Privacy Policy for Crown Mortgage of the West

Introduction

Crown Mortgage of the West (“Company” or “We”) acknowledges the paramount importance of privacy for our clients and is committed to protecting personal and financial information with the highest degree of integrity and confidentiality. Our comprehensive privacy policy is designed to ensure compliance with the Gramm-Leach-Bliley Act (GLBA) and all applicable privacy regulations. This policy meticulously details our procedures for collecting, using, protecting, and disclosing information obtained through our website, borrower’s portal, and other service platforms.

Detailed Information Collection Practices

Types of Information Collected

Personal Information

We collect identifiable details such as names, postal addresses, email addresses, telephone numbers, social security numbers, financial profiles, and other unique identifiers. This personal information is crucial for personalized service delivery, accurate client identification, and thorough financial assessments. Sources of personal information include:

  • Service Applications: Data provided by clients during the application process for our services.
  • Customer Inquiries: Information collected when clients contact us with questions or service-related concerns.
  • Online Portals: Data gathered through client interactions with our digital platforms, including login details and usage metrics.

Non-Personal Information

We collect data regarding internet connections, device specifications, and interaction metrics with our services. This includes IP addresses, browser types, operating system details, and usage patterns. Non-personal information is instrumental in optimizing service functionality and enhancing the overall user experience.

Methods of Information Collection

Direct Interactions

We obtain information directly from clients through service applications, customer inquiries, and engagements with our online portals. This method ensures the accuracy and relevance of the data collected, facilitating a seamless client experience.

Automated Technologies

We employ a variety of automated technologies such as cookies, web beacons, and other tracking mechanisms to gather data during client interactions with our digital platforms. These technologies are pivotal in service improvement and in creating personalized user journeys.

Third-Party Sources

We collaborate with business partners and external entities to augment our understanding of client needs, thereby ensuring a tailored service approach. Information from third-party sources is integrated into our systems under strict confidentiality agreements, enhancing our service delivery.

Purpose of Information Collection

The information we collect is integral to our service delivery and is used to:

  • Provide Bespoke Services: Tailor content and services to individual client needs, ensuring a personalized experience.
  • Respond Efficiently: Address service requests and inquiries promptly, ensuring client satisfaction.
  • Execute Financial Transactions: Uphold contractual commitments and facilitate seamless financial operations.
  • Communicate Updates: Inform clients about vital updates, changes, and promotional offers, keeping them well-informed.
  • Enhance Service Offerings: Develop informed business strategies and improve services based on client consent and feedback, ensuring continuous service enhancement.

Information Sharing and Disclosure

Our information sharing practices are governed by strict ethical and legal standards. Information is disclosed under the following conditions:

Within the Company Group

Information may be shared with subsidiaries and affiliates to streamline service provision and operational efficiency. This intra-group sharing is conducted under stringent confidentiality protocols, ensuring data security.

Third-Party Service Providers

We engage with various external agencies to support our business operations, including marketing, data analysis, and customer service. These engagements are conducted under strict confidentiality agreements to ensure data security and integrity.

Legal Successors

In events such as mergers or acquisitions, client information may be transferred as part of the asset portfolio. This ensures continuity of service while maintaining privacy standards.

Regulatory and Legal Compliance

We may disclose information to comply with legal obligations, respond to judicial processes, or protect the rights, property, or safety of the Company. This disclosure is done in strict accordance with legal requirements and with the least possible intrusion on client privacy.

User Rights and Choices

Clients are empowered with rights over their personal information, including:

Access and Review

Clients can request access to and review their personal data held by us. We facilitate such requests promptly and transparently, ensuring clients are fully informed.

Correction and Update

Requests to correct or update erroneous or incomplete information are promptly addressed, ensuring the accuracy of our records and maintaining client trust.

Deletion and Restriction

Clients can ask for the deletion of their data or restrict its processing under certain conditions. We evaluate and respond to such requests in compliance with legal and regulatory standards, ensuring client preferences are respected.

Data Portability

We provide mechanisms for transferring personal information to third parties at the client’s request. This ensures clients can manage their data as per their preferences, maintaining control over their personal information.

Data Security

We employ advanced security measures to protect against unauthorized access, alteration, disclosure, or destruction of personal information. Our data security measures include:

Encryption Technologies

Sensitive data is encrypted during transmission and storage, providing robust protection against data breaches and ensuring data integrity.

Access Controls

Strict access policies ensure that only authorized personnel handle client information. These controls are regularly reviewed and updated to maintain high-security standards and prevent unauthorized access.

Regular Audits

We conduct regular security assessments and audits to maintain high data protection standards. These audits help identify and mitigate potential security risks, ensuring continuous improvement in our data security practices.

Compliance and Legal Considerations

This policy is crafted in strict adherence to sector-specific legal requirements and best practices. We ensure robust compliance with state, federal, and international privacy laws, safeguarding client information through comprehensive legal and regulatory frameworks. Any ambiguities in this policy shall be interpreted in accordance with the laws of the jurisdiction of San Luis Obispo, California.

Changes to the Privacy Policy

We reserve the right to amend this policy periodically. Significant changes will be communicated through our website and via direct notifications to our clients. Clients are encouraged to review the policy regularly to stay informed about how we protect their information and to ensure they are aware of any updates.

Contact Information

For queries or feedback regarding our privacy practices, please contact:

Brian Lardner
Founding Member
Crown Mortgage of the West
Email: brian@crownmortgageofthewest.com
Phone: (805) 434-5226

This policy is effective as of June 24, 2024.