Request for Subordinate Branch Account


Download 49.16 Kb.
NameRequest for Subordinate Branch Account
A typeDocumentation

cpisa_brsv03082011.1.0.0


crp k

Request for Subordinate Branch Account



Request to Add:

Branch 

A Physical Inspection of Location will be conducted.




Company Name:

     

Main Account Number:

     


New Branch Information:



Contact Name:

     

Other Contacts:

     




Address:

     




City:

     

State:

     

Zip:

     




Phone:

     

Fax

     




Email address:

     




Create Security PIN (last 4 digits of SSN)

     




Branch Location Type:

Commercial 

Residential 




Describe how Credit Plus, Inc reports will be used by the new Branch (e.g., Mortgage Lending):

     


Select Invoicing Option:




Corporate Approved and Guaranteed - All fees incurred are the responsibility of the Corporate Office and Invoices are sent to the Corporate Office address listed above. Attached Personal Guarantor Form and Credit Card Form are not required.



Corporate Approved and Guaranteed Upon Default - All fees incurred are the responsibility of the Branch and the Invoices are sent to the Branch Billing address listed above. HOWEVER, in case of default by the Branch the Corporate Office guarantees all fees incurred by the Branch. Attached Personal Guarantor Form and Credit Card Form ARE REQUIRED.



Corporate Approved with Branch Manager/Contact Responsible for Fees - All fees incurred are the responsibility of the Branch and the Invoices are sent to the Branch Billing address listed above. The Branch Manager is responsible for payment. Attached Personal Guarantor Form and Credit Card Form ARE REQUIRED.


COMPANY OFFICER SIGNATURE:
I certify that the above statements are accurate and hereby authorize Credit Plus, Inc. to add a new Branch account as identified above. I warrant that the actions of the Branch indicated above will be bound by the Credit Plus, Inc. User Service Agreement previously executed by the Company listed below, and the Agreement is hereby amended to include this Account and its Users under the Agreement.
Company Name: _______________________________________________
________________________________________________

Signature Date

________________________________________________

Typed or Printed Name and Title ________________________________________________

Address (if different from above)

________________________________________________

City, State, Zip

BRANCH MANAGER SIGNATURE
I have read and understand the Credit Plus, Inc. User Agreement and agree to be bound by it, including the Appendices and Exhibits hereto which are expressly incorporated into it and which are available at http://www.creditplus.com/docs/appendices.pdf

________________________________________________

Signature Date

________________________________________________

Typed or Printed Name and Title ________________________________________________

Address (if different from above)

________________________________________________

City, State, Zip

PERSONAL GUARANTOR
Upon acceptance of the company listed below as a subscriber to Credit Plus, Inc., the undersigned hereby agrees that any and all information regarding this account and all services provided by Credit Plus, Inc. including pricing will be kept strictly confidential and will not be disclosed to any third parties without the expressed written consent of Credit Plus, Inc.
The undersigned, in consideration of the acceptance of said company as a subscriber to Credit Plus, Inc., hereby jointly and severally guarantees unconditionally the payment of all amounts which may be owed Credit Plus, Inc. including late fees; attorney and or collection expenses as provided for in the service agreement without the need for Credit Plus, Inc. to first pursue the below named company.
Guarantor hereby gives his/her consent to Credit Plus, Inc. to obtain any and all information concerning his/her business, and personal history, financial background including credit reports, which may be required at any time in connection with this agreement.

Guarantor acknowledges they have read, understand and agree to the terms and conditions of this Personal guarantee.


Name

     

Company

     




Home Addr

     

City

     

State

     

Zip

     




SSN

     

Date

     

Signature





CREDIT CARD AUTHORIZATION


Customer Number

     


(Required on all Accounts) Please enter the following information exactly as it appears on the credit card.


In the event of default by customer, or if customer does not qualify for standard payment terms, the undersigned authorizes Credit Plus, Inc. to charge the credit card set forth below for the total of any and all unpaid invoices.



Card Number

     

Expiration Date

     




First Name

     

M Init

     

Last Name

     




Address

     

City

     

State

     

Zip

     




Email Addr

     

Phone Number

     




Signature




Date

     




 Voluntary Recurring Credit Card Payment Authorization Agreement:

For customers who qualify for standard payment terms but elect to charge invoices to their credit card every month
The undersigned authorizes Credit Plus, Inc. to charge the credit card set forth above each month for the balance due of the Company. A fax copy of this authorization and the undersigned signature may be deemed equivalent to the original and may be used as a duplicate original.


