure of the Program. The
first section provides definitions of terms; the second and third sections provide basic procedures on retaining and
retiring (disposing of) Records; sections four, five and six outline various responsibilities, including your
responsibilities and those of the personnel involved in creating and implementing this Policy; and the remaining
sections address auditing, compliance, methods for reporting violations and penalties for violating this Policy, which
could include immediate termination.
The information in this Policy will give you guidance as to what you must do. You should look to the Company’s
Record Retention Officer. If the Record Retention Officer is not available, and you need an immediate answer, you
should contact the Company’s Chief Compliance Officer. Other individuals and resources you can turn to for
information are discussed in the following pages. The personnel responsible for Record Retention have been
trained to respond to your questions and they are waiting to help you.
Section 1.
Definitions.
a.
“Company” or “ABC” means A B C C o m p a n y .
b.
“Company Information” means all materials or information in whatever form, whether written,
oral, digital or otherwise that is (a) defined as “confidential” or is a Trade Secret hereunder or
under any ABC policy or under any agreement to which ABC is a party; (b) subject to special
protections that require confidentiality under any law or regulation; (c) non-public and that
relates to ABC’s finances, Employees (whether past, present or potential), research,
development, facilities or business or (d) non-public personal information relating to a past,
present or potential customer of ABC that identifies the customer in any way (including information
that is publicly available, but whose disclosure would indicate that ABC had a customer
relationship with that individual).
c.
“Convenience Record” means a Record that has no retention requirement and that
may be retired at any time unless it is subject to a Legal Hold Order. Convenience Records
include working copies, drafts of Official Records, notes, telephone messages and similar items.
Convenience Records may also include Employee generated or received information that does
not pertain to ABC business (such as personal e- mails, calendars or notes), but that is stored on
ABC’s technological property.
d.
“Corporate Record Retention Officer” is a member of the Company’s Record Retention
Committee with special duties, which are set forth in Section 4(b) below.
e.
“Employee” means every person employed by ABC at any level.
f.
“Legal Hold Officer” is a member of the A B C ’ s Legal Department or Management Group
(designated by the Company) with special duties related to Legal Hold Orders, which duties are
set forth in Section 4(e) below and in the ABC Legal Hold Order Procedure.
g.
“Legal Hold Order” means a direction to preserve and to prevent the destruction of Records
that may be required for a pending or reasonably anticipated litigation, government investigation,
subpoena or claim. As a general matter, a Legal Hold Order issued pursuant to the ABC’s Legal
Hold Order Procedure does not apply to the litigation of insurance claims or policies issued by
ABC or to tax disputes (such litigation and disputes are subject to other ABC practices to preserve
and to prevent the destruction of relevant Records).
h.
“Legal Hold Order ID Number” is a number that will be assigned to each Legal Hold Order
by the Legal Hold Officer and will be included on all documentation (e.g., communications sent to
potential custodians, data users, records managers, IT personnel, Listed Vendors, etc.) related to
the Legal Hold Order.
i.
“Legal Hold Team” means the group of individuals with duties related to Legal Hold Orders,
which duties are set forth in Section 4(d) below.
j.
“Listed Vendor” means any third-party service provider of ABC that either controls or has access
to Records and is listed on the Vendor List on the Record Retention Website.
k.
“Litigation Counsel” means the attorney with ultimate responsibility for the particular litigation
or investigation in question.
l.
“Record Retention Officer” is a person at A B C responsible for answering questions with
respect to the Program and who reports on such matters to the Corporate Record Retention
Officer, as set forth in Section 4(c) below.
m.
“Official Record” means a Record that must be kept for a specific period of time (identified in the
Record Retention Schedules) to meet legal and business requirements.
n.
“Record” means any information under ABC’s control that relates to ABC’s business; finances;
past, present or potential customers and Employees; operations; research and development; and
facilities. Records fall into one of two classes: Official Records and Convenience Records.
o.
“Record Retention Committee” means a permanent committee of representatives drawn from
the Legal, Regulatory, Compliance and IT departments at ABC with duties related to oversight of
the Program, which duties are set forth in Section 4(a) below.
p.
“Record Retention Schedules” means the Company-approved schedules that set forth the
relevant periods of time that particular Official Records of the Company are to be retained in
the ordinary course of business to meet ABC’s legal and business requirements. There are
currently two (2) Record Retention Schedules: (i) for the title and escrow business (the
“Title/Escrow Schedule”), (ii) for general corporate information of ABC (the “General Company
Schedule”).
q.
“Trade Secrets” means information that gives A B C a competitive advantage in its markets,
including information about how ABC does business, ABC’s corporate, competitive, and strategic
plans, pricing information, ABC’s customer lists, ABC’s proprietary operating data and anything
else about ABC that is not public.
r.
“Training Materials” means materials designed to train Employees about the importance of
Records and how to comply with the Policy.
s.
“You” and “your” means (i) an Employee with respect to that Employee’s work as an employee or
(ii) a 3rd Party Vendor.
2.
Record Retention - Basic Procedures.
This Policy sets retention standards for Records so that (i) complete and accurate copies of Records can be located when
needed; (ii) Records are stored only under authorized conditions in authorized facilities; and (iii) Records will be appropriately
retired when their retention requirements have expired or their useful life has ended, unless subject to a Legal Hold Order.
To achieve the goals of this Policy,
i.
ii.
iii.
a.
b.
Official Records should be stored, arranged and/or indexed so that they can easily and
accurately be identified when required.
All Records should be maintained on A B C owned or leased premises, on ABC
systems, or under a contract approved by ABC’s Company Legal Department with an
approved 3rd Party Vendor. They should not be stored anywhere else.
All Records that contain Company Information should be handled, stored and retired in
such a way to maintain the confidentiality of the Company Information so that people who
are not authorized to see the Company Information do not have access to it.
For Official Records:
i.
If ABC creates and uses a Record Retention Website, it will contain a list of approved
locations in which Official Records should be stored. These approved locations may be
electronic servers for imaged Records, local operation offices or warehouses for paper
Records or other types of authorized repositories.
Official Records for the applicable
local offices should be stored only in those authorized locations, once identified in
connection with the RRP.
ii.
The Record Retention Officer is expected to be aware of the location of where Records
(Official Records and Convenience Records) are stored that are his or her responsibility.
The Record Retention Officer may find it helpful to keep a master list that includes the
storage locations for Records of the branch offices that are his or her responsibility.
iii.
Official Records must always be kept for the specific period of time listed in the
appropriate Record Retention Schedule. This is critical and is required to meet legal or
business needs.
iv.
Where there is only one copy of a Record, that copy is the Official
Record.
v.
If a Record was created in paper form but is later imaged, the image is always the
Official Record. The paper document can be discarded once the document has been
imaged, so long as no Legal Hold Order applies to them.
vi.
If a Record exists in more than one form or if there are multiple copies of a Record,
you should consult your manager to determine which copy constitutes the “Official
Record.” Duplicates shall be retired, so long as no Legal Hold Order applies to them.
vii.
If there is any uncertainty about which constitutes the Official Record, you or your
manager should consult the Record Retention Officer.
For Convenience Records:
i.
ii.
Convenience Records should be retired as soon as you no longer need them for any
business purpose, unless they are subject to a Legal Hold Order.
Convenience Records that may be subject to a Legal Hold Order should be preserved in
accordance with the instructions in the Legal Hold Order or as otherwise given by the Legal
Hold Officer.
c.
3.
For Official Records & Convenience Records if they may be subject to a Legal Hold Order:
i.
The Legal Hold Officer will issue a Legal Hold Order whenever Records may be
required for a pending, or reasonably anticipated litigation, government investigation,
subpoena or claim.
ii.
Generally, the Legal Hold Order will cover a specific subject by name and date and
will tell you what categories of Records you now need to keep until the Legal Hold
Order is cancelled. Every Legal Hold Order will have its own Legal Hold Order ID Number.
iii.
Once you receive a Legal Hold Order, you must protect and preserve any
Records covered in the Legal Hold Order, even if their normal retention time has
expired and even if they are Convenience Records.
iv.
If you ever have any question about what Records the Legal Hold Order covers, please
contact the person identified in the applicable Legal Hold Order or, if he or she is not
available or if you are unsure whether any Legal Hold Order applies, contact the Legal
Hold Officer. If the Legal Hold Officer is not available and your question is urgent, please
contact the Record Retention Officer.
v.
The Legal Hold Officer will provide you with updates on the Legal Hold Order as the
matter proceeds. When requested, you should confirm to the Legal Hold Officer that you
are in compliance with the Legal Hold Order.
vi.
When there is no longer a need for the Legal Hold Order, the Legal Hold Officer will inform
Employees and Listed Vendors subject to the Legal Hold Order that it has now been lifted.
vii.
Once a Record is no longer subject to a Legal Hold Order as a result of a direction
from the Legal Hold Officer, you should retain the Record for the time period set forth in
the appropriate Record Retention Schedule if the Record is an Official Record (or retire it
if it is a Convenience Record that has outlived its usefulness) unless the Record is subject
to another Legal Hold Order.
Retiring Records – Basic Procedures.
a.
You are expected to make sure that Convenience Records under your control are retired at the
end of their useful life. You should assess periodically whether Convenience Records under your
control need to be retained. Whenever a file is closed, you should review and retire any
Convenience Records in that file.
b.
You must not retire any Record (Official Records or Convenience Records) if any Legal Hold
Order applies to that Record. If you have questions as to whether a Record is covered by a Legal
Hold Order, please contact the person identified in the applicable Legal Hold Order or, if he or she
is not available or if you are unsure whether any Legal Hold Order applies, contact the Legal Hold
and retain the records until you have the official answer
c.
Whenever you retire either Official Records or Convenience Records, you must use methods
appropriate to preserve the confidentiality of information in those Records. Official Records or
Convenience Records containing Company Information must be retired properly and securely: (i)
Company Information containing ABC’s Trade Secrets, non-public personal information of past,
present or potential customers or Employees (such as social security numbers, health information,
credit card information and the like) should be destroyed so that it cannot be read or reconstructed
and (ii) all other Company Information should be destroyed in accordance with the Company’s
practices applicable to such information. If you have questions, you should ask your Record
Retention Officer how to retire applicable Records.
d.
Computer and IT equipment disposal carries risks to the Company after that equipment leaves the
Company’s premises, both environmentally (such as landfill “superfund” laws) and with respect to
the potential disclosure of Company Information. ABC contracts with disposition services and
uses various forensic tools to cleanse electronic data storage devices (including computers, hard
drives, copiers and other equipment). You should make sure that your IT Department uses such
appropriate disposition services before removing any computer and IT equipment from ABC
premises for disposal. If you have concerns about whether the IT Department is using the
appropriate disposition services, you should raise the concerns with your Record Retention Officer.
