1-866-770-5856 Contact Us FI Login

Risk & Security

Certified Compliant
  • To meet industry payment compliance, you must select a solution provider with the highest degree of security and soundness when providing electronic payment services to your community.
  • Our data center and customer relations staff understands compliance, regulations and regulatory requirements.
  • We understand regulations like the Gramm-Leach-Bliley act.

» Read More

  • Our data center is certified each year to be a Level I PCI/DSS compliant service provider, the highest rating in the industry.
  • A comprehensive FFIEC audit is conducted on a regular basis by government regulators.
  • In addition to required internal audit responsibilities, our data center undergoes annual third party audits such as the SSAE-16 SOC1 Type II audit, IT Security audit, Risk Assessment audit and Financial audit, to name a few.
  • The company performs annual reviews of NACHA rule changes, financial regulatory changes and other areas in order to meet compliance requirements.
  • Financial institution’s clients receive all third party and internal audits annually allowing the institution to fulfill its regulatory compliance requirements.

» Read Less

Risk Management
  • Processing ACH payments, accepting check images, audit reporting and other functions related to a comprehensive electronic payments program brings a certain amount of risk.
  • Our data center and payment network has undergone a series of Risk Assessment reviews, but, we don’t stop there. Our Risk Assessment and Project Review and Approve Committees continually review and analyze Risk Exposure, Risk Impact and develop Risk Controls and Risk Monitoring solutions.
  • Risk Policies and Procedures are recommended and reviewed by the Risk Assessment Committee, with oversight from the Board of Directors.

» Read More

  • Third Party Risk Assessment and IT Security Auditing firms perform annual reviews of the company’s payment network to ensure Risk Threats have been analyzed and sufficient Risk Controls have been established.
  • Risk limits have been established to limit transactions exposure including per-transaction, per-batch, per-file, per-day, 48-hours, 10-day, 30-day, 60-day and more.
  • By implementing Multi-level system access, dual posting authentication, automatic batch suspension, duplicate batch warning, duplicate check notice, real-time notification and many more controls, reducing Risk Exposure is easy.
  • You are in control. You may restrict any system feature that can be used by your customer.

» Read Less

Multi-Level Authentication
  • Protecting your customer’s information has never been easier. Our Multi-Level features safeguard access to sensitive customer data by implementing layers of identity verification.
  • Our Multi-Level features increase with complexity as the rate of access to sensitive data increases, providing maximum protection to our financial institution clients, business customers and consumers.
  • Multi-Level authentication is used when business customers request posting of ACH and electronic payment files. This feature requires the verification and authorization by management before files are accepted into the payment system.

» Read More

  • Clients’ Remote Deposit check files and images can require Multi-Level authorization at company level and a final review by the financial institution, creating the ultimate in Multi-Level RDC processing.
  • While others boast of Multi-Level by phone we invented it. Since 1987 our clients have enjoyed the security of our Multi-Level phone authentication system. This authentication not only requires individual sign-in and passcodes, but it also includes fax and email confirmations to multiple designated company and financial institution departments and individuals.
  • Multi-Level, it’s not just one feature – it requires comprehensive integration with a well-developed system. Let us show you how Multi-Level really works.

» Read Less