In order to better server your needs now and in the future, we may ask you to provide us with certain information. We understand that you may be concerned about what we will do with such information - particularly any personal or financial information. We agree that you have a right to know how we will utilize the personal information you provide to us.
Depending upon which of our services you are utilizing, the types of nonpublic personal information that we may collect include:
We request information from you for our own legitimate business purposes and not for the benefit of any nonaffiliated party. Therefore, we will not release your information to nonaffiliated parties except: (1) as necessary for us to provide the product or service you have requested to us; or (2) as permitted by law. We may or may not, however, store such information indefinitely, including the period after which any customer relationship has ceased. Such information may be used for any internal purpose, such as quality control efforts or customer analysis. We may also provide all of the types of nonpublic personal information listed above to one or more of our affiliated companies. Such affiliated companies include financial service providers, such as title insurers, property and casualty insurers, and trust and investment advisory companies, or companies involved in real estate services, such as appraisal companies, home warranty companies, and escrow companies. Furthermore, we may also provide all the information we collect, as described above, to companies that perform marketing services on our behalf, on behalf of our affiliated companies, or to other financial institutions with whom we or our affiliated companies have joint marketing agreements.
At Alabama Land Title we implement all of the Best Practices set forth by ALTA (American Land Title Association) and we adhere to all rules set forth by the CFPB (Consumer Financial Protection Bureau). We have deployed Next-Gen Firewalls for Layer 7 traffic classification, control, Intrusion detection, Identity-based and device-aware security. Backup of data is stored offsite using encrypted technology using the same standard employed by the military and trusted federal banking institutions.