Record Retention Personnel.
5.
a.
The main oversight and approval body for this Policy and the rest of the Program is the
Record Retention Committee.
This committee will be the final and ultimate authority for
implementation and revision of this Policy and the Program.
b.
The Company Record Retention Officer is a member of the Record Retention Committee.
The Company Record Retention Officer is the main point of contact with Record Retention
Officer and the second point of contact for Employees for routine record retention matters,
including the application of the Policy.
c.
A Record Retention Officer i s appointed based on geographical area and is trained to serve
as the administrator and first point of contact for record retention issues in a specified area.
The Record Retention Officer may have other job titles as well, but when it comes to record
retention, they report to the Company Record Retention Officer.
d.
The Legal Hold Team will administer and implement each Legal Hold Order. The members
of the Legal Hold Team may be different for different Legal Holds.
e.
The Legal Hold Officer is responsible for helping to determine when a Legal Hold Order is
needed, for issuing, updating, monitoring and releasing the Legal Hold Order, for answering
questions about the scope and status of a Legal Hold Order and for maintaining a list of Legal
Hold Orders in effect at ABC.
Your Record Retention Responsibilities as an Employee or Listed Vendor.
a.
You must create, maintain and dispose of all Records in accordance with
this Policy and the appropriate Record Retention Schedule.
b.
You must properly handle Records and always respect, maintain, and enforce existing ABC
safeguards against unauthorized or improper destruction of Records.
c.
You should not retain Convenience Records that are copies of Official Records for longer than the
underlying Official Record unless the Convenience Record is subject to a Legal Hold Order.
d.
You must retain Official Records under your control for the time periods
in the applicable Record Retention Schedule. If there is a business need to retain Official Records
longer than the retention period in the applicable Record Retention Schedule, you must request an
extension from the Local Record Retention Officer. If the Local Record Retention Officer grants
the request, the applicable Official Record should be kept only for so long as designated by the
Record Retention Officer and the Record Retention Officer should maintain documentation of the
request and the grant until the applicable Official Record is destroyed.
e.
If you receive a Legal Hold Order, you must immediately turn to it and follow all instructions in the
Legal Hold Order to preserve all relevant Official Records and Convenience Records. (See
Section 2(c)).
f.
You must maintain the confidentiality of Records that contain Company information.
g.
You must retire Records in accordance with this Policy. (See Section 3).
h.
If you learn of any potential litigation, government investigation,
i.
6.
subpoena or claim (other than the litigation of insurance claims or policies issued by ABC or to tax
disputes) against ABC, you should contact the Legal Hold Officer immediately.
If you transfer to another office or department or if you leave ABC’s employment, you must notify
your manager before your departure or transfer and help with the transfer of Records under your
control.
j.
Whenever an Employee transfers or leaves, managers must consult the Local Record Retention
Officer and must make sure they promptly review with the Employee the status of all Records
under the Employee’s control.
k.
If the transferring or leaving Employee has any Records that must be retained under the
appropriate Record Retention Schedule or that are subject to a Legal Hold Order, the manager
should take appropriate steps to ensure that the Employee’s Official Records are retained for the
applicable retention period and that any Official Records and/or Convenience Records of the
transferred or terminated Employee are retained until the applicable Legal Hold Order(s) have
been lifted.
Awareness of this Policy.
a.
Senior management at ABC Company is responsible for distributing this Policy to ABC’s
Employees and 3rd Party Vendors.
b.
All current Employees will receive a copy of this Policy when it is adopted.
c.
Future Employees will receive the Policy when they are hired.
d.
ABC will also post the current version of this Policy, along with the
Record Retention Schedules, on ABC’s Record Retention Website, when/if created or will post the
information in the Company Employee Handbook.
e.
Any ABC Employee responsible for dealing with a 3rd Party Vendor that has control of Records
must provide the 3rd Party Vendor with a copy of this Policy.
f.
Every 3rd Party Vendor must distribute the Policy to those of its employees who control ABC’s
Records, as applicable.
7.
Periodic Audits. ABC’s Internal Audit Department may conduct periodic, unannounced audits of each of
ABC Company’s Branch locations for compliance with this Policy.
8.
How to Report Violations
9.
10.
a.
If you suspect or know of a violation of this Policy, you should immediately notify the Record
Retention Officer, and if he or she is not available, the Company Record Retention Officer or
ABC’s Chief Compliance Officer.
b.
Your report will be kept confidential.
Employee Violations.
a.
Because of the extreme importance of this Policy, any Employee who violates any of its terms
may be subject to disciplinary actions, including but not limited to oral or written warnings,
suspension or immediate termination.
b.
The type of disciplinary action taken will depend on the type of violation of this Policy. ABC does
not promise, imply or represent that one form of disciplinary action will occur before another.
Collective Effort Required to Make this Policy Work. ABC counts on each of its Employees to make this
Record Retention Policy work. If you have any suggestions on how to make it more effective or efficient,
please contact ABC’s Record Retention Officer.
The information provided in this SAMPLE Policy Document is for your reference only and is not intended to
represent the only approach to any particular issue. These guidelines should not be construed as legal,
financial or business advice, and you should consult legal counsel and subject-matter experts to determine
the appropriate policies, procedures and strategies applicable to your office or organization.
Sample 4: Privacy Statement
ABC Company
Privacy Statement
ABC Company (“ABC”) respects the privacy and security of your non-public personal information
(“Personal Information”) and protecting your Personal Information is one of our top priorities. This
Privacy Statement explains ABC’s privacy practices, including how we use the Personal
Information we receive from you and from other specified sources, and to whom it may be
disclosed. A B C follows the privacy practices described in this Privacy Statement and,
depending on the business performed, ABC Company may share information as described herein.
Personal Information Collected
We may collect Personal Information about you from the following sources:
• Information we receive from you on applications or other forms, such as your name, address,
social security number, tax identification number, asset information, and income information;
• Information we receive from you through our Internet websites, such as your name, address,
email address, Internet Protocol address, the website links you used to get to our websites,
and your activity while using or reviewing our websites;
• Information about your transactions with or services performed by us, our affiliates, or others,
such as information concerning your policy, premiums, payment history, information about
your home or other real property, information from lenders and other third parties involved in
such transaction, account balances, and credit card information; and
• Information we receive from consumer or other reporting agencies and publicly recorded
documents.
Disclosure of Personal Information
We may provide your Personal Information (excluding information we receive from consumer or
other credit reporting agencies) to various individuals and companies, as permitted by law, without
obtaining your prior authorization. Such laws do not allow consumers to restrict these disclosures.
Disclosures may include, without limitation, the following:
• To insurance companies, agents, brokers, representatives, support organizations, or others
to provide you with services you have requested, and to enable us to detect or prevent
criminal activity, fraud, material misrepresentation, or nondisclosure in connection with an
insurance transaction;
• To third-party contractors or service providers for the purpose of determining your eligibility
for an insurance benefit or payment and/or providing you with services you have requested;
• To an insurance regulatory authority, or a law enforcement or other governmental authority, in
a civil action, in connection with a subpoena or a governmental investigation;
• To companies that perform marketing services on our behalf or to other financial institutions
with which we have joint marketing agreements and/or
• To lenders, lien holders, judgment creditors, or other parties claiming an encumbrance or an
interest in title whose claim or interest must be determined, settled, paid or released prior to a
title or escrow closing.
We may also disclose your Personal Information to others when we believe, in good faith, that such
disclosure is reasonably necessary to comply with the law or to protect the safety of our
customers, employees, or property and/or to comply with a judicial proceeding, court order or legal
process.
Disclosure to Affiliated Companies – We are permitted by law to share your name, address
and facts about your transaction with other ABC companies, such as insurance companies,
agents, and other real estate service providers to provide you with services you have requested,
for marketing or product development research, or to market products or services to you. We do
not, however, disclose information we collect from consumer or credit reporting agencies with our
affiliates or others without your consent, in conformity with applicable law, unless such disclosure
is otherwise permitted by law.
Disclosure to Nonaffiliated Third Parties – We do not disclose Personal Information about
our customers or former customers to nonaffiliated third parties, except as outlined herein or as
otherwise permitted by law.
Confidentiality and Security of Personal Information
We restrict access to Personal Information about you to those employees who need to know that
information to provide products or services to you.
We maintain physical, electronic, and
procedural safeguards that comply with federal regulations to guard Personal Information.
Access to Personal Information/
Requests for Correction, Amendment, or Deletion of Personal Information
As required by applicable law, we will afford you the right to access your Personal Information,
under certain circumstances to find out who your Personal Information has been disclosed to, and
request correction or deletion of your Personal Information. However, ABC’s current policy is to
maintain customers’ Personal Information for no less than your state’s required record retention
requirements for the purpose of handling future coverage claims.
For your protection, all requests made under this section must be in writing and must include your
notarized signature to establish your identity.
Where permitted by law, we may charge a
reasonable fee to cover the costs incurred in responding to such requests. Please send requests
to:
Chief Privacy Officer
ABC Company
123 Happy Street
Anywhere, USA 00000
Changes to this Privacy Statement
This Privacy Statement may be amended from time to time consistent with applicable privacy laws.
When we amend this Privacy Statement, we will post a notice of such changes on our website.
The Effective Date of this Privacy Statement, as stated above, indicates the last time this
Privacy Statement was revised or materially changed.
The information provided in this SAMPLE Policy/Plan Document is for your reference only and is not
intended to represent the only approach to any particular issue. These guidelines should not be construed
as legal, financial or business advice, and you should consult legal counsel and subject-matter experts to
determine the appropriate policies, procedures and strategies applicable to your office or organization.
Sample 5: Privacy & Information Security Plan
Overview
ABC Company is committed to maintaining the integrity and security of Company
Information and customer non-public information and it is the policy of ABC to secure
that information from unauthorized use. ABC embodies this policy in specific, required
security procedures, as set forth in this Privacy & Information Security Plan (“Plan”).
The Plan – in conjunction with more detailed standards and guidelines developed by
ABC and distributed separately – sets forth ABC’s requirements with respect to the
storage and transmittal of information in electronic, voice or written forms. This Plan is
mandatory for all Employees, Vendors, Contractors, and other third parties granted
access to an ABC’s Systems or Information.
All Employees, Vendors, Contractors, and other third parties are expected to
familiarize themselves with the following ABC policies:

Code of Business Conduct and Ethics;

Record Retention Policy;
The purpose of this Plan is to ensure that ABC has taken steps to ensure the
availability, confidentiality and integrity of Company Information. A B C has identified
potential sources of vulnerability of Company Information such as:

Unauthorized incursion by third parties into Company Information maintained
electronically on servers and other databases or on paper;

Unauthorized interception of Company Information in transit from one secure
ABC location to another, or between a secure ABC location and an external
location;

Unauthorized access to Company Information by Employees or
Vendors;

Unauthorized changes, additions, deletions, misdirection or distribution of
Company Information;

Unauthorized interference with the availability of Company Information needed
for Company-authorized purposes; and

Misuse of Company Information.
The nature of the precautions required to mitigate those risks will vary based on the
sensitivity of the Company Information and the architecture of the Systems on which
that information is stored. The objective in each instance should be to prevent the
unauthorized disclosure, change or interruption to Company Information.
Scope
This Plan applies to all Company Information, whether in paper, stored voice or
electronic form, and to anyone who has access to Company Information or to the
Systems. This Plan is mandatory for all Employees, Vendors, Contractors, and other
third parties granted access to an ABC’s System.
Exceptions to this plan may be requested on a case-by-case basis by
contacting the Information Security Office.
Organization, ownership and enforcement
The Chief Information Security Officer is the owner of this plan and responsible for
its approval. The Chief Information Security Officer in conjunction with the ABC’s
Information Security Advisory Committee approves any deviations from this policy.
If an employee violates any of the terms of this Plan, the employee may be subject to
disciplinary actions, including but not limited to, oral or written warnings, suspension
or immediate termination. The type of disciplinary action does not depend on the
nature of the violation. ABC does not promise, imply or represent that one form of
disciplinary action will occur before another. If a Vendor violates any of the terms of
this Policy, the vendor’s contract with ABC may be subject to immediate termination
for cause, in accordance with its terms. In addition, certain violations of this Policy
may result in criminal prosecution and/or liability.
Maintenance of this Policy
This policy is maintained by the Chief Information Security Officer to ensure
relevance, quality and completeness.
Requests for Change are reported to the Information Security Officer, who is
responsible for analyzing the impact of the change from a business, security and
financial perspective. Changes approved by the Chief Information Security Officer will
be sent to the ABC Information Security Advisory Committee for review prior to
implementation.
ABC reserves the right to supplement, change or discontinue any portion of this
Policy from time to time at its sole discretion.
Review of this Policy
The Chief Information Security Officer and the ABC Information Security
Advisory Committee will review the Information Security Policy at least
annually.
1
Security Management
a) Policy Framework
The ABC Privacy & Information Security Plan Framework describes the
hierarchical structure of the ABC policy on Information Security. The
framework is based on the internationally accepted best practice defined in
ISO 27002.
b)
Your Responsibilities
You have a responsibility to maintain and preserve the security of the Company
Information resident on or accessible from Systems to which you have access. You
must respect, maintain, and enforce at all times existing ABC safeguards against
unauthorized access to, or unauthorized use or alteration of Company Information.
For any Company Information or Systems in their possession or under their control,
Vendors must themselves provide good and sufficient security features and services
to prevent unauthorized access to, or unauthorized use or alteration of such Systems
or Company Information, and must comply with current ABC plans, policies,
procedures, standards, guidelines or requirements provided to Vendor and to
prevailing industry standards.
When a conflict arises between ABC standards and industry standards, ABC
standards will take precedence. You are prohibited from attempting to circumvent
any security feature, device, or practice established by ABC or its Vendors.
c)
Management Responsibility
Senior management at ABC Company is responsible for distributing this
Plan to ABC’s Employees and Vendors.
2
Risk Management
The IT Risk Management Committee drives the IT Risk Management Program. IT Risk
Management is performed in accordance with the IT Risk Management Framework.
3
Personnel Security
a)
Business Uses Only
Employees and Vendors may access Company Information only for legitimate business
purposes and to perform the job functions they have been assigned.
b)
Awareness and Training
All current Employees with access to Company Information or the Systems must receive
and acknowledge a copy of this Policy. Future Employees will receive and acknowledge
the Policy upon hire by ABC. The Policy also must be retained by each ABC Company
Branch Office in an accessible location, and must be posted on the ABC intranet website
or in the Company Employee Handbook or as an Addendum to the Employee
Handbook. A copy of the Plan must be provided to all current Vendors with access to
Company Information or the Systems and to future Vendors at the time they are
retained. Vendors are responsible for disseminating the Policy to all employees,
permitted subcontractors, and any party that may have access to Company Information.
c)
Monitoring
To help ensure compliance with this Policy, authorized ABC representatives may
monitor Systems usage from time to time. This may include, but not be limited to,
inspecting log reports of System access, accessing stored voice- mail messages,
retrieving Email messages, and inspecting any other System file. No right of privacy
exists with respect to any information on any System, or any activity conducted
through a System.
d)
Unacceptable Use
1) The use of peer-to-peer file sharing applications (e.g. Bit Torrent, gnutella,
etc…) is prohibited unless specifically approved by management with
notification given to the Information Security Office. Such approval will only be
given for specific use for a defined period of time. Blanket approval for use of
peer-to-peer file sharing will not be allowed.
2) Effecting security breaches or disruptions of network communication.
Security breaches include, but are not limited to, accessing data of which the
employee is not an intended recipient or logging into a server or account that
the employee is not expressly authorized to access, unless these duties are
within the scope of regular duties. For purposes of this section, "disruption"
includes, but is not limited to, network sniffing, traffic flooding, packet spoofing,
denial of service, or forged routing information unless it is a part of normal job
duties.
3) Port scanning or security scanning is expressly prohibited unless prior
notification to Information Security Office is made and approval received.
4) Executing any form of network monitoring which will intercept data not
intended for the employee's host, unless this activity is a part of the
employee's normal job/duty.
5) Circumventing user authentication or security of any host, network or
account unless it is a part of normal job duties.
6) Interfering with or denying service to any user other than the
employee's host (for example, denial of service attack) unless it is a part of
normal job duties.
7) Using any program/script/command, or sending messages of any kind,
with the intent to interfere with, or disable, a user's session, via any means,
locally or via the Internet/Intranet/Extranet unless it is a part of normal job
duties.
8) Providing information about, or lists of, ABC employees to parties
outside ABC unless it is a part of normal job duties.
9) Unauthorized use, or forging, of email header information.
10) Solicitation of email for any other email address, other than that of
the poster's account, with the intent to harass or to collect replies.
11) Creating or forwarding "chain letters", "Ponzi" or other "pyramid"
schemes of any type.
12) Use of unsolicited email originating from within ABC's networks or
other Internet/Intranet/Extranet service providers on behalf of, or to
advertise, any service hosted by FNF or connected via ABC's
network.
13) Posting the same or similar non-business-related messages to large
numbers of Usenet newsgroups (newsgroup spam).
e)
Email and Communications Activities
1) The ABC Chief Information Security Officer must approve virus or
other malware warnings before sending.
2) Unless approved by an employee's manager, ABC email will not be
automatically forwarded to an external destination. Sensitive Information will
not be forwarded via any means, unless that email is critical to business and is
encrypted in accordance with the Acceptable Encryption Policy.
4
Physical Security
a)
Protection of Non-Electronic Information
Employees and Vendors are expected to follow the policies listed in Section 1 in their
approach to protection of Company Information in non-electronic form (e.g., paper,
microfilm, microfiche). Measures for information deemed highly sensitive or
vulnerable to misappropriation should include storage in locked file cabinets or similar
locations or in file cabinets or other storage that clearly delineate that they contain
Company Information and that are located in
offices that are kept secure both during and after business hours. Employees and
Vendors must not take Company Information off ABC or Vendor premises, as
applicable, except when necessary to the efficient discharge of their job
responsibilities, consistent with all other corporate policies, and when appropriate care
is exercised to protect against misappropriation or loss.
b)
Protection of Electronic Information
Protection of electronic information will be done in accordance with the
Physical Security Policy and Standards
5
Operations Management
a)
Protection of Electronically and Voice-Stored Information
Those Employees and Vendors responsible for designing, implementing or
managing Systems Must comply with ABC policies for the protection of
electronically stored information. Several types of measures are required for
protection of Company Information stored electronically, whether on servers,
individual computers, voicemail systems or other media. These measures include
password protection, electronic measures (such as file protection or encryption) and
common-sense procedures to minimize the possibility of theft or unauthorized
access, change or interruption. These measures are set forth in separate policies,
standards, and guidelines, promulgated by ABC and
made available, as appropriate, to Employees and Vendors.
b)
Only Approved Software and Virus-Checked Files May Be Used
As with any computer system, and despite precautions, viruses pose a threat to
ABC’s Systems. Before any software can be installed or used on any System, the
software must be virus-tested and approved for use by the ABC IT Department.
Executable files and other files capable of containing viruses must similarly be virustested and approved for use by the IT Department before being introduced to any
System. Strict compliance with this Section by each Employee and Vendor is
necessary to minimize the threat.
c)
Configuration Management
All PCs, laptops and workstations should be secured in accordance with the
ABC IT Operations Management Policy.
6
Security Monitoring and Response
a)
Management of Information Security Incidents
In the event an Employee or Vendor becomes aware or is informed of a breach or
potential breach of security relating to Company Information or Systems, the
Employee or Vendor must immediately (1) notify the Information Security Office of
such breach or such potential breach, and (2) follow the procedures defined in ABC
Information Security Incident Response Plan.
If the applicable Company Information or System was in the possession or under the
control of a Vendor at the time of such breach or such potential breach, the Vendor
(without prejudice to ABC’s other remedies) must immediately (a) investigate such
breach or such potential breach; (b) inform ABC of the results of such investigation;
and (c) assist and cooperate with ABC in all reasonable efforts to locate the source of
the breach or threatened breach, assess the possible compromise of Company
Information and prevent a recurrence of the breach or threatened breach.
b)
Notice of Security Breach or Compromise
Communication and/or notification of a breach or suspected breach with third parties
(people whose information may have been compromised as well as law
enforcement) shall be at the direction of the Chief Compliance Officer.
c)
Systems and Network Monitoring
Authorized individuals within ABC may monitor equipment, systems and network
traffic at any time, in accordance with the ABC Security Monitoring and Response
Policy and Standard.
7
Communications Management
a)
Protection of Information in Transit
Company Information must not be transmitted between Employees, between ABC
and third parties (including Vendors), or between Vendors and third parties, except
as set forth herein:

Any such transfer must be in accordance with applicable privacy and data protection
laws and ABC’s Privacy Statement. Questions regarding the requirements of such
laws or regulations, or the Privacy Statement, should be directed to the ABC’s Chief
Compliance Officer.

Company Information that is transmitted in electronic form outside of a secure
ABC environment must be protected using commercially reasonable methods as
determined by the ABC Information Security Office (“ISO”) and in accordance with
any applicable policies and guidelines separately promulgated by ABC. Any
Customer Information received by ABC or a Vendor electronically over the Internet
must be received through a secure method of transmission (e.g., encrypted
transmission) and stored in accordance with applicable policies and guidelines
separately promulgated by ABC.

Company Information transmitted in non-electronic form must be transmitted
in sealed, opaque packages (For example, Company Information must not
be displayed on postcards except where appropriate under the
circumstances (e.g., name and address)).

If Company Information is faxed to third parties, the sender should ensure that a
“confidential” sigil appears on the front page of the fax and take due care to ensure
that the fax number is correct and that the fax is expected at that number by the
recipient. Faxes containing Company Information should not be sent to recipients in
the care of third-party kiosks or similar “fax-for-fee” locations, unless necessary due
to extraordinary circumstances.
8
Access Control
a)
Passwords And Other Keys
All passwords, pass codes, access control devices, keys, security passes/badges
and personal identification numbers (collectively, “Keys”) issued for the purpose of
accessing ABC Company premises or Systems are the property of that ABC
Company. You are not permitted to use any Key to access, store or retrieve any
Company Information unless (i) specifically authorized in a particular instance or (ii)
authorized in advance as to the type of Company Information and Key to be used.
Without regard to whether information on any System such as Email, voice mail or
document files are Key-protected, you may not access any information on any
System maintained by any other employee unless specifically authorized by the
Employee maintaining that information or an Employee with supervisory authority
over the Employee maintaining that information (For example, logging onto a
System using another employee’s user name or password is strictly prohibited).
b)
Passwords and Accounts Security
Keep passwords secure and do not share accounts. This includes family and
other household members when work is being done at home. Authorized users are
responsible for the security of their passwords and accounts. Password
requirements can be found in the ABC Access Control Policy and Standard.
9
Network Security
Controls must exist to protect information when transiting trust boundaries. At a
minimum, the following controls must be taken into consideration;




Authentication – i.e. domain credentials, physical links, or shared secrets.
Logging - i.e. authentication failures, security events, or connection events.
Inspection - i.e. intrusion detection or prevention systems, malware
detection, or vulnerability detection.
Protection - i.e. firewalls, routers, or proxies.
These controls will be implemented in accordance with the Network Security
Policy and Standard.
10 Third Party Services
a) Third Parties
From time to time, ABC may provide Company Information to other third parties
in accordance with the Privacy Statement and applicable law and regulation.
Any such third party must agree to abide by the terms of this Policy.
11 Application Management
To protect information processed by applications developed and maintained by
ABC’s controls must be implemented in accordance with Software Lifecycle Policy
and Standards.
12 Business Continuity
a ) Business Continuance/Disaster Plan
For any Company Information or Systems in their possession or under their
control, management or Vendors must provide good and sufficient business
continuity provisions, in accordance with applicable laws and regulations, which at
a minimum must comply with accepted industry standards.
Employees and Vendors must familiarize themselves with ABC’s own business
continuity procedures/disaster plan (where applicable) to maximize efficiencies in the
event such procedures need to be implemented.
13 Compliance
a ) Applicable Laws
Certain kinds of computer abuse and computer-related fraud are not only against
this Plan, they are illegal and punishable by civil sanctions, criminal fines,
imprisonment, or some combination, or all of the above. Statutes prohibiting such
conduct include, but may not be limited to, 18 U.S.C. §1030, (Fraud and Related
Activity In Connection With Computers) and 18 U.S.C.
§§2510-2520, 2701, 2710 (Wiretap and Electronic Communications Privacy Acts).
State laws may also apply. ABC will report suspected criminal conduct to the Chief
Compliance Officer and law enforcement.
b) Encryption
1) Any information that is classified by the information owner as
Sensitive or Restricted should be encrypted.
2) When possible the ABC’s Encryption Platform should be used for encryption
of Sensitive and Restricted information.
3) Proven, standard algorithms must be used as the basis for encryption
technologies.
4) Use encryption of information in compliance with the ABC IT
Compliance Policy and Standard.
5) For guidance on encrypting email and documents, contact the ISO.
b) Unacceptable Use
The following activities are, in general, prohibited. Employees may be exempted
from these restrictions during the course of their legitimate job responsibilities (e.g.,
systems administration staff may have a need to disable the network access of a
host if that host is disrupting production services).
Under no circumstances is an employee of ABC authorized to engage in any
activity that is illegal under local, state, federal or international law while utilizing
ABC-owned resources.
The lists below are by no means exhaustive, but attempt to provide a
framework for activities that fall into the category of unacceptable use.
c)
The following activities are strictly prohibited, with no exceptions:
1)
Violations of the rights of any person or company protected by
copyright, trade secret, patent or other intellectual property, or
similar laws or regulations, including, but not limited to, the
installation or distribution of "pirated" or other software products that
are not appropriately licensed for use by ABC.
2)
Unauthorized copying of copyrighted material including, but not
limited to, digitization and distribution of photographs from
magazines, books or other copyrighted sources, copyrighted music,
and the installation of any copyrighted software for which ABC or
the end user does not have an active license is strictly prohibited.
3)
Exporting software, technical information, encryption software or
technology, in violation of international or regional export control
laws, is illegal. The appropriate management should be consulted
prior to export of any material that is in question.
14 IT Management
ABC Company’s Executive Management has charged Information Technology with
the responsibility for developing, maintaining and communicating a comprehensive
information systems management program to support the development, deployment
and operation of Company information resources.
a) Change Management
Change Management controls are implemented in accordance with the IT
Operations Management Policy and Procedures.
b) Quality Management
Quality Management controls are implemented in accordance with the ABC’s
Quality Management IT Framework.
15 IT Incident Management
IT incidents and problems shall be managed according to the IT Management
policies, procedures and standards.
16 Privacy
Security Classification
All Company information or information entrusted to the Company from a third
party should be identified and classified by the Information Owner according to its
level of confidentiality. The classification levels used by the Company are:



Public;
Sensitive;
Restricted.
Public information is information that can be disclosed to anyone. It would not
violate an individual's rights to privacy. Knowledge of this information does not
expose the Company to financial loss, embarrassment or jeopardize the security
of Company assets. Examples include:





Marketing brochures
Published annual reports
Interviews with news media
Business cards
Press releases
Sensitive Information is information whose unauthorized disclosure,
compromise or destruction would directly or indirectly have an adverse impact on
the Company, its customers or employees. Sensitive information may be shared
with parties who have a relationship with the Company, if they have signed a nondisclosure agreement, and have a need to know. Information that should be
classified as sensitive is:


Customer Information
Company Information
Restricted Information is characterized as sensitive information that is intended
for a very limited group of individuals who should be specified by name. This
level contains information, which if disclosed would provide access to business
secrets and could jeopardize important interests or actions of the Company or its
clients and would be to the serious personal or financial detriment if revealed to
unauthorized persons. Information should be classified as Restricted if it includes
at least one of the following characteristics:








Strategic planning information, prior to general or public disclosure
Information on mergers, acquisitions or divestitures, prior to general or public
disclosure
Financial forecast or results, prior to general or public disclosure
Information that would enable clients with numbered accounts to be identified
Information pertaining to business strategy, raw closing data, closing analyses
or secret reports
Passwords
Any form of security key
Any other information that may be damaging to the Company, if
disclosed
a) Privacy Statement
The ABC Company Privacy Statement must be included as part of all Internet or
Intranet sites/applications.
c) Collection of Sensitive or Restricted Information
Should be limited to that which is necessary to conduct company business.
d) Copying and dissemination (including internal) of Sensitive Information
Should be limited to those purposes that are necessary to conduct
company business.
e) Retention of Sensitive or Restricted Information
Shall be in accordance with the Record Retention Policy.
f)
Internet/Intranet/Extranet Systems
The user interface for information contained on Internet/Intranet/Extranet- related
systems should be classified in accordance with this policy. Employees should
take all necessary steps to prevent unauthorized access to Sensitive or
Restricted Information.
17 Audit Management
a ) Internal Audits
An Internal Audit Department may be created by Management and if created,
conduct periodic, unannounced audits of each ABC Company’s compliance with
this Plan. A Vendor’s compliance with the Plan is subject to Audit consistent with
the terms of that Vendor’s contract.
b) Network and Systems Audits
ABC reserves the right to audit networks and systems on a periodic basis to
ensure compliance with this Plan.
18 Definitions
ABC – ABC Company
Blogging - Writing a blog. A blog (short for weblog) is a personal online journal that is
intended for general public consumption.
Chain email or Letter - Email sent to successive people. Typically the body of the
note has direction to send out multiple copies of the note and promises good
luck or money if the direction is followed.
Customer - An individual or entity who is a consumer and with whom ABC has or had an
ongoing customer relationship
Customer Information - All materials or information in whatever form, whether written, oral,
digital or otherwise that is (a) defined as “confidential” or is a Trade Secret hereunder
or under any ABC policy, plan or under any agreement to which ABC is a party; (b)
subject to special protections that require confidentiality under any law or regulation;
(c) non-public and that relates to ABC’s finances, employees past, present or
potential), research, development, facilities or business or (d) non-public personal
information relating to a past, present or potential customer of ABC that identifies the
customer in any way (including information that is publicly available, but whose
disclosure would indicate that ABC had a customer relationship with that individual).
Company Information - All materials or information in whatever form, whether written,
oral, digital, or otherwise, (a) that is defined as “confidential” or a “trade secret”
under any ABC Policy, Plan or under any agreement to which ABC is a party; (b)
that is subject to special protections that require confidentiality under any law or
regulation; (c) that is non-public and that relates to ABC’s finances, customers,
employees, operations, research, development, facilities, etc.
Email – The electronic transmission of information through a mail protocol such as
SMTP or IMPA. Typical email clients include Eudora and Microsoft Outlook.
Employee – Every person employed by ABC at any level
Forwarded email – Email resent from an internal network to an outside point.
Spam – Unauthorized and/or unsolicited electronic mass mailings.
Systems - Collectively, (a) computer systems (both hardware and software),
including networks, web sites, servers, personal computers, handheld
computing devices, and remote devices (whether connected to a network by
wireline or wireless connections); (b) communications systems, including
telephones, fax machines, modems and network communications devices
and software, personal digital assistants; and (c) other equipment used to
store and retrieve data (such as paper-based filing systems), which are in the
possession or under the control of ABC.
Unauthorized Disclosure - The intentional or unintentional revealing of Sensitive
Information to people, both inside and outside ABC, who do not have a need
to know that information.
Vendor - Any person or entity, including its employees and all permitted agents
and subcontractors, which is not an employee of ABC, and which provides
goods or services to ABC by agreement.
Virus warning - Email containing warnings about virus or malware (The
overwhelming majority of these emails turn out to be a hoax and contain
bogus information usually intent only on frightening or misleading users).
You and your – An Employee or Vendor
19 Revision History of this Privacy & Information Security Plan
Rev
#
Date
Description (Examples Below)
1
Enter Date
Original Creation of Plan Document
2
Enter Date
Published
3
Enter Date
Draft release for review
4
Enter Date
Revised draft release for review
5
Enter Date
Published (should correspond w/Employee Acknowledgment)
6
Enter Date
Published (should correspond w/Employee Acknowledgment)
Continue entering anytime there is a revision or change, etc.
The information provided in this SAMPLE Policy Document is for your reference only and is not
intended to represent the only approach to any particular issue. These guidelines should not be
construed as legal, financial or business advice, and you should consult legal counsel and subjectmatter experts to determine the appropriate policies, procedures and strategies applicable to your
office or organization.
Sample 6: Clean Desk Policy
ABC Company
Clean Desk Policy & Physical Security
Compliance Notice
Dated: __________________











All desks must be cleared off at end of day
All files must be returned to file cabinets prior to leaving for the day
All users must lock their computers whenever they leave their work site
All users are required to shut down their computers at end of day
Exception: ABC Company IT/IS advises users to log off but leave computer on for system
updates, etc.
All file cabinets are locked at end of day
Users are not authorized to download or use personal applications on their desktops/laptops
(Refer to Employee Handbook or ABC Company Policy regarding computer use)
Users are not authorized to live stream any application outside of ABC’s domain or control
Users have access and are authorized internet usage as defined:
ABC’s Employee Handbook and Company Policies (including, but not limited to Code of
Business Conduct and Ethics and/or Company Policy regarding computer use)
Users are required to remove all printed material from their work station and put in the locked
file cabinets or locked shredding bins (if the printed materials are no longer needed) at the
end of the day
Users must not allow any person other than a regular employee into the office unless the
following conditions are met:
1.) Guest/Visitor must sign in on Visitor’s Log Sheet – do not leave sign in sheet openly
visible to the public
2.) Guest/Visitor must be escorted by an Employee at all times while in the office
3.) Guest/Visitor must be issued a pass
4.) In order to receive a pass, Guest/Visitor must show a government issued picture ID
5.) Guest/Visitor must wear the pass in a highly-visible location
6.) No delivery services of any kind are authorized to enter the facility unless they have
completed all these requirements
7.) Guest/Visitor must sign out when they leave for the day
8.) Guests/Visitors that are to be at the facility for more than one business day must repeat
the sign-in procedures on a daily basis.
Users must check out and out all physical files that are taken from any of the storage
cabinets.
Check out:
User must enter date and time of file removal from cabinet.
Check in:
User must enter date and time of file return to cabinet
This is a zero tolerance policy. Failure to comply may result in additional training
and/or disciplinary actions, including but not limited to, oral or written warnings,
suspension or immediate termination.
Organization, ownership and enforcement of ABC’s “Clean Desk” Policy
ABC’s Compliance Officer is the owner of this policy and responsible for its approval. The
Compliance Officer in conjunction with the ABC Management Team must approve any
deviations from this policy.
If an employee violates any of the terms of this Policy, the employee may be subject to
disciplinary actions, including but not limited to, oral or written warnings, suspension or
immediate termination. The type of disciplinary action does not depend on the nature of the
violation. ABC does not promise, imply or represent that one form of disciplinary action will occur
before another.
If a Vendor violates any of the terms of this Policy, the vendor’s contract with ABC may be
subject to immediate termination for cause, in accordance with its terms. In addition, certain
violations of this Policy may result in criminal prosecution and/or liability.
Maintenance of ABC’s “Clean Desk” Policy
This policy is maintained by ABC’s Compliance Officer to ensure relevance, quality and
completeness.
Requests for Change are reported to the Compliance Office in conjunction with ABC
Management Team, which is responsible for analyzing the impact of the change from a
business, security and financial perspective. Changes approved by the Compliance Officer will
be sent to the ABC Management Team for review prior to implementation.
ABC reserves the right to supplement, change or discontinue any portion of this Policy from
time to time at its sole discretion.
Back to Top
Industry
Best Practice