Signature




Date

     


Access Security Requirements



We must work together to protect the privacy and information of consumers. The following information security measures are designed to reduce unauthorized access to consumer information. It is your responsibility to implement these controls. If you do not understand these requirements or need assistance, it is your responsibility to employ an outside service provider to assist you. Capitalized terms used herein have the meaning given in the Glossary attached hereto. The credit reporting agency reserves the right to make changes to Access Security Requirements without notification. The information provided herewith provides minimum baselines for information security.

In accessing the credit reporting agency’s services, you agree to follow these security requirements:

1. Implement Strong Access Control Measures

1.1 Do not provide your credit reporting agency Subscriber Codes or passwords to anyone. No one from the credit reporting agency will ever contact you and request your Subscriber Code number or password.

1.2 Proprietary or third party system access software must have credit reporting agency Subscriber Codes and password(s) hidden or embedded. Account numbers and passwords should be known only by supervisory personnel.

1.3 You must request your Subscriber Code password be changed immediately when:

• any system access software is replaced by another system access software or

is no longer used;

• the hardware on which the software resides is upgraded, changed or disposed

of

1.4 Protect credit reporting agency Subscriber Code(s) and password(s) so that only key personnel know this sensitive information. Unauthorized personnel should not have knowledge of your Subscriber Code(s) and password(s).

1.5 Create a separate, unique user ID for each user to enable individual authentication and accountability for access to the credit reporting agency’s infrastructure. Each user of the system access software must also have a unique logon password.

1.6 Ensure that user IDs are not shared and that no Peer-to-Peer file sharing is enabled on those users’ profiles.

1.7 Keep user passwords Confidential.

1.8 Develop strong passwords that are:

• Not easily guessable (i.e. your name or company name, repeating numbers and

letters or consecutive numbers and letters)

• Contain a minimum of seven (7) alpha/numeric characters for standard user

accounts

1.9 Implement password protected screensavers with a maximum fifteen (15) minute timeout to protect unattended workstations.

1.10 Active logins to credit information systems must be configured with a 30 minute

inactive session, timeout.

1.11 Restrict the number of key personnel who have access to credit information.

1.12 Ensure that personnel who are authorized access to credit information have a business need to access such information and understand these requirements to access such information are only for the permissible purposes listed in the Permissible Purpose Information section of your membership application.

1.13 Ensure that you and your employees do not access your own credit reports or those reports of any family member(s) or friend(s) unless it is in connection with a credit transaction or for another permissible purpose.

1.14 Implement a process to terminate access rights immediately for users who access credit reporting agency credit information when those users are terminated or when they have a change in their job tasks and no longer require access to that credit information.

1.15 After normal business hours, turn off and lock all devices or systems used to obtain credit information.

1.16 Implement physical security controls to prevent unauthorized entry to your facility and access to systems used to obtain credit information.

2. Maintain a Vulnerability Management Program

2.1 Keep operating system(s), Firewalls, Routers, servers, personal computers (laptop and desktop) and all other systems current with appropriate system patches and updates.

2.2 Configure infrastructure such as Firewalls, Routers, personal computers, and similar components to industry best security practices, including disabling unnecessary services or features, removing or changing default passwords, IDs and sample files/programs, and enabling the most secure configuration features to avoid unnecessary risks.

2.3 Implement and follow current best security practices for Computer Virus detection scanning services and procedures:

• Use, implement and maintain a current, commercially available Computer Virus

detection/scanning product on all computers, systems and networks.

• If you suspect an actual or potential virus, immediately cease accessing the

system and do not resume the inquiry process until the virus has been

eliminated.

• On a weekly basis at a minimum, keep anti-virus software up-to-date by

vigilantly checking or configuring auto updates and installing new virus

definition files.

2.4 Implement and follow current best security practices for computer anti-Spyware

scanning services and procedures:

• Use, implement and maintain a current, commercially available computer anti-

Spyware scanning product on all computers, systems and networks.

• If you suspect actual or potential Spyware, immediately cease accessing the

system and do not resume the inquiry process until the problem has been

resolved and eliminated.

• Run a secondary anti-Spyware scan upon completion of the first scan to ensure

all Spyware has been removed from your computers.

