Those who use LINCOLN DATA’s Contract Collection System can be assured of complete data privacy and control as the data resides on your computer system. It is not an ASP or “Cloud based” system where you are accessing your data via the Internet hosted on another company’s server.
Each Contract Collection System installation may be configured to allow user access on a local area network, wide area network or networked over the Internet. In each case your data is located on your computer system. The single-user system may be installed on a stand-alone PC. Most customers maintain their data on a server even if the only user is a single workstation. This allows easy backup and restore procedures.
Password security and file maintenance history features add further management control. “Inquiry only” passwords allow easy and secure access for occasional users of the system. “Supervisor only” passwords allow additional management oversight for higher authority tasks such as data export.
Customers using our Internet Inquiry Interface upload data to a secured independent host in Spokane, WA protected by data encryption. No data is shared with other companies. Data piracy is not a risk as no social security numbers and no bank account numbers are included in data uploaded for Internet Inquiry. Internet Inquiry passwords allow each buyer and seller to view or print just their data. Investors with multiple loans can use an investor level password to access all their accounts using a single password entry.
Lincolndata.com privacy notice:
Our company policy does not allow the sale, rental, trade or other release of our customer lists. We may provide your company name, address, phone number and contact person to nonaffiliated companies that perform services used by our software, such as outsourced year-end statement printing.
We do not disclose any non-public personal information about you with anyone for any purpose that is not specifically permitted by law. LINCOLN DATA employees are responsible for adhering to strict confidentiality standards to protect any non-public information that they may have access to during the course of performing their duties. We provide a secure environment for file transfer and storage. If customers provide files for evaluation, file transfers use industry standard encryption protocols up to 256-bit and file storage uses AES 256-bit encryption. Remote technical support is provided using ConnectWise Control which utilizes 256-bit AES encryption along with multiple authentication methods.