Pillar 4
Settlement Policies
& Procedures
Adopt standard real estate settlement
procedures and policies that help
ensure compliance with federal and
state consumer financial laws as
applicable to the settlement process.
Purpose:
Adopting appropriate policies and conducting ongoing employee training help ensure the Company can meet
state, federal, and contractual obligations governing the settlement process.
Considerations:
1. If there are two sets of contradicting closing instructions, (one general and one specific) what is your
office procedure? Who is responsible for handling those conflicts?
2. What are your contractual and legal requirements in regards to recording documents?
3. Are recordings tracked? Who is responsible for tracking?
4. Which counties in your area of service accept eRecording?
5. Could eRecording streamline your closing and title processes?
6. Are rejected recordings handled in a timely manner?
7. Does the company ensure consumers are charged the correct title insurance premium and other fees?
8. Are file audits completed to ensure compliance with company policies and procedures?
9. Is the Company making sure all employees are kept current with state and federal requirements?
10. Is all training documented in a training log?
Solutions/Suggestions:
1.
2.
3.
4.
5.
6.
Use your underwriter’s rate calculator. Print the calculation provided and maintain in the file.
Review electronic recording resources to determine availability and benefits.
Review the sample checklists and customize them to meet your agency and county’s specific situation.
Create written policies and procedures regarding pricing, recording, and settlement.
Maintain a separate Training Binder to document ongoing employee training.
Create an internal audit process to ensure compliance with all written procedures.
Tools & Resources:
SAMPLE 1: Real Estate Closing Checklist
SAMPLE 2: Documents for Recording Checklist
SAMPLE 3: Recording Checklist
SAMPLE 4: Written Policy - Settlement Policies & Procedures – Pricing Procedure
SAMPLE 5: Written Policy - Settlement Policies & Procedures – Recording Procedure
SAMPLE 6: Written Policy - Settlement Policies & Procedures – Disbursement
Pricing resources:
FNTG GFE calculator: http://title.com/gfe/
FNTG rate calculator: http://ratecalculator.fntg.com
Electronic recording resources: www.simplifile.com
www.cscglobal.com/global/web/csc/fntg.html
Sample 1: Real Estate Closing Checklist
Title Commitment
Check Title exceptions and review with examiner if needed
Survey ordered, received and reviewed prior to closing
Mortgage payoffs ordered and received or Releases acquired for old mortgages on title
Home Equity payoffs ordered and received, if applicable
Check transfer tax guide for your municipalities' requirements for transfer stamps
Check on real estate tax payments
Tax proration’s computed for closing; real estate taxes, insurance, association fees, water,
sewer
Real estate broker commission and splits
Amount of earnest money; brought to closing or retained by broker
Power of Attorney
Seller's documents for closing:
Deed (check vesting, spelling of names)
Affidavit of Title
Bill of Sale
State and County Tax Revenue Declaration
Check for any municipality requirements, for example
If a Chicago property and or Cook/Will County property:
IL Anti-predatory lending database certificate to be attached to mortgage
Water Certification and Zoning Compliance
Grantee/Grantor clause attached to Deed
If Condominium
Right of First Refusal
Paid Assessment Letter
Certificate of Insurance transferred to new owner
Water Certification letter if in Chicago
If Investment
Copies of Leases
Security Deposit Log
Letters to Tenants
Proration’s of Rents and Security Deposits
If in a Land Trust
Letter of Direction signed
Trustee's Deed and ALTA from Trust
Buyers Documents for Closing
Drivers’ license or acceptable form of I.D. from each buyer
Home Owners Insurance with paid receipt
Settlement Statement from sale of previous home, if applicable
Closing confirmed with all parties
Buyer(s) – Borrower(s)
Seller(s)
Lender
Seller’s attorney (if applicable)
Buyer’s attorney (if applicable)
Listing Broker
Selling Broker
Closers Initials __________
Sample 2: Documents for Recording Checklist
DEEDS – INDIVIDUAL
Address of party that prepared document
Address of where to return document after recording
Address of property
Name and address of the Grantee for tax billing purposes
Deed dated
Legal description same as the commitment and survey
Consideration recited (actual consideration should be used on an administrator's, executor's or
guardian's deed)
Notarized
PIN# match the commitment
Grantor/ Grantee Statement - recorded with all exempt deeds (Cook County, IL)
GRANTOR - INDIVIDUALS
Marital status stated? (Does the grantor have the capacity to convey? I.E.; a minor or disabled
person)
If titleholder is married and the property is their primary residence; spouse must sign to due to
homestead rights (or Dower Rights)
If the property is not the primary residence, deed should recite "Grantor hereby states that subject
property is neither his/her homestead nor of his/her spouse"
GRANTOR - PARTNERSHIPS
Deed must recite the state in which the partnership was formed
Do you know who has the authority to sign the Deed?
Need to consider the rights of the Partners
Terms of the Partnership Agreement
Copy of the Agreement
Copy of any Amendments, if any
GRANTOR – CORPORATIONS
Deed must state the state of incorporation
Certified copy of the Corporate Resolution authorizing the conveyance of the property
or the mortgage
Corporate By-laws
Certificate of Good Standing
GRANTOR - RELIGIOUS CORPORATIONS
Do you know who is authorized to sign the Deed?
Corporate By-laws
Resolution passed by the members of the party in title authorized the conveyance
Names of all persons elected members of the Board of Trustees at the last election
Form of notice for the election
Total number of members entitled to vote on corporate matters
Proper notice given to all members
Number of members present at such meeting
Number of "ayes" and "nays"
GRANTOR - LIMITED LIABILITY COMPANY
Deed must recite the state in which the company was formed
Underwriting Conditions:
Certificate from Secretary of State that it has filed its Articles of Organization (where
applicable)
Copy of the Articles of Organization
List of managers or members
Certification that no event of dissolution has occurred
Closers Initials __________
Sample 3: Recording Checklist
File Number:
Task
Notes
Date Completed
Grantor Name/Address/All Owners are
Conveying
Grantee Name/Address
Mortgagee/Assignee/Borrower Name Address
Marital Status
Legal Description (Proofed against title
commitment)
Sidwell Number (a/k/a property tax ID number)
Signature(s) – match typed names beneath
Light ink or blurry Notary Stamp (will get kicked
back unrecorded)
Notarized
Notary acknowledgment properly completed
Drafted By Name/Address
Return To Name/Address
Printed Notary Name
Margins Sizes – meet state requirements – all
blank
a/k/a or f/k/a verbiage, if needed
POA/Trust/Probate/Death Certificate Verbiage,
if needed
Document Dated date
Printed ink color – black (ROD Requirements?
Lender Requirements?)
If Consideration/$$$ are not recited on deed –
Real Estate Transfer Valuation Affidavit listing
consideration & attached to deed
Exemption clauses for revenue stamps &
transfer taxes, if applicable
Trust/Corporate or other entity signature
block/identification
Document identified by name
Exhibit/Rider indicated and/or attached (i.e. see
attached Exhibit A)
Dower/Homestead Verbiage, if applicable
Capacity/marital Status in Acknowledgement
Name(s) printed under all signature(s)
Reference information top of page 2 (deed)
Print size in accordance with your state/local
requirements
DOUBLE CHECK sending to correct property
County/Counties
Closers Initials __________
Sample 4: WRITTEN POLICY - Settlement Policies & Procedures - Pricing Procedure
1. On a semi-annual basis, the “Rates and Remittances” language in the Issuing Agency
Contract is reviewed with all personnel responsible for rate and split calculations, policy
issuance and policy reporting. When rate change bulletins are issued, the reviews are
immediate in order to ensure that proper rate changes are made.
2. When rate change bulletins are issued, the software provider (Softpro Corp., Ramquest,
etc.) is contacted to confirm that they have been notified by the underwriter and will have
the proper updates made to the software.
3. On each title order, rate manuals and online calculators (as appropriate) are used to
ensure correct fees are being charged for policy premiums, state specific fees, and
endorsements.
4. Applicable rate discounts, such as Simultaneous Issue, Reissue, and Refinance Rates (if
applicable in state) are calculated and charged when appropriate.
5. A written record of all rate calculations is kept in the file.
6. On a quarterly basis, a quality check of 5% of all files is made to verify compliance with
rate calculations and recording procedures.
Sample 5: WRITTEN POLICY - Settlement Policies & Procedures - Recording Procedure
1. Documents are submitted or shipped for recording to the proper recording office within 2
business days of the later of (i) the date of Settlement, or (ii) receipt by the agency if the
Settlement is not performed by the agency.
2. Where available, electronic recording is used.
3. For counties where we do not have an office and electronic recording is not available, we
use a third party recording service__________.
4. Shipments of documents for recording are tracked and a log is kept.
5. We verify that recording actually took place and maintain recording information for each
document in each file, as well as a separate log of all recordings.
6. When notice is received that a document has been rejected, the document is treated as a
‘new closing’ and all effort is made to resolve the problem and submit for re-recording
within two days. If a solution is not forthcoming, we consult with our underwriter and
develop a strategy to mitigate immediately.
Sample 6: WRITTEN POLICY – Settlement Policies & Procedures - Disbursement
1) We acknowledge that Lenders expect full disclosure of all receipts and disbursements in accordance
with written mutual instructions.
2) All sets of Closing Instructions are collected and reviewed prior to closing.
3) If any one set of Closing Instructions is adverse to another set of closing instructions – we obtain in
writing from all parties consent to the changes made to correct the adverse matters prior to closing.
4) The closing is performed in accordance with all instructions including:
a) Lender Closing Instructions
b) Title Commitment
c) Purchase Agreement
d) Any other misc. agreements (Escrow Agreements, etc.)
5) Follow all HUD Regulations in preparation of the HUD-1 Settlement Statement and be sure that ALL
disbursement checks MATCH EXACTLY as to what is shown on the HUD-1 Settlement Statement.
6) We will adhere to all State and Federal laws.
Specific Detailed Guidelines: Disbursement Of Proceeds
Buyer/Borrower Proceeds:
Any amount shown on line 303 of the HUD-1 Settlement Statement (funds due from
Buyer/Borrower) must come into your escrow/trust account from the borrower or be disbursed to your
borrower as shown in Section D.
Any funds received by any other party must reflect on a separate line in the 200 series designating the
source of funds.
In regions where the buyer/borrower funds are credited prior to the printing of the final HUD-1
settlement statement, those funds are reflected in the 200 series of the HUD-1 settlement statement
showing the source of funds and line 303 should reflect zero proceeds or a refund, if any, due to the
buyer/borrower.
Seller Proceeds:
Seller proceeds are not assigned and are disbursed to Seller, as defined in the Loan Closing
instructions and in accordance with the HUD-1 settlement statement. Where the Seller requests the
proceeds be paid otherwise, pre-closing clearance is obtained by us.
Multiple disbursements to the same payee are not acceptable especially when asked to disburse in
increments of $10,000 or less.
Borrower proceeds from a refinance, if any, are only paid in strict compliance with the written closing
instructions provided by the funding lender. Pre-closing consent is obtained from the lender on any
request to pay additional parties. If such consent is granted, the changes are listed in the 1300 section
of the HUD-1. We do not rely on approval of the mortgage broker. Additionally, the funder’s approval
of the HUD-1 or closing statement is not sufficient as evidence of consent.
If a lender disapproves of any requested disbursement, appropriate parties are notified in writing.
Where directed or allowed by Lender, we will accept written instructions for the following:


Deposit proceeds directly into a bank account on behalf of the principals.
Cut separate checks or send a wire in the name of each individual seller or borrower.
Mortgage Payoffs:





Must be in writing and should reference the loan number and property address in
addition to the borrower’s name
Monitor home equity lines of credit and obtain a signed ‘closing letter’ from the
borrower to the lender requesting that the credit line be closed.
Put sufficient detail on the payoff check to identify the property, loan number and
borrower.
If property is in foreclosure, make certain you have accounted for any attorney’s fees
and other court costs.
Sellers or borrowers are never to deliver their own payoff check. Payoff checks must
be delivered in a manner in which the date and time of receipt of the check can be
documented.
Escrowed Funds Disbursement:
Purpose:


Approvers’ and/or check signers’ responsibilities on external disbursements are to
ensure the payment amounts are supported, proper vendors are paid, and
disbursements have been properly authorized by the escrow officer.
Approvers’ and/or check signers’ responsibilities over our fee income are to ensure
that checks/journal entries to recognize our fees are only processed after the order
has closed and been fully funded.
Procedure:
All escrow disbursements (check and/or wire) require two approvers. Evidence of the two
approvals is required on the check/wire request and the check disbursement register for every
escrow.
Cancelled Checks and Stop Payments:
Purpose:

There is a growing body of law on the concept that, for example, a title agency may be
responsible for their own losses if they do not have proper controls and safeguards in
place. This is in contrast to the historical laws that generally put the loss for fraud on
banks.

In the U.S., one of the legal principals involved in the cashing and clearance of checks is
that a check that appears to be in the proper form and has the appearance of being
issued in the normal course of business must be honored (paid and cleared) by the bank
on which the check is drawn.
So, if a title agency issues a check, which is then taken and carefully modified by a forger
or otherwise, is deposited and processed, then the title agency is not automatically
protected from loss. Similarly, if there is fraudulent bank wire.

Procedure:
Cashier’s or Teller Checks
Stop payment on a Cashier’s or Teller Check is issued by the company once the following
criteria are met:
Approval from the appropriate supervisor is obtained directing that a replacement item is
issued.
An affidavit concerning the lost, stolen or destroyed item from the person whose obligation is
paid by the Cashier’s or Teller Check is obtained.
Any requirement by the bank upon which the check is drawn to obtain a bond or other form of
security for the amount of the check is satisfied, if the bank is going to reissue the check
before a 90 day period has elapsed.
Trust Account Checks
A check that has been issued and processed in the accounting records, but subsequently lost,
stolen or returned to the Company is “voided”.
If the original check has been returned, it is marked “Void”, the signature portion of the check
is removed, and the check is forwarded to accounting for adjustment to the appropriate
records. Voided checks, if found, are retained.
Prior to reissuance of a returned check, the accounting department must verify the check has
not cleared the bank. A holding period of 36 hours may be necessary to ensure no one has
attempted to process the check electronically.
If the check has been lost or stolen, the accounting department determines if the check has
cleared the bank.
If the check has not cleared the bank, the bank is notified to place a stop payment on the
check.
Upon authorization from the accounting department, a lost check is reissued.
If lost checks are later returned, the check is forwarded to the accounting department and
properly noted across the face of the original check that a stop payment was issued on the
check and the date the stop payment was placed.
Disbursement or Receipt of Funds By Wire:
Purpose:
Wire transfer transactions usually involve large dollar amounts that must be processed quickly.
There is also finality to a wire transfer transaction at the time of execution. Generally, wire
transfers are not subject to a stop payment, recall, cancellation or adjustment. Once a wire
request has been executed, the funds immediately become the property of the transfer recipient.
Because of these concerns and to minimize the risk of loss from errors or fraud, wire transfer
authority is to be centralized within a limited number of management, accounting or
administration employees.
Procedure:



No escrow department employee shall be unilaterally authorized to issue or accept a wire
transfer.
Customers are to communicate all wire transfer requests in writing and each escrow officer is
then to communicate the wire transfer information to one of the authorized wire transfer
employees in writing or by fax. Verbal notification is not sufficient.
In all cases of initiation of a wire transfer by a Settlement Agent, escrow officer or other
authorized party, a reasonable security procedure must be used to validate the transfer.
Mortgage Fraud Awareness and Prevention:
Purpose:
It is in our own self-interest to be vigilant for signs of potential mortgage fraud. The cost of becoming
drawn into a mortgage fraud investigation is substantial, and employees may personally be drawn into
an investigation. Regulators and Underwriters, as well as the general public, consider us to be a
significant part of the process and system for minimizing mortgage fraud.
Our agency will not tolerate ANY deviation from standard closing procedures that would result in
mortgage fraud.
Procedure:
 Adhere to all Underwriting Bulletins concerning Settlement Issues.
 The Company understands that a person that knowingly, with the intent to defraud, does
any of the following may be guilty of the crime of residential mortgage fraud:
o A person that makes a false statement or misrepresentation concerning a material
fact or deliberately conceals or fails to disclose a material fact during the mortgage
lending process.
o A person that, during the mortgage lending process, makes or uses a false
pretense, or uses or facilitates the use of another person's false pretense,
concerning the person's intent to perform a future event or to have a future event
performed.
o A person that uses or facilitates the use of a false statement or misrepresentation
made by another person concerning a material fact or deliberately uses or
facilitates the use of another person's concealment or failure to disclose a material
fact during the mortgage lending process.
o A person that receives or attempts to receive any proceeds or any other money in
connection with the mortgage lending process that the person knows resulted
from a violation.
o A person that files or causes to be filed with the register of deeds of any county of
this state any document involved in the mortgage lending process that the person
knows to contain a deliberate material misstatement, misrepresentation, or
omission.
o A person that fails to disburse funds in accordance with the settlement or closing
statement for the mortgage loan.
o A person that solicits, encourages, or coerces another person to participate in any
of the above activities.
 Company employees are trained to be aware of any of the above listed issues related to a
closing. If an employee believes any of the above items are relevant to a transaction, the
appropriate supervisor will be notified immediately. The transaction will not close or
disburse until appropriate authorization is received.
Back to Top
Industry
Best Practice

Pillar 5
Title Production
Policy production,
delivery, reporting and
premium remittance
Purpose:
Adopting appropriate procedures for the production, delivery, and remittance of title insurance policies helps
ensure that title companies can meet their legal and contractual obligations.
Considerations:
1. Title policy production and delivery.
 Title insurance policies are issued and delivered to customers in a timely manner to
meet statutory, regulatory or contractual obligations.
 Issue and deliver policies within thirty days of the later of (i) the date of Settlement, or
(ii) the date that the terms and conditions of title insurance commitment are satisfied.
2. Premium reporting and remittance.
 Title insurance policies are reported and premiums are remitted to the underwriter in a timely
manner to meet statutory, regulatory or contractual obligations.
o Report policies (including a copy of the policy, if required) to underwriter by the last day of
the month following the month in which the insured transaction was settled.
o Remit premiums to underwriter by the last day of the month following the month in which
the insured transaction was settled.
3. Review title policy production, delivery, reporting and premium remittance requirements with your
Underwriter(s) or review your Underwriter Agency Contracts and Underwriter Bulletins for
details/requirements/expectations.
For policy production and delivery; premium reporting and remittance:
 Establish procedure on how you will track this data. Determine “location” and maintenance of
documentation of submitted remittance reports and premium payment (copies of checks)
submitted to underwriter(s).
 Designate employee(s) responsible for making sure the procedures are being adhered to.
 Communicate the adopted written procedures to your employees.
 Establish training to ensure compliance to effected employees. Document employee training.
 Develop a department (title production) written process (see attached sample) to outline how to
implement the written policy based on day to day operations/workflow.
 Establish agency internal auditing process to ensure ongoing compliance in the workflow
(Frequency of audit, quality control on policy inventory reporting, monitoring and monthly
resolution of any A/R issues with underwriters – i.e. review of underwriter monthly billing
statements and documentation of policies processed).
4. Maintain underwriter premium remittances separately from operating funds.
Solutions/Suggestions:
1. Establish written procedures for the following:
 Title policy production and file maintenance
 Title policy delivery, policy reporting and premium remittance
2. Establish and document employee training to ensure compliance of written policies and procedures.
3. Establish an internal audit process to ensure ongoing compliance with policies and procedures as
outlined.
4. Provide a copy of title production written policies and procedures to applicable employees and obtain
their signed acknowledgement.
Tools and Resources:
Forms:
SAMPLE 1 – Written Policy - Title Policy Production and File Maintenance
SAMPLE 2 – Written Policy - Title Policy Delivery, Policy Reporting and Premium Remittance
Tools:
SAMPLE 3 – Abstractor / Searcher - Outside Vendor Checklist Tool
SAMPLE 4 – Internal Audit Tool: Title File - Quality Control Evaluation
SAMPLE 5 – Internal Audit Tool: Quality Control Review - Individual Title File Audit
Resources:
TitleWave® provides title search products, creates TSR’s, data transfers to your software.
https://www.titlewave.net/Anon/Login.aspx?ReturnUrl=/
Property Insight provides you with one of the industry's largest repository of electronic starter records
covering 50 states. http://www.propertyinsight.biz/dataservices_starters.asp
SoftPro helps keep you compliant with several of the Best Practices. www.softprocorp.com
AgentTRAX provides FNTG Agents with online policy jackets, tracking, reports and Closing Protection
Letters. www.AgentTRAX.com
The information provided in this SAMPLE Policy Document is for your reference only and is not intended to
represent the only approach to any particular issue. These guidelines should not be construed as legal,
financial or business advice, and you should consult legal counsel and subject-matter experts to determine
the appropriate policies, procedures and strategies applicable to your office or organization.
Sample 1: TITLE POLICIES - PRODUCTION AND FILE MAINTENANCE POLICY
Title insurance orders will be processed either on the same day or the next business day after
receipt.
Title insurance searches and exams will be made with due regard to recognized title insurance
underwriting practices and in accordance with your Underwriter's bulletins, manuals and other
instructions, including any state or federal applicable requirements.
Each policy issued on behalf of your Underwriter is issued upon a determination of
insurability of title which includes, but may not be limited to:
a. A search from earliest public records or in accordance with applicable state law
and/or Underwriter's written instructions; and
b. An examination of all documents affecting title to the subject property.
Each title order or transaction is prepared and maintained in a separate title file that contains all
documents upon which we relied to make our determination of insurability, including, but not limited
to: affidavits, maps, plats, lien waivers, surveys, title reports, searches, examinations, and work
sheets, together with a copy of each commitment, policy, endorsement and other title assurance
issued. All title orders that are revised will be tracked by adding “REVISION 1”, 2, 3, 4 respectively
with notes in the production system as to what the revision was and who requested it, when it was
sent out, etc.
We maintain a separate closing file for each transaction, with closing file containing, without
limitation; closing statements, disbursement worksheets, copies of all checks disbursed and
receipted, deposit slips, escrow agreements and any other instruments or documents executed or
created at Closing. We generally keep both the title and closing files for each property together in
one physical folder or electronic filing system that allows tracking and future review. A checklist is
performed electronically or a manual checklist is placed in the folder.
The title and closing files are preserved in accordance with our contractual obligations with our
underwriters, in addition to applicable State document retention requirements, or in the case of a
legal hold order, in accordance with instructions of our Underwriter(s).
In the event that we destroy or disseminate the files for any reason, we shall maintain and protect
any confidential or private information contained in such files in accordance with applicable State
and Federal law and with any permissions needed per our underwriting contracts.
We perform an Open File Audit every month. An “Open File” is defined as ~ a title commitment was
issued with no further communication from the customer who ordered it and no payment of premium
has been received. Monthly, all open files will be reviewed that have aged three months or older.
We follow up with the party that ordered the commitment to find out the status of the transaction. At
each monthly Open File Audit, the file status will be updated to either cancel the file or confirm that
the transaction is still active.
A quarterly internal audit is completed using a random selection of 25 files from those files that have
closed and policies where policies were issued in the last three months. This audit is performed by
our Title Production Manager. The following items listed on the “Quality Control Review – Individual
Title File Audit” checklist are reviewed:
a.
b.
c.
d.
e.
Date of Settlement vs. Date All Conditions Met vs. Date of Policy
Confirmation appropriate premium was charged to the customer
Documentation of a refund to the customer if an over-charge was discovered
Date policy was reported to the underwriter
Date premium was remitted to the underwriter. Remittance to underwriter is
confirmed by reviewing account statements, cleared checks or transfers and
bank statements for Trust/Escrow Account and/or Premium Account
When claims are filed and the underwriter requests a copy of the file in question, or when files are
requested for other reasons, we promptly search for and provide the requested documentation.
These include:
A. all documents received by Agent in which Underwriter is a party to any administrative and/or
judicial proceedings;
B. all written complaints or inquiries made to any regulatory agency regarding transactions
involving title insurance policies, endorsements, commitments or other title assurances of a
particular Underwriter;
C. any information alleging a claim involving a policy, commitment, endorsement or other title
assurance of an Underwriter or a transaction for which an Underwriter may be liable;
D. all original documentation and work papers associated with the transaction or conduct giving
rise to any examination, claim or complaint.
In the event a request for a copy of a title policy or settlement statement presented to our Company,
we will assist customers to the best of our ability, but will be mindful of our obligation to ensure that
the party requesting the title policy or other documentation is entitled to it. The title policy is a
contract between the Company and the insured party, and, with few exceptions, we may only give a
copy to our insured. Other documentation likely will fall under the definition of Non-Public Personal
Information. When faxing, emailing, scanning or in any way delivering a policy, the policy jacket and
the schedules and all endorsements must be sent, as all the components together make up the
policy.
The following parties may receive copies of a Lender’s Title Policy:
A. The insured lender named in the Lender’s Title Policy.
B. MERS, if MERS is named in the insured deed of trust as the nominee of the insured
lender.
C. A loan servicer, if the loan servicer provides satisfactory documentation to establish
they service the loan for the insured lender. If you receive a written letter from a party
who states they service the loan on behalf of the lender, you may rely upon that
representation without having to obtain the written consent of the lender. Use good
judgment – if a request from a servicer appears questionable, of course contact the
lender to be sure the request is legitimate.
D. A party claiming to be the current holder of the indebtedness, if there is evidence of
record such as an assignment of lien that indicates they are the holder of the
indebtedness, or other evidence such as a copy of the original note and it shows the
note has been endorsed to the party requesting a copy of the policy.
E. Any other party with the written consent of the insured lender.
The following parties may receive copies of an Owner’s Title Policy:
A. The insured party named on the Owners Policy. We have the customer submit a
signed, written request when asking for a duplicate of the Owners Policy.
**For
situations such as heirs requesting policy copies (i.e., “my parents are deceased and I
need a copy of their “Owners Policy”), please consult local underwriting for the correct
practice.
B. When an Owner’s Policy is requested by Law Enforcement we instruct our staff to
consult local underwriting for the correct practice.
The information provided in this SAMPLE Policy Document is for your reference only and is not
intended to represent the only approach to any particular issue. These guidelines should not be
construed as legal, financial or business advice, and you should consult legal counsel and subjectmatter experts to determine the appropriate policies, procedures and strategies applicable to your
office or organization.
Sample 2: TITLE POLICY DELIVERY, REPORTING & PREMIUM REMITTANCE POLICY
Policy Delivery to Insured Parties: Relative to the issuance and delivery of title policies, we will
comply with all state and federal regulations, along with our contractual obligation with our
underwriter(s) to deliver title policies the within prescribed time periods.
1. Title policy production and delivery.


Title insurance policies are issued and delivered to customers in a timely manner to meet
statutory, regulatory or contractual obligations.
Issue and deliver policies within thirty days of the later of (i) the date of Settlement, or (ii) the
date that the terms and conditions of title insurance commitment are satisfied.
2. Premium reporting and remittance.

