Meet the compliance and legal requirements of your business
Put your trust in our Complete Audit™ system
The best customer experience, the onboarding architecture or the fastest claims processing times in the industry mean nothing if they don’t meet the compliance, legal and risk requirements of your business.
Because we’ve been selected as partners to some of the world’s leading financial institutions, we understand that reality as well as you do. That’s why our Complete Audit system stores everything that happens between you and the customer and allows you to see every key stroke, change and alteration, including shared assets like documents and photos. This helps flag and manage potential fraud risk both inside and outside the organization.
A financial services company is a lucrative target for hackers and other bad actors seeking to steal the personal and confidential information entrusted to you by your customers. That’s why we protect our platform using AWS security and are committed to securing data to the highest possible standard. This includes:
- Associating files, photos and videos with unique rooms, encrypted and stored on AWS S3 (AES algorithm and 256-bit keys).
- Encrypting data in transit using HTTPS with TLS v1.2.
- Encrypting video and audio communications using AES-128, using Elliptic Curve Cryptography (ECDHE_ECDSA algorithm) for key exchanges.
We regularly redact sensitive information based on your enterprise requirements, and aggressively limit administrator permissions, provisioning users on an individual basis and ensuring password requirements meet the unique needs of your business.
Liveoak is HIPAA Rule Security Compliant. In addition, we have successfully completed information security reviews at several of the world’s Top 50 global financial institutions. Our platform and processes are Type II SOC 2 certified (formerly SAS 70) by the American Institute of CPAs. The Type II SOC 2 is a third-party audit that provides assurance to customers of service organizations that business practices meet Trust Principles and Criteria standards: security, integrity, availability, confidentiality and privacy.
We conduct background screening for all prospective employees and suppliers and provide our team with annual security training. Our engineers are trained to ensure coding is done securely, which we audit on a regular basis, and we subject our business to yearly reviews by third-party security auditors to ensure we remain vigilant and continue to meet the stringent expectations of our customers.