• Keep anti-Spyware software up-to-date by vigilantly checking or configuring

auto updates and installing new anti-Spyware definition files weekly, at a

minimum. If your company’s computers have unfiltered or unblocked access to

the Internet (which prevents access to some known problematic sites), then it is

recommended that anti-Spyware scans be completed more frequently than

weekly.

3. Protect Data

3.1 Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.)

3.2 All credit reporting agency data is classified as Confidential and must be secured to this requirement at a minimum.

3.3 Procedures for transmission, disclosure, storage, destruction and any other information modalities or media should address all aspects of the lifecycle of the information.

3.4 Encrypt all credit reporting agency data and information when stored on any laptop computer and in the database using AES or 3DES with 128-bit key encryption at a minimum.

3.5 Only open email attachments and links from trusted sources and after verifying

legitimacy.

4. Maintain an Information Security Policy

4.1 Develop and follow a security plan to protect the Confidentiality and integrity of

personal consumer information as required under the GLB Safeguard Rule.

4.2 Establish processes and procedures for responding to security violations, unusual or suspicious events and similar incidents to limit damage or unauthorized access to information assets and to permit identification and prosecution of violators.

4.3 The FACTA Disposal Rules requires that you implement appropriate measures to dispose of any sensitive information related to consumer credit reports and records that will protect against unauthorized access or use of that information.

4.4 Implement and maintain ongoing mandatory security training and awareness sessions for all staff to underscore the importance of security within your organization.

5. Build and Maintain a Secure Network

5.1 Protect Internet connections with dedicated, industry-recognized Firewalls that are configured and managed using industry best security practices.

5.2 Internal private Internet Protocol (IP) addresses must not be publicly accessible or natively routed to the Internet. Network address translation (NAT) technology should be used.

5.3 Administrative access to Firewalls and servers must be performed through a secure internal wired connection only.

5.4 Any stand alone computers that directly access the Internet must have a desktop

Firewall deployed that is installed and configured to block unnecessary/unused ports, services, and network traffic.

5.5 Encrypt Wireless access points with a minimum of WEP 128 bit encryption, WPA

encryption where available.

5.6 Disable vendor default passwords, SSIDs and IP Addresses on Wireless access points and restrict authentication on the configuration of the access point.

6. Regularly Monitor and Test Networks

6.1 Perform regular tests on information systems (port scanning, virus scanning,

vulnerability scanning).

6.2 Use current best practices to protect your telecommunications systems and any

computer system or network device(s) you use to provide Services hereunder to

access credit reporting agency systems and networks. These controls should be

selected and implemented to reduce the risk of infiltration, hacking, access penetration or exposure to an unauthorized third party by:

• protecting against intrusions;

• securing the computer systems and network devices;

• and protecting against intrusions of operating systems or software.

Record Retention: The Federal Equal Opportunities Act states that a creditor must preserve all written or recorded information connected with an application for 25 months. In keeping with the ECOA, the credit reporting agency requires that you retain the credit application and, if applicable, a purchase agreement for a period of not less than 25 months. When conducting an investigation, particularly following a breach or a consumer complaint that your company impermissibly accessed their credit report, the credit reporting agency will contact you and will request a copy of the original application signed by the consumer or, if applicable, a

copy of the sales contract.



Under Section 621 (a) (2) (A) of the FCRA, any person that violates any of the provisions of the FCRA may be liable for a civil penalty of not more than $2,500 per violation.”


Share in:

Related:

Request for Subordinate Branch Account iconFutureQuals Approved Centres must complete the attached Credit Account...

Request for Subordinate Branch Account iconList of documents necessary for opening an account to the rf non-resident...

Request for Subordinate Branch Account iconList of documents necessary for opening a bank account to the rf...

Request for Subordinate Branch Account iconAnnexure 1 – Request letter format for dormant account activation

Request for Subordinate Branch Account iconDear Holder. As requested, enclosed are the form and instructions...

Request for Subordinate Branch Account iconBranch Event Project Manager with support from branch

Request for Subordinate Branch Account iconFrom Historical Account to Fictional Account: Chekhov’s Two Versions of Penal Colony Experiences

Request for Subordinate Branch Account iconSample Request Letter from ira account Owner (Donor) to Donor’s ira...

Request for Subordinate Branch Account icon1. Emma places €8000 in a bank account that pays a nominal interest...

Request for Subordinate Branch Account iconWho Can Open a ppf account or Who are eligible for Public Provident...




forms and shapes


When copying material provide a link © 2017
contacts
filling-form.info
search