Title insurance policies are reported and premiums are remitted to the underwriter in a
timely manner to meet statutory, regulatory or contractual obligations.
o Report policies (including a copy of the policy, if required) to underwriter by the
last day of the month following the month in which the insured transaction was
settled.
o Remit premiums to underwriter by the last day of the month following the month in
which the insured transaction was settled.
3. Premium accounts for funds owed to underwriters: We maintain the underwriter portion of the title
premium in a separate premium escrow account (a separate account for each underwriter) or in a
separate file identified in our escrow/trust account for each underwriter. When we perform a closing
or when we receive payment for a policy, the underwriter portion of the premium is transferred to the
underwriter file for premium remittance for each underwriter within the escrow account OR the
underwriter premium share will be transferred/deposited directly from the escrow bank account used
for closing/disbursing the transaction to an escrow premium bank account for each underwriter. This
escrow premium bank account is “2-way reconciled” monthly. If there are monthly bank fees
assessed on the account, the account is reimbursed monthly from our operating account. If this
account is an interest bearing account, the interest will be transferred to our general account on a
monthly basis.

If we discover that a consumer has overpaid for a policy, our physical file and electronic
file will be documented and we will process a refund for the amount of the overpayment
of premium to the consumer with an approval from the Title Manager / Supervisor.
Sample 3: ABSTRACTOR / SEARCHER - OUTSIDE VENDOR CHECK LIST
Vendor Name: ___________________________________________
Date W-9 on file _________________________________________
Date E&O received ______________________________________
Need to verify (monthly / bi-monthly / semi-yearly / when you use them)
Call to confirm the E&O Policy is valid & the binder is not altered.
What is the dollar coverage? _____________________________
Recommend a coverage of $1,000,000 or higher
Coverage is for “employees and outside contractors” with the entity you’re hiring.
(This should be stated in the policy somewhere and they should be able to point
those specific coverages out to you.)
References provided and verified via called / emailed. Results reviewed.
Have a complete understanding of what the charges will be and what is provided for those specific
charges. Ask about the following details:
What is the geographical coverage area they provide?
What is their Turn-Around-Time (TAT)?
What type of searches do they provide and does it match your underwriter(s) guidelines?
Current Owner… back to what type of deed?
Purchase Money Mortgage (PMM) Search?
Does the PMM match your guidelines for a stopping point?
Two Owners…two Warranty Deeds or what type of deed combo?
40 year search or “X” number of years search?
Do they find a Warranty Deed or any Deed outside of the 40 year mark?
Do they provide all Easements & Restrictions with the search?
Ask for details… ingress / egress, back to 1920, reviewing CCR’s / B&U’s?
Pricing? Have them provide you with a pricing sheet with products outlined?
Pricing for copies? Do they call you before sending you “x” amount of pages?
What is the best way to communicate with them? Website / Email / Text Msg. / Fax
Do they search Commercial Property?
Other:
Sample 4 - Internal Audit: TITLE FILE - QUALITY CONTROL EVALUATION
Order #: _______________________ Examiner: ______________________________________
Application
1.
2.
3.
4.
commitment/invoice not emailed or faxed
endorsement requests not considered
lender insured clause not shown correctly
special instructions not followed
Schedule ‘A’
1.
2.
3.
4.
5.
6.
7.
effective date incorrect
estate being other than shown or reported
title vesting missing
title vesting inaccurate
type of tenancy incorrect
legal description – wrong property
legal description – typographical errors
Schedule ‘B’ Taxes
1.
2.
3.
4.
5.
wrong pin/typo
incorrect year or payment status reflected
missing tax sale, forfeitures, assessments
missing additional pin
missing tax exception
Schedule ‘B’ Mortgages, Liens, Judgments
1. lien not raised
2. inaccurately shown (does not affect)
3. other
Schedule ‘B’ building lines, easements, restrictions
1. inaccurately raised
2. missing exceptions
Title Procedures
1.
2.
3.
4.
rules for judgment search not followed
rules for prior unreleased mortgages not followed
unnecessary exceptions raised
exceptions not raised
Billing
1.
2.
3.
4.
filed rates not applied
items not properly billed
missing billable items
rate calculation sheet in file for later reference on how calc was done
Other
Sample 5 - Internal Audit: QUALITY CONTROL REVIEW – INDIVIDUAL TITLE FILE AUDIT
File #: ___________________
Examiner: ___________________________________________________________
I.
Title Evidence/Application
1. Are there written instructions from the customer in the file (i.e. order form)? ___yes ___no
If so, do they ask us to perform services we should not be providing? ___yes ___no
2.
Type of title evidence in file:
____Search Notes
____Title Report
____Prior Policy from _________________________Company – Dated __________
____Commitment/Binder from _________________Company – Dated __________
Search performed by or obtained from: ___________________________________
3.
Search period from ____________________ to _____________________________
4. What evidence of the status of taxes is in the file?
____Paid Tax Receipts
____Letter or computer print-out from tax assessor
____Notes (i.e. Oral conversation with tax assessor)
____Other _________________________________
____None
5. Within the time frame covered, was the search complete, i.e. were all parties searched; did
search include special assessments; financing statements; judgments, etc.? ____yes
____no
If no – explain:
_______________________________________________________________
6. Can the search be reconstructed from notes or other evidence in the file? ___yes ___no
II.
1.
Commitment/Binder Policy
Does the effective date of the title evidence match the effective date of the commitment?
___yes ___no, Explain:
2. Are all open liens of record shown in Schedule B of the commitment? ___yes no___
3. Do the exceptions on the commitment match the title report or search results? ___yes
___no
4. Is the status of taxes reflected properly in the commitment? ___yes ___no
5. Are current forms/schedules being used & identified by date, etc.? ___yes ___no
6. Is the “type of policy” to be issued identified in the “proposed insured” section? (i.e. ALTA
Owners Policy 06/17/2006 OR ALTA Loan Policy 06/17/2006, etc.) ___yes ___no
III.
1.
Title Clearance
Is the evidence to clear title in the file? ___yes ___no
Specifically:
_____ Required Deeds, Affidavits, etc.
_____Evidence of Mortgage Payoff (check copy)
_____Discharges or releases of all prior mortgages
_____Partial Releases of mortgages
_____Subordinations, assignments, discharges of liens, judgments, etc.
_____Personal undertakings (Indemnifications), Letter of Credit, Bonds
If these documents were prepared by the title office, were they prepared properly?
___yes ___no
LIST ALL MISSING ITEMS:
2. Are the names of the deed mortgage, commitment identical? ___yes ___no
3. Was a construction loan disbursed? ___yes ___no
Were all underwriting guidelines follow for construction as required? ___yes ___no
4. If yes, what documentation supports the disbursement?
_____Sworn Statements
_____Lien Waivers
_____Builder/Contractor’s Indemnity
_____Owner’s Indemnity
_____Developer’s Indemnity
_____Financial Statements
_____Contract for Construction
_____Construction first lien letter
_____Written approval from Underwriter to do construction transaction
IV.
1.
Policy Information
Schedule A Information:
_____Owners Policy; Liability Amount ________________ Policy Number:
______________
_____Loan Policy; Liability Amount __________________ Policy Number:
______________
Type of Loan: Permanent ______ Construction ______
Are current Schedules/Forms being used with identifiable information (date) on form?
2. Was the Policies issued within 30 days of the terms and conditions of title insurance
commitment have been satisfied?
Owners Policy; date all was met ________________ Date Policy was sent for delivery:
_____________
Loan Policy; date all was met ________________ Date Policy was sent for delivery:
____________
3. Was the appropriate premium amount charged to the customer?
Owners Policy; Liability Amount $_______________ Amount for Policy Charged
Customer: ______________
Amount for Policy as applicable: $______________
Loan Policy; Liability Amount $_______________ Amount for Policy Charged Customer:
______________
Amount for Policy as applicable: $______________
Problem sited: ___yes ___no
If yes, how was this resolved, explain:
4. Property Type:
_____1-4 Family Residential
_____Industrial
Home
_____Vacant Land
_____Apartment Building
_____Condominium/PUD
_____ Commercial
_____ Manufactured
_____Agricultural
5. Legal Description:
Does the policy legal description match the legal description in the commitme3nt, deed
and/or mortgage, and/or survey? ___yes ___no/Explain:
6. Schedule B information:
a. Do the exceptions found on the commitment and subsequent title evidence
corresponds to the exceptions on Schedule B? ___yes ___no/Explain:
b. Were the exceptions worded correctly? ___ ___no/Describe:
7. Were standard Schedule B exceptions deleted?
A. “Rights of present tenants, lessees or parties in possession” ___yes ___no
B. “Any liability for mechanics’ or material-mans’ liens” ___yes ___no
C. “Discrepancies, conflicts in boundary lines, shortage in area, encroachments, and any
facts which an accurate survey and inspection of the premises would disclose”
___yes ___no
D. If yes, check for the following types of support documentation in the file:
___Owners Affidavit
___Construction Loan Disbursement Agreement
___Construction lien indemnity
___Plat plan or location survey
___Full ALTA survey
___Surveyor’s report/affidavit
___Standard Extended Coverage Questionnaire
___Estoppel Certificate
E. Does the survey disclose any matters that are not shown on the policy? ___yes
___no
F. Has the question of access been considered and properly “disposed of”? ___yes
___no
8. If the policy insures a condominium unit: Was the appropriate language included in
Schedule B?
___yes ___no
9. Are there any affirmative insurance notes in Schedule B (excluding endorsements) in the
owner and/or lender’s policies? ___yes ___no If yes, what are they ______________
10. Were endorsements issued properly, if any:
___yes ___no If done incorrectly, follow up noted:
11. If the commitment disclosed taxes due, does the file contain evidence of payment?
___yes ___no
12. Does the tax exception in the policy correspond to the tax information in the file? ___yes
___ no
13. What was the period of gap between date of closing and issuance of policy?
___________
a. Was the title search brought down to cover closing date? ___yes ___no
b. Is there evidence in the file? ___yes ___no
V.
Post Issuance
1.
Were all of the instructions on the application complied with? ___yes ___no
2.
Is the date on the policy and date of recording the same? ___yes ___no;
If no, what is the Gap? ___________ Explain briefly:
______________________________________________
3. Was a continuation search run from the end date of the original title evidence to the date of
recording?
___yes ___no; if no, explain briefly: __________________________________
4. What proofs of recording are in the file?
_____Recording receipt
_____Stamped document copies
_____File notation (i.e., Liber and page and date of document recording information)
_____Log entry
_____Canceled check for fees
Back to Top
Industry
Best Practice

Pillar 6
Errors, Omissions
& Fidelity Insurance
Maintain appropriate
professional liability
insurance and
fidelity coverage.
Purpose:
Appropriate levels of professional liability insurance or errors and omissions insurance help ensure title
agencies and settlement companies maintain the financial capacity to stand behind their professional services.
In addition, state law and title insurance underwriting agreements may require a company to maintain
professional liability insurance or errors and omissions insurance, fidelity coverage or surety bonds.
Considerations:











Have you obtained confirmation that E&O Coverage is acceptable by your underwriters and that it
meets your contractual obligations?
Does your coverage/deductible match your agency contract with your underwriter?
What coverages does your state require?
Is your coverage sufficient for the type of business you are conducting?
Do you have cyber liability insurance coverage?
 Including coverage for the loss of confidential consumer information
What does your policy define as a title claim?
What are your coverage dates?
Do you have coverage for future claims related to mistakes made prior to your current policy?
Do your policies cover directors and officers?
Who is monitoring your expiration date and ensuring timely renewal?
Are the following third-party vendors covered (if you utilize their services)
 Independent Contractors
 Title Agents
 Title Abstractors
 Searcher
 Escrow Agent
 Closing Agent
 Public Records Searcher
 Corporate Document Searcher
Solutions/Suggestions:
1. Create a written policy for monitoring adequate coverages and renewals.
2. Research and obtain pricing for comprehensive insurance packages that include cyber liability
insurance, Fidelity Bond, and E&O coverage.
Tools & Resources:
FORMS:
SAMPLE 1 – GUIDE - Insurance policy riders that: cover computer systems; cover the theft of escrow funds;
make your title underwriter a loss payee.
SAMPLE 2 - TABLE - that helps you compile information about your insurance policies:
SAMPLE 3 - POLICY - Professional Liability and Fidelity Coverage Policy
Sample 1 - Guide: INSURANCE COMPANIES & BROKERAGES
 Ritman & Associates, Inc. (Adam Gwaltney) www.ritmanassoc.com
TIAC - The Title Industry Assurance Company is a member-owned, ALTA- endorsed insurance provider
www.alta.org/tiac/

Arthur J. Gallagher & Co (Dan Riebling of The Trieber Group) http://www.ajg.com/locations/newyork/garden-city/#4
In addition to a recommended minimum of $1 million E&O coverage, which may or may not
exceed the contractual requirements contained in an Agency Agreement, a comprehensive
fidelity policy will include the following:
Coverage of at least a minimum of $500,000 per occurrence, $500,000 aggregate (check
your Agency Contract for possible minimums).
Protection against theft from operating or escrow accounts by either agency employees
AND the agency principal and corporate officers.
Protection against computer fraud including third party account hacking.
Ensure that coverage does not lapse. This could cause you to lose retroactive coverage
Moreover, this coverage is affordable and is based on the agency’s number of
employees. For example, the basic policy which provides $500,000 of coverage per
claim in the aggregate limits of liability, subject to a $15,000/claim deductible, costs
$2,000 for ten employees, $3,280 for 25 employees, etc. Call Arthur J. Gallagher & Co.
for rates and more specifics at 800-749-7326 or by e-mail at fntgins@ajg.com .

Your Fidelity Agency Account Manager www.nationalagency.fntg.com
Sample 2: TO COMPILE INFORMATION ABOUT YOUR INSURANCE POLICIES
Part 1.
State/Underwriter
Required Coverage –
Type and amount
Requirements Met?
Part 2.
Type of policy
(E&O, Fidelity,
etc.)
Policy #
Policy Limit &
Deductible
Carrier
Expiration Date
Part 3.
Type of Supplier/Service
Provider
Independent Contractors
Title Agents
Title Abstractors
Searcher
Escrow Agent
Closing Agent
Public Records Searcher
Corporate Document
Searcher
Directors and Officers
Do we use them?
Covered?
Which policy(ies)
Sample 3: PROFESSIONAL LIABILITY AND FIDELITY COVERAGE POLICY
1. Professional liability or errors and omissions insurance
The company maintains professional liability insurance in the amount of no less than
$___________________. This amount is appropriate given the company’s size and
complexity and the nature and scope of its operations; the amount is not less than the
amount agreed to in the company’s underwriting agreement(s).
The insurance carrier is nationally known and has appropriate Best ratings.
Coverage’s / Endorsements are reviewed annually and are added or subtracted to reflect
current changes in the practices of the industry and to reflect new threats to our business as
they arise, such as cybercrime.
2. Fidelity bond coverage (Protection for Agent against employee dishonesty)
The company maintains a fidelity bond policy in an amount of not less than
$___________________. The company reviews both State law and our Issuing Agency
Contracts to verify that our coverage meets or exceeds their respective requirements. This
coverage is carried even if State law or our Issuing Agency Contract does not require it from
time-to-time as conditions or laws change.
3. Surety coverage, Closing Protection Letters (Protection for consumers against closing disbursement
issues). For Example:
(Alternate A) In Ohio, state law requires us to offer closing protection coverage to buyers,
sellers, and lenders. We encourage buyers, sellers, and lenders to purchase those products
and maintain a signed disclosure form in our files evidencing our compliance with state law in
connection with those.
(Alternate B) Also as required by state law, the company possesses surety bond coverage
for closings where title insurance is not being purchased. Coverage is in the greater of the
$250,000 or state mandated amount.
(Alternate C) Alternatively, the company ensures that the Closing Protection Letter
coverage, where mandated by statute, is issued in connection with the disbursement or that
a statutory indemnity fund is established to cover.
Back to Top
Industry
Best Practice

Pillar 7
Consumer
Complaints
Adopt and maintain
procedures for resolving
consumer complaints.
Purpose:
A process for receiving and addressing consumer complaints helps ensure reported instances of poor service
or non-compliance are discovered and promptly resolved.
Considerations:
1. What constitutes a complaint?
2. What is the ‘type’ of complaint and who will need to be notified?
3. How does your state handle consumer complaints?
 Some states send consumers directly to the CFPB to make complaints
4. Who will be responsible internally for tracking and addressing complaints?
5. Are you going to use the complaint policy and procedure as a training tool for employees?
Solutions / Suggestions:
1. Define consumer complaints, including types and levels of complaint.
2. Identify single point of contact for consumers to contact for follow-up
3. Identify person or department responsible for intake, logging, tracking progress and resolution of
complaint
4. Utilize complaint procedure as a training tool
Tools:
FORMS:
SAMPLE 1 – Complaint Resolution Policy & Procedure
SAMPLE 2 – Complaint Intake Form
SAMPLE 3 – Complaint Resolution System Annual Log
The information provided in this SAMPLE Policy Document is for your reference only and is not
intended to represent the only approach to any particular issue. These guidelines should not be
construed as legal, financial or business advice, and you should consult legal counsel and subjectmatter experts to determine the appropriate policies, procedures and strategies applicable to your
office or organization.
Sample 1: COMPLAINT RESOLUTION POLICY & PROCEDURE
Policy Statement
ABC Title Agency (ABC) is committed to providing a professional, fair, efficient, courteous and
helpful service to the public and a key aspect for achieving this is to promptly investigate and, where
possible, resolve complaints about its service to the satisfaction of the customer.
Dealing with complaints effectively and efficiently is a core element of ABC Title Agency’s customer
service and reflects ABC’s commitment to service excellence.
ABC’s Complaint Policy & Procedure will be posted on the Company website for easy access
by consumers.
Scope
This policy applies to the handling of all formal complaints submitted to ABC. For the purposes of
this policy, a complaint is defined as any expression of dissatisfaction about the service/s
provided by the ABC and/or about the professional conduct of ABC staff, including any subcontractors used by ABC.
Examples of the types of complaints are (do not have an exhaustive list):
Poor service or failure to meet promise/commitment
A failure to follow policies, procedures or written instructions
Mistakes/Errors by ABC personnel
Unreasonable delay caused by ABC
Wrong or misleading information provided to consumer
(NOTE: ABC is NEVER to provide advice!)
A failure to provide explanations or give reasons for decisions
Discrimination of any kind, inconsistency or lack of objectivity
Inappropriate staff behavior, discourtesy, disrespect or rudeness
Purpose:
It is the policy of ABC Title Agency to provide a complaint resolution procedure that is timely and
responsive to consumers of our services.
 The compliant procedure will be timely and accessible to the consumer.
 All employees will welcome complaints with the understanding that our goal is satisfied
customers.
 Where possible, all ABC staff should endeavor to resolve complaints at the first point of
contact or knowledge of the complaint.


Customers who remain dissatisfied after speaking to an ABC Employee should be offered
the option of being transferred to a ABC Complaint Coordinator (CC). If the CC is
unavailable to take the call and/or the consumer would prefer to write in to complain, the ABC
Employee should provide the consumer with the company address details (email and/or
postal address) and should direct the consumer to the ABC’s website where ABC’s
Complaint Policy is posted.
ABC will always endeavor to respond to consumer complaints using the consumers preferred
mode of communication. Where this is not specified, ABC will usually respond using the
same mode of communication as the complainant has used to raise the complaint.
Step One: Upon the receipt of a complaint (all employees need to be sensitive to the idea that
consumers may make a complaint in a variety of ways including phone calls, voice mail, email, or
regular mail) the person receiving the complaint or becoming aware of a complaint will fill out the
Company Complaint Intake Form, attaching a copy of any emails, letters, or notes from the voice
mail, that will be helpful in providing a full picture to the Complaint Coordinator or anyone else
involved later in the process.

Contact the customer by telephone / email to acknowledge receipt of the complaint. Discuss
the complaint with the customer and ask the customer how they would like the matter
resolved.

The Complaint Intake Form should be delivered to the Company’s designated Complaint
Coordinator (CC) as soon as possible, but in no event later than the end of the business day
which the complaint came in or was discovered. The employee will provide the consumer
with the Company Complaint Coordinator’s name and contact information.
Step Two: The Complaint Coordinator (CC) will review the Complaint Intake Form and any
documentation attached.

The Complaint will be logged on the Company’s Annual Complaint Log and the CC will
determine if there is a need to notify any other parties about the complaint.

If necessary, the CC will request additional information or speak directly with any employees
involved to be sure the CC has all the necessary information (employee’s “side of the story”
and surrounding circumstances of any other entities or parties involved) and respond to the
party who made the complaint to the best of their ability and authority.

The goal is to resolve any complaints within three business days. Depending on the nature of
the complaint, the CC will contact the consumer by the end of the second business day from
the Complaint Intake to acknowledge receipt of the complaint and update the customer with
the status.

If the CC is unable to resolve the complaint within three business days, the consumer will be
updated by the Complaint Coordinator on progress (even if there is no progress) every 3rd
day from initial contact until resolution is reached.
If the CC is unable to satisfactorily resolve the complaint within three business days, they will
bring the matter to the attention of the Office Manager/Owner/CEO.

Step Three: The Company CEO, will respond to the consumer within two business days of being
notified by the Complaint Coordinator that the issue has not been resolved.

The CEO will utilize objectivity and flexibility (being mindful of state and federal regulations
for the title industry) in determining the proper resolution.

The decision of the CEO is final. Only the CEO shall have the authority to revise the decision
should additional information be provided that would warrant a change in part or whole of the
CEO’s original decision for resolution.

The CEO’s explanation and resolution will be communicated to the party that made the
complaint directly by the CEO or if the CEO designates, by the Complaint Coordinator the
same business day as the CEO outlines the resolution.
HOW MIGHT ABC RESPOND AFTER REVIEWING A COMPLAINT?
• An explanation
• Provision of a service, an additional service or a follow up service;
• A change of the initial decision;
• Confirmation of the original decision;
• Additional training for staff;
• A change in operational practice to try to prevent a similar event from occurring; and
• In some cases, a change in policy or practice.
Record Keeping and Reporting:
 copies of all documentation related to the complaint, such as the initial email, the Complaint
Intake Form, notes, etc. will be scanned to the server and held in an electronic file folder (or
hard copy Complaint Portfolio).

All complaints will be updated on the Annual Complaint Log completing all the areas listed on
the Log at the close/resolution of complaint.
Monthly Meeting:

On a monthly basis, Complaint Coordinator will make a brief presentation to the Staff about
the complaints received and any resolutions.

The purpose is to keep the Staff informed and to provide an opportunity for suggestions on
how to avoid similar complaints in the future, illuminate training needs and discuss trends.
Revision History
Rev #
Date
Description
1
Enter Date
Original Date Published (Add any revision dates/notes below)
Sample Action Plan
Timeframe
Complaint intake form is filled out
By end of the day
Complaint intake form emailed to Complaint Coordinator
By end of the day
Customer is contacted for acknowledgment of receipt of
complaint, to obtain any additional information needed and
explanation of follow-up procedure
By end of the second day
If applicable, outside parties notified (Lender, Realtor,
Underwriter, etc.)
By end of the second day
Status update is made to the consumer If the complaint is not
resolvable within 3 additional business days.
By the end of the 5th business day
Status update is made to the consumer
Every 3rd business day thereafter.
Complaint intake form is completed and complaint log is
updated by Complaint Coordinator
At resolution of the complaint.
Sample 2: COMPLAINT INTAKE FORM
Complaint Intake Form
Attach copies of any emails, notes, letters, etc.
Use extra sheets as necessary
File #
Complaint Type
Customer Information
Name:
Phone #
Address
Email
Complaint Information
Date
Details:
(Attach extra sheets if necessary)
Other persons/parties
involved
Notified ?
Notes
Person assigned to resolve
Suggested Course of Action
Contact #1
Date and Time:
Notes:
Contact #2
Date and Time:
Notes:
Date
Resolution
Complaint Closed/Resolved?
Complaint added to Annual Log?
All related documents scanned and saved?
x
Signature of Owner or Complaint Coordinator (Indicates close of complaint)
Sample 3: COMPLAINT RESOLUTION SYSTEM ANNUAL LOG
SAMPLE: ABC TITLE AGENCY - Complaint Resolution System Annual Log
Office Location/Branch Office Location:
Complaint #
1
2
3
4
5
6
7
8
9
10
Complainer Name
(Person Making
Complaint)
Respondent Name
(Who/What Comp.is
against)
Year:
*Type of
Complaint
Date Filed
Staff Person
Intake Form
Staff Person Complaint
Resolution &
Referred to for Resolution Date Resolved
Back to Top
Thank you for utilizing this portfolio. We are
confident that it has assisted in memorializing
your title company’s processes, procedures,
safeguards and your consistent monitoring.
We appreciate your business and look forward
to bringing you additional tools and resources,
not only for your Best Practices but also to
prepare you for the New CFPB Forms, a
changing market and the future of our industry.
FNTG’s Portfolio Builder
For Implementing Title
Industry Best Practices
Download